Skip to content

Commit ae2c49d

Browse files
Fix Markdown syntax issues
1 parent 4c2881f commit ae2c49d

1 file changed

Lines changed: 17 additions & 14 deletions

File tree

README.md

Lines changed: 17 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,9 @@ Last updated: 2026-03-19
1717

1818
- [Microsoft Foundry SDKs and Endpoints](https://learn.microsoft.com/en-us/azure/ai-foundry/how-to/develop/sdk-overview?view=foundry&pivots=programming-language-python)
1919
- Microsoft Defender for Cloud (DevOps security):
20-
- [Connect GitHub to Defender for Cloud](https://learn.microsoft.com/azure/defender-for-cloud/quickstart-onboard-github)
21-
- [Connect Azure DevOps to Defender for Cloud](https://learn.microsoft.com/azure/defender-for-cloud/quickstart-onboard-devops)
22-
- [DevOps security permissions and prerequisites](https://learn.microsoft.com/azure/defender-for-cloud/devops-support)
20+
- [Connect GitHub to Defender for Cloud](https://learn.microsoft.com/azure/defender-for-cloud/quickstart-onboard-github)
21+
- [Connect Azure DevOps to Defender for Cloud](https://learn.microsoft.com/azure/defender-for-cloud/quickstart-onboard-devops)
22+
- [DevOps security permissions and prerequisites](https://learn.microsoft.com/azure/defender-for-cloud/devops-support)
2323

2424
</details>
2525

@@ -29,7 +29,7 @@ Last updated: 2026-03-19
2929
- [Deployment Approaches (pick one)](#deployment-approaches-pick-one)
3030
- [Key Features](#key-features)
3131
- [More Security with Microsoft Defender](#more-security-with-microsoft-defender)
32-
- [If the Azure portal blade errors](#if-the-azure-portal-blade-errors)
32+
- [If the Azure portal blade errors](#if-the-azure-portal-blade-errors)
3333
- [About A2A Protocol](#about-a2a-protocol)
3434
- [Architecture](#architecture)
3535
- [What Happens Under the Hood](#what-happens-under-the-hood)
@@ -54,12 +54,12 @@ Last updated: 2026-03-19
5454
## Deployment Approaches (pick one)
5555

5656
- **Container Apps (recommended default in this repo)**
57-
- In `terraform-infrastructure/terraform.tfvars`: set `deployment_target = "containerapps"`
58-
- Run: `cd terraform-infrastructure` then `terraform apply -var-file terraform.tfvars`
57+
- In `terraform-infrastructure/terraform.tfvars`: set `deployment_target = "containerapps"`
58+
- Run: `cd terraform-infrastructure` then `terraform apply -var-file terraform.tfvars`
5959

6060
- **App Service (Linux custom container)**
61-
- In `terraform-infrastructure/terraform.tfvars`: set `deployment_target = "appservice"` and choose `app_service_sku` (e.g. `P0v3`)
62-
- Run: `cd terraform-infrastructure` then `terraform apply -var-file terraform.tfvars`
61+
- In `terraform-infrastructure/terraform.tfvars`: set `deployment_target = "appservice"` and choose `app_service_sku` (e.g. `P0v3`)
62+
- Run: `cd terraform-infrastructure` then `terraform apply -var-file terraform.tfvars`
6363

6464
## Key Features
6565

@@ -80,6 +80,7 @@ Last updated: 2026-03-19
8080

8181
> [!NOTE]
8282
> Visibility-first rollout (recommended for demos):
83+
>
8384
> - Onboard **GitHub connector only** first to validate the Defender dashboards/workbooks.
8485
> - Onboard **Azure DevOps connector** only in a **sandbox org/project**.
8586
> - Keep **PR annotations OFF** initially (no write-back to PRs) until you decide to enable them.
@@ -104,18 +105,19 @@ This repo supports two complementary “Defender” scenarios:
104105

105106
> [!NOTE]
106107
> Opt out (disable Defender): In [terraform-infrastructure/terraform.tfvars](terraform-infrastructure/terraform.tfvars), set:
107-
> - `enable_defender_for_cloud = false`
108-
> - `enable_defender_devops_security = false`
108+
>
109+
> - `enable_defender_for_cloud = false`
110+
> - `enable_defender_devops_security = false`
109111
110112
### If the Azure portal blade errors
111113

112114
> If the Azure portal **Defender for Cloud → Environment settings** page fails to load with an error like: `ECS feature flags for project 'Defenders' are not initialized (ErrorAcquiringViewModel)`. Use one of these workarounds:
113115
114116
- **Open the connector resource directly** (bypasses the Environment Settings blade):
115-
- Find the connector resource IDs from Terraform outputs (look for `defender_devops_security_connector_ids`).
116-
- Open in the portal using this pattern:
117-
- `https://portal.azure.com/#resource/<connector-resource-id>/overview`
118-
- Example: `.../providers/Microsoft.Security/securityConnectors/github-connector`
117+
- Find the connector resource IDs from Terraform outputs (look for `defender_devops_security_connector_ids`).
118+
- Open in the portal using this pattern:
119+
- `https://portal.azure.com/#resource/<connector-resource-id>/overview`
120+
- Example: `.../providers/Microsoft.Security/securityConnectors/github-connector`
119121
- **List the connector IDs via CLI** (then open them with the URL above): `az resource list -g <rg-name> --resource-type Microsoft.Security/securityConnectors -o table`
120122
- **Browser reset**: try InPrivate/Incognito, disable extensions (ad blockers), and sign out/in.
121123

@@ -156,6 +158,7 @@ This repo supports two complementary “Defender” scenarios:
156158

157159
> [!IMPORTANT]
158160
> A2A vs the default deployed chat runtime:
161+
>
159162
> - **A2A server path**: event/task oriented framework under `src/a2a/` (only available if you deploy/run that server)
160163
> - **Default path**: `/ws` WebSocket chat + routing + sequential handoffs to real Foundry agents (no event queue required for the default flow)
161164

0 commit comments

Comments
 (0)