Skip to content

Commit 646e388

Browse files
authored
changed files by pdets auto publish service, publishid[42fe0800-958c-47ae-95a0-add32ee1c7ed] and do [publish].
1 parent 6fbf415 commit 646e388

File tree

4 files changed

+2
-2
lines changed

4 files changed

+2
-2
lines changed

learn-pr/wwl-azure/microsoft-defender-cloud-security-posture/includes/3-secure-score.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Defender for Cloud continually assesses your cross-cloud resources for security
1616

1717
- In the Azure mobile app, the secure score is shown as a percentage value, and you can tap the secure score to see the details that explain the score:
1818

19-
:::image type="content" source="../media/single-secure-score-via-mobile1a-0a8df228-4ffb230b.png" alt-text="Screenshot showing secure score results.":::
19+
:::image type="content" source="../media/single-secure-score-via-mobile1a-0a8df228.png" alt-text="Screenshot showing secure score results.":::
2020

2121

2222
To increase your security, review Defender for Cloud's recommendations page and remediate the recommendation by implementing the remediation instructions for each issue. Recommendations are grouped into security controls. Each control is a logical group of related security recommendations and reflects your vulnerable attack surfaces. Your score only improves when you *remediate all* of the recommendations for a *single resource within a control*. To see how well your organization is securing each individual attack surface, review the scores for each security control.

learn-pr/wwl-azure/microsoft-defender-cloud-security-posture/includes/8-microsoft-defender-external-attack-surface-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Defender EASM provides a series of dashboards that help users quickly understand
3232

3333
Customers can filter their inventory to surface the specific insights they care about most. Filtering offers a level of flexibility and customization that enables users to access a specific subset of assets. This allows you to leverage Defender EASM data according to your specific use case, whether searching for assets that connect to deprecating infrastructure or identifying new cloud resources.
3434

35-
:::image type="content" source="../media/new-assest-management-9f38538e-4d4edc1a.png" alt-text="Screenshot showing the Microsoft Defender External Attack Surface Management inventory page.":::
35+
:::image type="content" source="../media/new-assest-management-9f38538e.png" alt-text="Screenshot showing the Microsoft Defender External Attack Surface Management inventory page.":::
3636

3737

3838
## User permissions

0 commit comments

Comments
 (0)