Skip to content

Commit d315dad

Browse files
committed
Fixed acrolinx issues in YML files
1 parent c5e141a commit d315dad

5 files changed

Lines changed: 9 additions & 9 deletions

File tree

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.explore-multicloud-connectivity-model
33
metadata:
4-
title: Explore the Defender for Cloud multi-cloud connectivity model
5-
description: Learn how CSPM and CWPP coverage layers work, what federated authentication means for AWS and GCP connectors, and what becomes available after connecting each environment type.
4+
title: Explore the Defender for Cloud multicloud connectivity model
5+
description: Learn how Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) coverage layers work. Explore what federated authentication means for AWS and GCP connectors, and what becomes available after connecting each environment type.
66
ms.date: 04/01/2026
77
author: r-c-stewart
88
ms.author: roberts
99
ms.topic: unit
1010
ai-usage: ai-generated
11-
title: Explore the Defender for Cloud multi-cloud connectivity model
11+
title: Explore the Defender for Cloud multicloud connectivity model
1212
durationInMinutes: 8
1313
content: |
1414
[!include[](includes/2-explore-multicloud-connectivity-model.md)]
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.plan-connector-strategy
33
metadata:
4-
title: Plan a connector strategy for hybrid and multi-cloud environments
4+
title: Plan a connector strategy for hybrid and multicloud environments
55
description: Plan connector scope, scan interval, permission model, and deployment path for on-premises, AWS, and GCP environments in Microsoft Defender for Cloud.
66
ms.date: 04/01/2026
77
author: r-c-stewart
88
ms.author: roberts
99
ms.topic: unit
1010
ai-usage: ai-generated
11-
title: Plan a connector strategy for hybrid and multi-cloud environments
11+
title: Plan a connector strategy for hybrid and multicloud environments
1212
durationInMinutes: 8
1313
content: |
1414
[!include[](includes/3-plan-connector-strategy.md)]
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.connect-hybrid-multicloud-environments-defender.verify-multicloud-coverage
33
metadata:
4-
title: Verify multi-cloud coverage and validate protection
5-
description: Verify multi-cloud connector health, confirm CSPM recommendations and compliance standards are active, and validate CWPP plan activation across on-premises, AWS, and GCP environments.
4+
title: Verify multicloud coverage and validate protection
5+
description: Verify multicloud connector health, confirm CSPM recommendations and compliance standards are active, and validate CWPP plan activation across on-premises, AWS, and GCP environments.
66
ms.date: 04/01/2026
77
author: r-c-stewart
88
ms.author: roberts
99
ms.topic: unit
1010
ai-usage: ai-generated
11-
title: Verify multi-cloud coverage and validate protection
11+
title: Verify multicloud coverage and validate protection
1212
durationInMinutes: 6
1313
content: |
1414
[!include[](includes/7-verify-multicloud-coverage.md)]

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/includes/2-explore-multicloud-connectivity-model.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The authentication flow works as follows. Defender for Cloud requests a token fr
3838

3939
AWS performs audience, signature, thumbprint, and role-level checks before issuing credentials, ensuring only the specific Microsoft-managed application can assume the connector role.
4040

41-
:::image type="content" source="../media/amazon-auth-sequence.png" alt-text="Sequence diagram of the AWS federated auth flow: Defender for Cloud exchanges a Microsoft Entra token with AWS STS for temporary credentials, then calls AWS APIs. No credentials are stored.":::
41+
:::image type="content" source="../media/amazon-authentication-sequence.png" alt-text="Sequence diagram of the AWS federated auth flow: Defender for Cloud exchanges a Microsoft Entra token with AWS STS for temporary credentials, then calls AWS APIs. No credentials are stored.":::
4242

4343
This architecture means that even if an attacker gained access to the Azure environment, there are no stored AWS credentials to exfiltrate. The trust is used by the specific Microsoft-managed application, during a valid authentication transaction.
4444

learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/media/amazon-auth-sequence.png renamed to learn-pr/wwl-sci/connect-hybrid-multicloud-environments-defender/media/amazon-authentication-sequence.png

File renamed without changes.

0 commit comments

Comments
 (0)