Skip to content

Commit fcef914

Browse files
committed
Acrolinx fixes
1 parent 8135739 commit fcef914

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/security-center/built-in-vulnerability-assessment.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Built-in vulnerability scanner in Azure Security Center
3-
description: Azure Security Center includes a fully integrated vulnerability assessment solution from Qualys. This article describes how to deploy and use the tool.
3+
description: Azure Security Center includes a fully integrated vulnerability assessment solution from Qualys. Learn more about this Security Center extension on this page.
44
services: security-center
55
documentationcenter: na
66
author: memildin
@@ -10,7 +10,7 @@ ms.devlang: na
1010
ms.topic: conceptual
1111
ms.tgt_pltfrm: na
1212
ms.workload: na
13-
ms.date: 03/22/2020
13+
ms.date: 03/30/2020
1414
ms.author: memildin
1515

1616
---
@@ -60,7 +60,7 @@ To deploy the vulnerability scanner extension:
6060

6161
* **Healthy resources** – the vulnerability scanner extension has been deployed to these VMs.
6262
* **Unhealthy resources** – the vulnerability scanner extension can be deployed to these VMs.
63-
* **Not applicable resources** – these VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
63+
* **Not applicable resources** – these VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in [this Azure for .NET page](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet)), or it's not running one of the supported OSes:
6464

6565
- All versions of Windows
6666
- Red Hat Enterprise Linux 6.7, 7.6
@@ -80,7 +80,7 @@ To deploy the vulnerability scanner extension:
8080

8181
## Viewing and remediating discovered vulnerabilities
8282

83-
When Security Center identifies vulnerabilities, it presents findings and related information as recommendations. The related information includes remediation steps, related CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific virtual machine.
83+
When Security Center identifies vulnerabilities, it presents findings and related information as recommendations. The related information includes remediation steps, related CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific VM.
8484

8585
To see the findings and remediate the identified vulnerability:
8686

@@ -124,7 +124,7 @@ For full instructions and a sample ARG query, see this Tech Community post: [Exp
124124
## Built-in Qualys vulnerability scanner FAQ
125125

126126
### Are there any additional charges for the Qualys license?
127-
No. The built-in scanner is free to all standard tier users. The "Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)" recommendation deploys a scanner that includes all the necessary licensing and configuration information. No additional licenses are required.
127+
No. The built-in scanner is free to all standard tier users. The "Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)" recommendation deploys the scanner with its licensing and configuration information. No additional licenses are required.
128128

129129
### What permissions are required to install the Qualys extension?
130130
You'll need write permissions for any VM on which you want to deploy the extension.
@@ -167,7 +167,7 @@ When you open the recommendation, you'll see your VMs in one or more of the foll
167167

168168
- **Healthy resources** – the vulnerability scanner extension has been deployed to these VMs.
169169
- **Unhealthy resources** – the vulnerability scanner extension can be deployed to these VMs.
170-
- **Not applicable resources** – These VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
170+
- **Not applicable resources** – These VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in [this Azure for .NET page](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet)), or it's not running one of the supported OSes:
171171

172172
- All versions of Windows
173173
- Red Hat Enterprise Linux 6.7, 7.6
@@ -186,7 +186,7 @@ The Security Center extension is a separate tool from your existing Qualys scann
186186
### Microsoft Defender Advanced Threat Protection also includes Threat & Vulnerability Management (TVM). How is the Security Center Vulnerability Assessment extension different?
187187
Microsoft is actively developing world-class vulnerability management with Microsoft Defender ATP's Threat & Vulnerability Management solution, built into Windows.
188188

189-
Today, Azure Security Center's Vulnerability Assessment extension is powered by Qualys. This ensures support for both Windows and Linux virtual machines. The extension also benefits from Qualys's own knowledge of vulnerabilities that don't yet have CVEs.
189+
Today, Azure Security Center's Vulnerability Assessment extension is powered by Qualys. The Qualys extension ensures support for both Windows and Linux VMs. The extension also benefits from Qualys's own knowledge of vulnerabilities that don't yet have CVEs.
190190

191191
## Next steps
192192
This article described the Azure Security Center Vulnerability Assessment extension (powered by Qualys) for scanning your VMs. For related material, see the following articles:

0 commit comments

Comments
 (0)