|
2 | 2 | title: Transition to Microsoft Defender Vulnerability Management |
3 | 3 | description: Learn how to transition to Microsoft Defender Vulnerability Management in Microsoft Defender for Cloud. |
4 | 4 | ms.topic: how-to |
5 | | -ms.date: 01/07/2024 |
| 5 | +ms.date: 01/08/2024 |
6 | 6 | --- |
7 | 7 |
|
8 | 8 | # Transition to Microsoft Defender Vulnerability Management |
@@ -65,19 +65,19 @@ To disable the above Qualys recommendations for national clouds (Azure Governmen |
65 | 65 |
|
66 | 66 | 1. Go to **Environment settings** and select the relevant subscription you want to disable the recommendation on. |
67 | 67 |
|
68 | | - :::image type="content" source="media/transition-to-defender-vulnerability-management/environment-settings.png" alt-text="Description of how to select subscription in environment settings." lightbox="media/transition-to-defender-vulnerability-management/environment-settings.png"::: |
| 68 | + :::image type="content" source="media/transition-to-defender-vulnerability-management/environment-settings.png" alt-text="Screenshot showing how to select subscription in environment settings." lightbox="media/transition-to-defender-vulnerability-management/environment-settings.png"::: |
69 | 69 |
|
70 | 70 | 1. In the **Settings** pane, go to **Security policy**, and select the initiative assignment. |
71 | 71 |
|
72 | | - :::image type="content" source="media/transition-to-defender-vulnerability-management/security-policy.png" alt-text="Image of security policy settings."::: |
| 72 | + :::image type="content" source="media/transition-to-defender-vulnerability-management/security-policy.png" alt-text="Screenshot of security policy settings." lightbox="media/transition-to-defender-vulnerability-management/security-policy.png"::: |
73 | 73 |
|
74 | 74 | 1. Search for the Qualys recommendation and select **Manage effect and parameters**. |
75 | 75 |
|
76 | | - :::image type="content" source="media/transition-to-defender-vulnerability-management/qualys-recommendation.png" alt-text="Image of Qualys recommendation." lightbox="media/transition-to-defender-vulnerability-management/qualys-recommendation.png"::: |
| 76 | + :::image type="content" source="media/transition-to-defender-vulnerability-management/qualys-recommendation.png" alt-text="Screenshot of Qualys recommendation." lightbox="media/transition-to-defender-vulnerability-management/qualys-recommendation.png"::: |
77 | 77 |
|
78 | 78 | 1. Change to **Disabled**. |
79 | 79 |
|
80 | | - :::image type="content" source="media/transition-to-defender-vulnerability-management/select-disabled.png" alt-text="Image of disable button."::: |
| 80 | + :::image type="content" source="media/transition-to-defender-vulnerability-management/select-disabled.png" alt-text="Screenshot of disable button." lightbox="media/transition-to-defender-vulnerability-management/select-disabled.png"::: |
81 | 81 |
|
82 | 82 | ## Step 3: (optional) Update REST API and Azure Resource Graph queries |
83 | 83 |
|
|
0 commit comments