Skip to content

Commit 1054ca3

Browse files
Merge pull request #2801 from MicrosoftDocs/main
Auto Publish – main to live - 2026-04-29 17:35 UTC
2 parents cd262c3 + b6c0ac4 commit 1054ca3

21 files changed

Lines changed: 28 additions & 28 deletions

‎articles/defender-for-cloud/agentless-malware-scanning.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Agentless malware scanning for machines provides:
2121
- **Different scan types** - Agentless scanning can run quick and full scans.
2222
- **Integrated security alerts** - Malware security alerts are integrated into both Defender for Cloud and Defender XDR.
2323

24-
Agentless malware scanning for machines in available in Defender for Servers Plan 2 with agentless scanning enabled. Scanning for malware is supported for Azure VMs, and AWS/GCP machines connected to Defender for Cloud.
24+
Agentless malware scanning for machines is available in Defender for Servers Plan 2 with agentless scanning enabled. Scanning for malware is supported for Azure VMs, and AWS/GCP machines connected to Defender for Cloud.
2525

2626
## Malware security alerts
2727

‎articles/defender-for-cloud/ai-onboarding.md‎

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Threat protection for AI services in Microsoft Defender for Cloud protects Micro
3737

3838
## Enable the components of the plan
3939

40-
With the AI services threat protection plan enabled, you can control whether the different components of teh plan are enabled. This includes:
40+
With the AI services threat protection plan enabled, you can control whether the different components of the plan are enabled. This includes:
4141

4242
- **[Suspicious prompt evidence](#enable-suspicious-prompt-evidence)**: receive alerts for suspicious portions of user prompts and model responses to help analyze AI-related security alerts, with sensitive data automatically redacted. These prompt snippets appear in the Defender portal as part of each alert’s evidence.
4343

@@ -49,7 +49,7 @@ With the AI services threat protection plan enabled, you can control whether the
4949

5050
With the AI services threat protection plan enabled, you can control whether alerts include suspicious segments directly from your user's prompts, or the model responses from your AI applications or agents. Enabling user prompt evidence helps you triage, classify alerts and your user's intentions.
5151

52-
User prompt evidence consists of prompts and model responses. Both are considered your data. Evidence is available through the Azure portal, Defender portal, and any attached partners integrations.
52+
User prompt evidence consists of prompts and model responses. Both are considered your data. Evidence is available through the Azure portal, Defender portal, and any attached partner integrations.
5353

5454
If User prompt evidence is disabled, Microsoft Defender for Cloud continues analyzing prompts and responses for threat detection, but the prompt content is masked in alerts.
5555

‎articles/defender-for-cloud/concept-integration-365.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The following table describes the detection and investigation experience in Micr
4040
| Area | Description |
4141
|--|--|
4242
| Incidents | All Defender for Cloud incidents are integrated to Microsoft Defender XDR. <br> - Searching for cloud resource assets in the [incident queue](/microsoft-365/security/defender/incident-queue) is supported. <br> - The [attack story](/microsoft-365/security/defender/investigate-incidents#attack-story) graph shows cloud resource. <br> - The [assets tab](/microsoft-365/security/defender/investigate-incidents#assets) in an incident page shows the cloud resource. <br> - Each virtual machine has its own entity page containing all related alerts and activity. <br> <br> There are no duplications of incidents from other Defender workloads. |
43-
| Alerts | All Defender for Cloud alerts, including multicloud, internal and external providers' alerts, are integrated to Microsoft Defender XDR. Defenders for Cloud alerts show on the Microsoft Defender XDR [alert queue](/microsoft-365/security/defender-endpoint/alerts-queue-endpoint-detection-response). <br>Microsoft Defender XDR<br> The `cloud resource` asset shows up in the Asset tab of an alert. Resources are clearly identified as an Azure, Amazon, or a Google Cloud resource. <br> <br> Defender for Cloud alerts are automatically be associated with a tenant. <br> <br> There are no duplications of alerts from other Defender workloads.|
43+
| Alerts | All Defender for Cloud alerts, including multicloud, internal and external providers' alerts, are integrated to Microsoft Defender XDR. Defender for Cloud alerts show on the Microsoft Defender XDR [alert queue](/microsoft-365/security/defender-endpoint/alerts-queue-endpoint-detection-response). <br>Microsoft Defender XDR<br> The `cloud resource` asset shows up in the Asset tab of an alert. Resources are clearly identified as an Azure, Amazon, or a Google Cloud resource. <br> <br> Defender for Cloud alerts are automatically associated with a tenant. <br> <br> There are no duplications of alerts from other Defender workloads.|
4444
| Alert and incident correlation | Alerts and incidents are automatically correlated, providing robust context to security operations teams to understand the complete attack story in their cloud environment. |
4545
| Threat detection | Accurate matching of virtual entities to device entities to ensure precision and effective threat detection. |
4646
| Unified API | Defender for Cloud alerts and incidents are now included in [Microsoft Defender XDR's public API](/microsoft-365/security/defender/api-overview), allowing customers to export their security alerts data into other systems using one API. |

‎articles/defender-for-cloud/create-governance-rule-servicenow.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: elkrieger
66
ms.topic: how-to
77
ms.date: 10/13/2024
88
ai-usage: ai-assisted
9-
#customer intent: As a user, I want to learn how to create automatic tickets using governance rules in Defender for Cloud that automatically assigns an owner to specific recommendation or a recommendation with a severity level in Defender for Cloud to my my ServiceNow account.
9+
#customer intent: As a user, I want to learn how to create automatic tickets using governance rules in Defender for Cloud that automatically assigns an owner to specific recommendation or a recommendation with a severity level in Defender for Cloud to my ServiceNow account.
1010
---
1111

1212
# Create automatic tickets with governance rules

‎articles/defender-for-cloud/defender-for-cloud-introduction.md‎

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ In addition to its core CNAPP capabilities, Defender for Cloud delivers [AI secu
4444
4545
## Cloud Native Application Protection Platform (CNAPP)
4646

47-
:::image type="content" source="media/defender-for-cloud-introduction/defender-plans.png" alt-text="Conceptual image of CNAPP and how the Defenders for Cloud's plans protect all of your resources in their environments." lightbox="media/defender-for-cloud-introduction/defender-plans.png":::
47+
:::image type="content" source="media/defender-for-cloud-introduction/defender-plans.png" alt-text="Conceptual image of CNAPP and how the Defender for Cloud plans protect all of your resources in their environments." lightbox="media/defender-for-cloud-introduction/defender-plans.png":::
4848

4949
After you enable the [Defender for Cloud solution](connect-azure-subscription.md) on your Azure subscription, the system collects security data from your multicloud and DevOps environments. Defender for Cloud uses the data to provide insights, recommendations, and actions that help you protect your cloud workloads and resources. You can increase your cloud workloads protection and coverage by enabling additional plans that are listed in the following section.
5050

@@ -67,7 +67,7 @@ You can also check out the E-book ["From plan to deployment: Implementing a Clou
6767

6868
## Cloud security posture management (CSPM)
6969

70-
The security of your cloud and on-premises resources depends on proper configuration and deployment. Defenders for Cloud recommendations help you secure your environment.
70+
The security of your cloud and on-premises resources depends on proper configuration and deployment. Defender for Cloud recommendations help you secure your environment.
7171

7272
Defender for Cloud includes free Foundational CSPM capabilities. Enable advanced CSPM capabilities by using the Defender CSPM plan.
7373

‎articles/defender-for-cloud/defender-for-cloud-planning-and-operations-guide.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ When planning access control using Azure Role-based access control for Defender
117117

118118
A security policy defines the desired configuration of your workloads and helps ensure compliance with company or regulatory security requirements. In Defender for Cloud, you can define policies for your Azure subscriptions, which can be tailored to the type of workload or the sensitivity of data.
119119

120-
Defenders for Cloud policies contain the following components:
120+
Defender for Cloud policies contain the following components:
121121

122122
- [Data collection](monitoring-components.md): agent provisioning and data collection settings.
123123

‎articles/defender-for-cloud/defender-for-containers-aws-remove.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ai-usage: ai-assisted
1010

1111
This article explains how to remove Defender for Containers from your EKS clusters and AWS environment. Follow these steps when you need to completely uninstall the service or troubleshoot deployment issues.
1212

13-
When you enable Defender for Containers capabilities that use automatic provisioning, or use recommendations to manually deploy container capabilities on specific resources, you install Defender components and extensions in your environment. To help you keep track of these components, the following sections provide tables that show the Defender for Clouds feature and its installed Defender for Container components, extensions, and roles.
13+
When you enable Defender for Containers capabilities that use automatic provisioning, or use recommendations to manually deploy container capabilities on specific resources, you install Defender components and extensions in your environment. To help you keep track of these components, the following sections provide tables that show the Defender for Cloud's feature and its installed Defender for Container components, extensions, and roles.
1414

1515
If you decide to stop using those capabilities, you might also want to remove these components from your environment. This article helps you understand the actions you can take to remove them.
1616

‎articles/defender-for-cloud/defender-for-containers-azure-remove.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ai-usage: ai-assisted
1010

1111
This article explains how to disable and remove Defender for Containers from your AKS environment.
1212

13-
When you enable Defender for Containers capabilities that use automatic provisioning, or use recommendations to manually deploy container capabilities on specific resources, you install Defender components and extensions in your environment. To help you keep track of these components, the following sections provide tables that show the Defender for Clouds feature and its installed Defender for Container components, extensions, and roles.
13+
When you enable Defender for Containers capabilities that use automatic provisioning, or use recommendations to manually deploy container capabilities on specific resources, you install Defender components and extensions in your environment. To help you keep track of these components, the following sections provide tables that show the Defender for Cloud's feature and its installed Defender for Container components, extensions, and roles.
1414

1515
If you decide to stop using those capabilities, you might also want to remove these components from your environment. This article helps you understand the actions you can take to remove them.
1616

‎articles/defender-for-cloud/defender-for-containers-gcp-remove.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ai-usage: ai-assisted
1010

1111
This article explains how to disable and remove Defender for Containers from your GCP GKE environment.
1212

13-
When you enable Defender for Containers capabilities that use automatic provisioning, or use recommendations to manually deploy container capabilities on specific resources, you install Defender components and extensions in your environment. To help you keep track of these components, the following sections provide tables that show the Defender for Clouds feature and its installed Defender for Container components, extensions, and roles.
13+
When you enable Defender for Containers capabilities that use automatic provisioning, or use recommendations to manually deploy container capabilities on specific resources, you install Defender components and extensions in your environment. To help you keep track of these components, the following sections provide tables that show the Defender for Cloud's feature and its installed Defender for Container components, extensions, and roles.
1414

1515
If you decide to stop using those capabilities, you might also want to remove these components from your environment. This article helps you understand the actions you can take to remove them.
1616

‎articles/defender-for-cloud/defender-partner-applications.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ The security scan results from partner applications are available within Defende
2121

2222
## Prerequisites
2323

24-
This feature requires a DevOps connector in Defender for Cloud. See [how to onboard onboard DevOps environments](devops-support.md).
24+
This feature requires a DevOps connector in Defender for Cloud. See [how to onboard DevOps environments](devops-support.md).
2525

2626
| Aspect | Details |
2727
|--|--|

0 commit comments

Comments
 (0)