Skip to content

Commit ffca5f9

Browse files
committed
review-4
1 parent 427126f commit ffca5f9

12 files changed

+20
-20
lines changed

learn-pr/azure/design-monitoring-strategy-on-azure/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: Introduction
77
description: Introduction
8-
ms.date: 11/13/2023
8+
ms.date: 01/22/2025
99
author: kayodeprinceMS
1010
ms.author: kaprince
1111
ms.topic: unit

learn-pr/azure/design-monitoring-strategy-on-azure/2-full-stack-monitoring.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: Full-stack monitoring in Azure
77
description: Introduction to full-stack monitoring in Azure
8-
ms.date: 11/13/2023
8+
ms.date: 01/22/2025
99
author: kayodeprinceMS
1010
ms.author: kaprince
1111
ms.topic: unit

learn-pr/azure/design-monitoring-strategy-on-azure/3-azure-monitoring-options.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: Monitoring options in Azure
77
description: Explore the monitoring options available in Azure.
8-
ms.date: 11/13/2023
8+
ms.date: 01/22/2025
99
author: kayodeprinceMS
1010
ms.author: kaprince
1111
ms.topic: unit

learn-pr/azure/design-monitoring-strategy-on-azure/4-application-insights.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: Monitor applications by using Application Insights
77
description: Learn how to monitor applications by using Azure Monitor Application Insights.
8-
ms.date: 11/13/2023
8+
ms.date: 01/22/2025
99
author: kayodeprinceMS
1010
ms.author: kaprince
1111
ms.topic: unit

learn-pr/azure/design-monitoring-strategy-on-azure/5-analyze-resource-utilization.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: Monitor VMs and containers by using insights
77
description: Analyze virtual machine (VM) and container utilization and performance by using Azure Monitor VM insights and container insights.
8-
ms.date: 11/13/2023
8+
ms.date: 01/22/2025
99
author: kayodeprinceMS
1010
ms.author: kaprince
1111
ms.topic: unit

learn-pr/azure/design-monitoring-strategy-on-azure/6-security-center.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: Manage infrastructure security by using Defender for Cloud
77
description: Learn how to monitor, analyze, and manage infrastructure security by using Microsoft Defender for Cloud.
8-
ms.date: 11/13/2023
8+
ms.date: 01/22/2025
99
author: rmcmurray
1010
ms.author: robmcm
1111
ms.topic: unit
@@ -16,11 +16,11 @@ content: |
1616
quiz:
1717
title: Check your knowledge
1818
questions:
19-
- content: How can you use Defender for Cloud to prevent persistent access to your VMs?
19+
- content: How can you use Defender for Cloud to prevent persistent access to your virtual machines?
2020
choices:
2121
- content: Use Azure Logic Apps.
2222
isCorrect: false
23-
explanation: You can trigger an automated alert response with Logic Apps, but not manage VM access.
23+
explanation: You can trigger an automated alert response with Logic Apps, but not manage virtual machine (VM) access.
2424
- content: Use just-in-time (JIT) access.
2525
isCorrect: true
2626
explanation: With JIT access, your VMs are accessed based only on rules that you configure.
@@ -31,7 +31,7 @@ quiz:
3131
choices:
3232
- content: Use just-in-time (JIT) access.
3333
isCorrect: false
34-
explanation: Just-in-time access is used to control VM access, not respond to alerts.
34+
explanation: Just-in-time access is used to control VM access, not to respond to alerts.
3535
- content: Use adaptive application controls.
3636
isCorrect: false
3737
explanation: You use adaptive controls to control which applications can run on your VMs, not to respond to alerts.

learn-pr/azure/design-monitoring-strategy-on-azure/7-sentinel.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: Manage enterprise security by using Microsoft Sentinel
77
description: Learn how to monitor, analyze, and manage enterprise security by using Microsoft Sentinel.
8-
ms.date: 11/13/2023
8+
ms.date: 01/22/2025
99
author: rmcmurray
1010
ms.author: robmcm
1111
ms.topic: unit
@@ -34,8 +34,8 @@ quiz:
3434
explanation: You can use predefined exploration queries to investigate incidents more effectively, but they don't show which users an incident affected.
3535
- content: Use entities.
3636
isCorrect: true
37-
explanation: Use entities to view users that a particular threat or malicious activity might have affected.
37+
explanation: Use entities to view users that are affected in a particular threat or malicious activity.
3838
- content: Use the timeline.
3939
isCorrect: false
40-
explanation: You can use the timeline feature to understand the path that a threat might have taken over time, but the timeline doesn't show affected users.
40+
explanation: You can use the timeline feature to understand the path that a threat takes over time, but the timeline doesn't show affected users.
4141

learn-pr/azure/design-monitoring-strategy-on-azure/8-summary.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
prefetch-feature-rollout: true
66
title: Summary
77
description: Summary
8-
ms.date: 11/13/2023
8+
ms.date: 01/22/2025
99
author: kayodeprinceMS
1010
ms.author: kaprince
1111
ms.topic: unit

learn-pr/azure/design-monitoring-strategy-on-azure/includes/6-security-center.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
Because your company is a financial organization, it needs to meet the highest standards for security. Each customer or partner transaction must be completely protected from threats, and you must also respond effectively to potential threats. For example, if a virtual machine (VM) is compromised, you must act rapidly to address the issue.
1+
Because your company is a financial organization, it needs to meet the highest standards for security. Each customer or partner transaction must be protected completely from threats, and you must also respond effectively to potential threats. For example, if a virtual machine (VM) is compromised, you must act rapidly to address the issue.
22

33
This unit describes how to protect resources and respond to threats by using Microsoft Defender for Cloud. Defender for Cloud helps you ensure that the security configuration of your infrastructure is as secure as possible.
44

@@ -46,7 +46,7 @@ To configure adaptive controls, select **Adaptive application control** on the *
4646

4747
:::image type="content" source="../media/6-security-center-update-04.png" alt-text="Screenshot of Adaptive application controls." lightbox="../media/6-security-center-update-04.png":::
4848

49-
Select a resource group and use the **Configure application control rules** screen to target VMs and applications that should have the control rules applied.
49+
When you select a resource group, it opens **Configure application control rules**. On this screen, use the options to target VMs and applications that should have the control rules applied.
5050

5151
## Respond to threats
5252

@@ -75,7 +75,7 @@ Expand any of the following sections to take action on the alert:
7575

7676
:::image type="content" source="../media/6-security-center-update-10.png" alt-text="Screenshot of the Take action pane." lightbox="../media/6-security-center-update-10.png":::
7777

78-
In the alert details, you should dismiss alerts if no action is required, for example if there are false positives. You should act to address known attacks, for example by blocking known malicious IP addresses, and you should decide which alerts require more investigation.
78+
In the alert details, you should dismiss alerts if no action is required, for example if there are false positives. You should act to address known attacks, for example by blocking known malicious IP addresses, and you should decide which alerts require further investigation.
7979

8080
:::image type="content" source="../media/6-security-center-update-09.png" alt-text="Screenshot of alert status." lightbox="../media/6-security-center-update-09.png":::
8181

learn-pr/azure/design-monitoring-strategy-on-azure/includes/7-sentinel.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ This unit describes how Microsoft Sentinel helps monitor and respond to security
44

55
- Get a detailed overview of your enterprise, potentially across multiple clouds and on-premises locations.
66
- Avoid reliance on complex and disparate tools.
7-
- Use enterprise-grade AI, built by experts, to identify and handle threats across your organization.
7+
- Identify and handle threats across your organization by using enterprise-grade AI, built by experts.
88

99
## Connect your data sources to Microsoft Sentinel
1010

@@ -75,7 +75,7 @@ If you hover over an entity, you see a list of *exploration queries* designed by
7575

7676
:::image type="content" source="../media/7-sentinel-12.png" alt-text="Screenshot of exploration queries." lightbox="../media/7-sentinel-12.png":::
7777

78-
The investigation map also gives you a timeline that helps you understand which event occurred at a particular time. Use the timeline feature to understand the path that a threat might have taken over time.
78+
The investigation map also gives you a timeline that helps you understand which event occurred at a particular time. Use the timeline feature to understand the path that a threat might take over time.
7979

8080
:::image type="content" source="../media/7-sentinel-13.png" alt-text="Screenshot of timeline." lightbox="../media/7-sentinel-13.png":::
8181

0 commit comments

Comments
 (0)