Skip to content

Commit 5e43e21

Browse files
committed
f
1 parent 0ef4ea6 commit 5e43e21

3 files changed

Lines changed: 0 additions & 3 deletions

File tree

src/pentesting-cloud/azure-security/az-services/az-defender.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,4 +36,3 @@ Moreover, the continuous monitoring can also show **changes in the exposed infra
3636
By delivering real-time insights and detailed asset inventories, Defender EASM empowers organizations to **continuously monitor and track changes to their external exposure**. It uses risk-based analysis to prioritize findings based on severity and contextual factors, ensuring that remediation efforts are focused where they matter most. This proactive approach not only helps in uncovering hidden vulnerabilities but also supports the continuous improvement of your overall security posture by alerting you to any new exposures as they emerge.
3737

3838
{{#include ../../../banners/hacktricks-training.md}}
39-

src/pentesting-cloud/azure-security/az-services/az-monitoring.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,4 +106,3 @@ az monitor activity-log alert list --output table
106106
```
107107

108108
{{#include ../../../banners/hacktricks-training.md}}
109-

src/pentesting-cloud/azure-security/az-services/az-sentinel.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,4 +43,3 @@ You start by enabling Sentinel on an Azure Log Analytics workspace (the workspac
4343

4444

4545
{{#include ../../../banners/hacktricks-training.md}}
46-

0 commit comments

Comments
 (0)