Skip to content

Commit 9797852

Browse files
authored
Merge pull request #2038 from MicrosoftDocs/gary-fix-links-4
Correct file links and image references
2 parents ec98fcb + 705cbe8 commit 9797852

File tree

2 files changed

+17
-14
lines changed

2 files changed

+17
-14
lines changed

CloudAppSecurityDocs/posture-overview.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,11 @@ ms.date: 11/17/2024
1010
> [!NOTE]
1111
> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD. For these environments, it is recommended to consume SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation).
1212
13-
One of Microsoft Defender for Cloud Apps' core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments might be configured with a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown in [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) once you have a connector to an application. For example:
13+
One of Microsoft Defender for Cloud Apps core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments might be configured with a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown in [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) once you have a connector to an application. For example:
1414

1515
![Screenshot of the SalesForce recommendations in Secure Score.](media/security-saas-sspm-in-secure-score-salesforce-filter.png)
1616

17-
![Screenshot of the SaaS security initiative.](<media/posture-overview/screenshot-of-the-saas-security-initiative-home-page.png>)
17+
![Screenshot of the SaaS security initiative.](media/posture-overview/screenshot-of-the-saas-security-initiative-home-page.png)
1818

1919
## Prerequisites
2020

@@ -32,14 +32,16 @@ Follow these steps to ensure that your application connector is set to show data
3232
1. Use the filter to locate the application where you want to turn on security recommendations.
3333

3434
1. Open the instance drawer and note whether 'Security recommendations' are turned on or off. For example, the following example shows that 'Security recommendations' are turned on for **Okta Contoso EU** instance:
35-
![Screenshot of an instance where Secure Score recommendations are turned on.](<media/posture-overview/screenshot-of-an-instance-where-secure-score-recommendations-are-turned-on.png>)
3635

37-
If the instance is currently set to **Off**, select the **...** options menu and then select **Turn on 'Security recommendations'**. For example:
38-
![Screenshot of the Turn on Secure Score or 'Exposure management' recommendations option.](<media/posture-overview/screenshot-of-the-turn-on-secure-score-or-exposure-management-recommendations-option.png>)
36+
![Screenshot of an instance where Secure Score recommendations are turned on.](media/posture-overview/screenshot-of-an-instance-where-secure-score-recommendations-are-turned-on.png)
3937

40-
> [!NOTE]
41-
> If you have multiple instances of the same app, you can send security recommendations for each instance separately.
42-
Security recommendations for the selected instance are added to Microsoft Security Exposure Management in addition to the current recommendations.
38+
If the instance is currently set to **Off**, select the **...** options menu and then select **Turn on 'Security recommendations'**. For example:
39+
40+
![Screenshot of the Turn on Secure Score or 'Exposure management' recommendations option.](media/posture-overview/screenshot-of-the-turn-on-secure-score-or-exposure-management-recommendations-option.png)
41+
42+
> [!NOTE]
43+
> If you have multiple instances of the same app, you can send security recommendations for each instance separately.
44+
> Security recommendations for the selected instance are added to Microsoft Security Exposure Management in addition to the current recommendations.
4345
4446
Security recommendations are shown automatically in [Microsoft Security Exposure Management](/microsoft-365/security/defender/microsoft-secure-score). Recommendations are based on Microsoft benchmarks, and might take up to 24 hours to update.
4547

@@ -56,9 +58,7 @@ For more information, see [Assess your security posture with Microsoft Secure Sc
5658
> [!IMPORTANT]
5759
> Since Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD, it is recommended for these environments to consume SaaS security posture recommendations in [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation) as explained above.
5860
59-
To effectively manage your organization's SaaS security posture, we recommend beginning with the SaaS Security initiative. This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, allowing you to prioritize and address the most impactful recommendations for SaaS environments. For more information, see:
60-
61-
- [SaaS Security Initiative](/defender-cloud-apps/saas-security-initiative)
61+
To effectively manage your organization's SaaS security posture, we recommend beginning with the SaaS Security initiative. This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, allowing you to prioritize and address the most impactful recommendations for SaaS environments. For more information, see [SaaS Security Initiative](/defender-cloud-apps/saas-security-initiative).
6262

6363
In addition you can find a variety of SSPM recommendations under different initiatives. Key initiatives include:
6464

CloudAppSecurityDocs/saas-security-initiative.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,8 @@ ms.date: 10/31/2024
1111
1212
The SaaS Security Initiative provides a centralized place for SaaS security best practices, enabling organizations to manage and prioritize security recommendations effectively. By focusing on the most impactful metrics, organizations can enhance their SaaS security posture efficiently.
1313

14-
![Screenshot of the SaaS security initiative home page.](<media\saas-securty-initiative\screenshot-of-the-saas-security-initiative-home-page.png>)
14+
![Screenshot of the SaaS security initiative home page.](media\saas-securty-initiative\screenshot-of-the-saas-security-initiative-home-page.png)
15+
1516

1617
## What is the SaaS Security Initiative?
1718

@@ -39,5 +40,7 @@ Once selected, you can click on any of the **Non-Compliant** recommendations to
3940

4041
## Additional Information
4142

42-
- Each metric includes a list of associated app connectors, encouraging organizations to enable more connectors for enhanced visibility. If you're interested in recommendations for specific applications, navigate to the **Security Recommendations** tab and filter by the relevant application.
43-
- To learn more about Exposure Management initiatives visit [here](/security-exposure-management/initiatives).
43+
Each metric includes a list of associated app connectors, encouraging organizations to enable more connectors for enhanced visibility. If you're interested in recommendations for specific applications, navigate to the **Security Recommendations** tab and filter by the relevant application.
44+
45+
To learn more about Exposure Management initiatives, see [Review security initiatives](/security-exposure-management/initiatives).
46+

0 commit comments

Comments
 (0)