Skip to content

Commit fed2f50

Browse files
committed
added video and fixes
1 parent 140e4a5 commit fed2f50

File tree

2 files changed

+6
-2
lines changed

2 files changed

+6
-2
lines changed

articles/defender-for-cloud/concept-attack-path.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,13 @@ ms.date: 11/08/2022
99

1010
# What are the cloud security graph, attack path analysis, and the cloud security explorer?
1111

12+
<iframe src="https://aka.ms/docs/player?id=36a5c440-00e6-4bd8-be1f-a27fbd007119" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
13+
1214
One of the biggest challenges that security teams face today is the number of security issues they face on a daily basis. There are numerous security issues that need to be resolve and never enough resources to address them all.
1315

1416
Defender for Cloud's contextual security capabilities assists security teams to assess the risk behind each security issue, and identify the highest risk issues that need to be resolved soonest. Defender for Cloud assists security teams to reduce the risk of an impactful breach to their environment in the most effective way.
1517

16-
All of these capabilities are available as part of the [Defender Cloud Security Posture Management](concept-cloud-security-posture-management.md) plan and the recruiting enablement of [agentless scanning for VMs](concept-agentless-data-collection.md)
18+
All of these capabilities are available as part of the [Defender Cloud Security Posture Management](concept-cloud-security-posture-management.md) plan and the requiring the enablement of [agentless scanning for VMs](concept-agentless-data-collection.md)
1719

1820
## What is cloud security graph?
1921

articles/defender-for-cloud/how-to-manage-cloud-security-explorer.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,4 +75,6 @@ You can review the [full list of recommendations, insights and connections](atta
7575

7676
## Next steps
7777

78-
[Create custom security initiatives and policies](custom-security-policies.md)
78+
View the [reference list of attack paths and cloud security graph components](attack-path-reference.md)
79+
80+
Learn about the [Defender CSPM plan options](concept-cloud-security-posture-management.md#defender-cspm-plan-options)

0 commit comments

Comments
 (0)