Skip to content

Commit 4a43954

Browse files
author
Ken Lawson
committed
Fixed validation warning issues.
1 parent 9897231 commit 4a43954

File tree

2 files changed

+6
-4
lines changed

2 files changed

+6
-4
lines changed

learn-pr/wwl-sci/connect-non-azure-machines-to-azure-defender/includes/3-connect-non-azure-machines.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,11 +51,11 @@ With Azure Arc-enabled servers, you can perform many operational functions, just
5151
* Assign [Azure machine configurations](/azure/governance/machine-configuration/overview) to audit settings inside the machine. To understand the cost of using Azure Machine Configuration policies with Arc-enabled servers, see Azure Policy [pricing guide](https://azure.microsoft.com/pricing/details/azure-policy/).
5252
* **Protect**:
5353
* Protect non-Azure servers with [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint), included through [Microsoft Defender for Cloud](/azure/security-center/defender-for-servers-introduction), for threat detection, for vulnerability management, and to proactively monitor for potential security threats. Microsoft Defender for Cloud presents the alerts and remediation suggestions from the threats detected.
54-
* Use [Microsoft Sentinel](scenario-onboard-azure-sentinel.md) to collect security-related events and correlate them with other data sources.
54+
* Use [Microsoft Sentinel](/azure/azure-arc/servers/scenario-onboard-azure-sentinel) to collect security-related events and correlate them with other data sources.
5555
* **Configure**:
5656
* Use [Azure Automation](/azure/automation/extension-based-hybrid-runbook-worker-install?tabs=windows) for frequent and time-consuming management tasks using PowerShell and Python [runbooks](/azure/automation/automation-runbook-execution). Assess configuration changes for installed software, Microsoft services, Windows registry and files, and Linux daemons using the Azure Monitor agent for [change tracking and inventory](/azure/automation/change-tracking/overview-monitoring-agent?tabs=win-az-vm).
5757
* Use [Azure Update Manager](/azure/update-manager/overview) to manage operating system updates for your Windows and Linux servers. Automate onboarding and configuration of a set of Azure services when you use [Azure Automanage](/azure/automanage/automanage-arc).
58-
* Perform post-deployment configuration and automation tasks using supported [Arc-enabled servers VM extensions](manage-vm-extensions.md) for your non-Azure Windows or Linux machine.
58+
* Perform post-deployment configuration and automation tasks using supported [Arc-enabled servers VM extensions](/azure/azure-arc/servers/manage-vm-extensions) for your non-Azure Windows or Linux machine.
5959
* **Monitor**:
6060
* Monitor operating system performance and discover application components to monitor processes and dependencies with other resources using [VM insights](/azure/azure-monitor/vm/vminsights-overview).
6161
* Collect other log data, such as performance data and events, from the operating system or workloads running on the machine with the [Azure Monitor Agent](/azure/azure-monitor/agents/azure-monitor-agent-overview). This data is stored in a [Log Analytics workspace](/azure/azure-monitor/logs/log-analytics-workspace-overview).
@@ -65,3 +65,5 @@ Log data collected and stored in a Log Analytics workspace from the hybrid machi
6565
Watch this video to learn more about Azure monitoring, security, and update services across hybrid and multicloud environments.
6666

6767
> [!VIDEO https://www.youtube.com/embed/mJnmXBrU1ao]
68+
69+
To connect your non-Azure machines with Azure Arc enabled servers [Follow this Quickstart](/azure/azure-arc/servers/learn/quick-enable-hybrid-vm).

learn-pr/wwl-sci/connect-non-azure-machines-to-azure-defender/includes/4-connect-aws-accounts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,11 +55,11 @@ To connect your AWS to Defender for Cloud by using a native connector:
5555

5656
1. Select **Add environment** > **Amazon Web Services**.
5757

58-
:::image type="content" source="../media/add-aws-account-environment-settings.png" alt-text="Screenshot that shows connecting an AWS account to an Azure subscription." lightbox="media/quickstart-onboard-aws/add-aws-account-environment-settings.png":::
58+
:::image type="content" source="../media/add-aws-account-environment-settings.png" alt-text="Screenshot that shows connecting an AWS account to an Azure subscription." lightbox="../media/add-aws-account-environment-settings.png":::
5959

6060
1. Enter the details of the AWS account, including the location where you store the connector resource.
6161

62-
:::image type="content" source="../media/add-aws-account-details.png" alt-text="Screenshot that shows the tab for entering account details for an AWS account." lightbox="media/quickstart-onboard-aws/add-aws-account-details.png":::
62+
:::image type="content" source="../media/add-aws-account-details.png" alt-text="Screenshot that shows the tab for entering account details for an AWS account." lightbox="../media/add-aws-account-details.png":::
6363

6464
The **AWS regions** dropdown allows you to select the regions to which Defender for Cloud makes API calls. Every region that is deselected from the dropdown, implies that Defender for Cloud won’t make API calls to those regions.
6565

0 commit comments

Comments
 (0)