You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exposure-management/classify-critical-assets.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,13 +83,13 @@ Create a custom classification as follows:
83
83
84
84
1. On the **Create a critical asset classification** page, complete the following information to set your classification criteria:
85
85
86
-
-**Name** - A new classification name.
87
-
-**Description** - A new classification description.
88
-
-**Query builder**
89
-
- Use the query builder to define a new classification, for instance, "mark all devices with a certain naming convention as critical."
90
-
- Add one or more Boolean filters that are defined per device, identity, or cloud resource.
86
+
-**Name** - A new classification name.
87
+
-**Description** - A new classification description.
88
+
-**Query builder**
89
+
- Use the query builder to define a new classification, for instance, "mark all devices with a certain naming convention as critical."
90
+
- Add one or more Boolean filters that are defined per device, identity, or cloud resource.
91
91
92
-
:::image type="content" source="./media/classify-critical-assets/create-critical-asset-classification.png" alt-text="Screenshot of the page where you create critical asset classifications.":::
92
+
:::image type="content" source="./media/classify-critical-assets/create-critical-asset-classification.png" alt-text="Screenshot of the page where you create critical asset classifications.":::
93
93
94
94
1. After setting the criteria, select **Next**.
95
95
1. On the following pages, preview the affected assets, and assign the criticality level.
@@ -157,4 +157,3 @@ To see the sum of exposed critical assets go to the [Security recommendations](/
157
157
## Next steps
158
158
159
159
Learn about simulating [attack paths](work-attack-paths-overview.md).
0 commit comments