diff --git a/docs/cloud-native-security/cspm-findings.asciidoc b/docs/cloud-native-security/cspm-findings.asciidoc index 18030af2e3..4ef1a61703 100644 --- a/docs/cloud-native-security/cspm-findings.asciidoc +++ b/docs/cloud-native-security/cspm-findings.asciidoc @@ -32,6 +32,15 @@ You can filter findings data in two ways: * *The KQL search bar*: For example, search for `result.evaluation : failed` to view all failed findings. * *In-table value filters*: Hover over a finding to display available inline actions. Use the Filter In (plus) and Filter Out (minus) buttons. +[discrete] +[[cspm-customize-the-findings-table]] +=== Customize the Findings table +Use the toolbar buttons in the upper-left of the Findings table to customize the columns you want displayed: + +* **Columns**: Select which columns to display. +* **_x_ fields sorted**: Sort the table by one or more columns. + + [discrete] [[cspm-findings-page-remediate-findings]] == Remediate failed findings diff --git a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc index b459bff2de..eac81e4f6c 100644 --- a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc +++ b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc @@ -5,7 +5,7 @@ [[cspm-overview-gcp]] == Overview -This page explains how to get started monitoring the security posture of your cloud assets using the Cloud Security Posture Management (CSPM) feature. +This page explains how to get started monitoring the security posture of your GCP cloud assets using the Cloud Security Posture Management (CSPM) feature. .Requirements [sidebar] @@ -36,7 +36,7 @@ To set up CSPM for GCP, first add the CSPM integration, then enable cloud accoun [discrete] [[cspm-set-up-cloud-access-section-gcp]] === Set up cloud account access -To setup CSPM for a GCP project, you will need to have admin privileges for the project. +To setup CSPM for a GCP project, you will need admin privileges for the project. For most users, the simplest option is to use a Google Cloud Shell script to automatically provision the necessary resources and permissions in your GCP account. This method, as well as two manual options, are described below. diff --git a/docs/cloud-native-security/images/cnvm-findings-grouped.png b/docs/cloud-native-security/images/cnvm-findings-grouped.png index 0f1525f725..b00ab2069a 100644 Binary files a/docs/cloud-native-security/images/cnvm-findings-grouped.png and b/docs/cloud-native-security/images/cnvm-findings-grouped.png differ diff --git a/docs/cloud-native-security/images/cnvm-findings-page.png b/docs/cloud-native-security/images/cnvm-findings-page.png index f55908df66..93064172d7 100644 Binary files a/docs/cloud-native-security/images/cnvm-findings-page.png and b/docs/cloud-native-security/images/cnvm-findings-page.png differ diff --git a/docs/cloud-native-security/images/findings-page.png b/docs/cloud-native-security/images/findings-page.png index ecddcf3485..ccbf09f2e1 100644 Binary files a/docs/cloud-native-security/images/findings-page.png and b/docs/cloud-native-security/images/findings-page.png differ diff --git a/docs/cloud-native-security/kspm-findings.asciidoc b/docs/cloud-native-security/kspm-findings.asciidoc index f060170b97..6531034670 100644 --- a/docs/cloud-native-security/kspm-findings.asciidoc +++ b/docs/cloud-native-security/kspm-findings.asciidoc @@ -32,6 +32,15 @@ You can filter findings data in two ways: * *The KQL search bar*: For example, search for `result.evaluation : failed` to view all failed findings. * *In-table value filters*: Hover over a finding to display available inline actions. Use the Filter In (plus) and Filter Out (minus) buttons. +[discrete] +[[kspm-customize-the-findings-table]] +=== Customize the Findings table +Use the toolbar buttons in the upper-left of the Findings table to customize the columns you want displayed: + +* **Columns**: Select which columns to display. +* **_x_ fields sorted**: Sort the table by one or more columns. + + [discrete] [[findings-page-remediate-findings]] == Remediate failed findings diff --git a/docs/cloud-native-security/vuln-management-findings.asciidoc b/docs/cloud-native-security/vuln-management-findings.asciidoc index af5808c650..bd77b1ff02 100644 --- a/docs/cloud-native-security/vuln-management-findings.asciidoc +++ b/docs/cloud-native-security/vuln-management-findings.asciidoc @@ -36,6 +36,14 @@ Click a vulnerability to open the vulnerability details flyout. This flyout incl When you open the vulnerability details flyout, it defaults to the *Overview* tab, which highlights key information. To view every field present in the vulnerability document, select the *Table* or *JSON* tabs. +[discrete] +[[cnvm-customize-the-findings-table]] +=== Customize the Findings table +Use the toolbar buttons in the upper-left of the Findings table to customize the columns you want displayed: + +* **Columns**: Select which columns to display. +* **_x_ fields sorted**: Sort the table by one or more columns. + [discrete] [[vuln-findings-remediate]] == Remediate vulnerabilities diff --git a/docs/getting-started/security-ui.asciidoc b/docs/getting-started/security-ui.asciidoc index 966d727d2a..548f97e223 100644 --- a/docs/getting-started/security-ui.asciidoc +++ b/docs/getting-started/security-ui.asciidoc @@ -118,7 +118,7 @@ image::detections/images/alert-page.png[] [float] === Findings -Compare your Kubernetes infrastructure against a variety of security benchmarks. Refer to the <> to find out how to set this up. +Identify misconfigurations and vulnerabilities in your cloud infrastructure. For setup instructions, refer to <>, <>, or <>. [role="screenshot"] image::cloud-native-security/images/findings-page.png[Findings page]