diff --git a/defender-xdr/investigate-respond-container-threats.md b/defender-xdr/investigate-respond-container-threats.md
index fb591e6570..ec81b298d3 100644
--- a/defender-xdr/investigate-respond-container-threats.md
+++ b/defender-xdr/investigate-respond-container-threats.md
@@ -18,7 +18,8 @@ search.appverid:
- MET150
ms.date: 11/18/2024
appliesto:
-- Microsoft Defender XDR
+- ✅ Microsoft Defender XDR
+- Microsoft's unified security operations platform
---
# Investigate and respond to container threats in the Microsoft Defender portal
@@ -99,11 +100,7 @@ To determine the full scope of a container attack, you can deepen your investiga
In the [Advanced hunting](advanced-hunting-overview.md) page, you can extend your search for container-related activities using the **CloudProcessEvents** and **CloudAuditEvents** tables.
-:::image type="content" source="/defender/media/defender-containers/adv-hunting-cloud-small.png" alt-text="Highlighting the advanced hunting tables related to cloud events." lightbox="/defender/media/defender-containers/adv-hunting-cloud.png":::
-
-The **CloudProcessEvents** table contains information about process events in multi-cloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine.
-
-The **CloudAuditEvents table** contains cloud audit events from cloud platforms protected by Microsoft Defender for Cloud. It also contains Kubeaudit logs, which holds information about Kubernetes-related events.
+The [CloudProcessEvents](advanced-hunting-cloudprocessevents-table.md) table contains information about process events in multi-cloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine. On the other hand, the [CloudAuditEvents](advanced-hunting-cloudauditevents-table.md) table contains cloud audit events from cloud platforms protected by Microsoft Defender for Cloud. It also contains Kubeaudit logs, which holds information about Kubernetes-related events.
## See also