Skip to content

Commit 5c03d4c

Browse files
Merge branch 'main' into patch-43
2 parents 139c356 + d6ffa06 commit 5c03d4c

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

defender-for-identity/configure-scoped-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ The following table lists the current limitations and supported scenarios for sc
5656

5757
> [!NOTE]
5858
> - Custom roles apply only to new alerts and activities. Alerts and activities triggered before a custom role was created aren't retroactively tagged or filtered.
59-
>
59+
> - The Exposure Management section in the Defender Portal is not visible to users with an MDI scope assignment.
6060
> - Microsoft Entra ID IP alerts aren't included within scoped MDI detections.
6161
6262
|Defender for Identity experience |Scoping by OU's|Scoping by AD domain|

exposure-management/palo-alto-prisma-data-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ First, you need to create a service account with the required permissions to get
3737
To establish a connection with Palo Alto Prisma in Exposure Management, follow these steps:
3838

3939
1. Open the [Exposure Management Connectors](https://security.microsoft.com/exposure-data-connectors) page and click **Connect** in the Palo Alto tile.
40-
2. Enter your Palo Alto API URL and authentication credentials, then click **Connect**.
40+
2. Enter your Palo Alto **Endpoint** and authentication credentials, then click **Connect**.
4141

4242
## Retrieved data
4343

0 commit comments

Comments
 (0)