Be sure that all required intermediate certificates are mounted within the server to form a whole chain of believe in.authentication methods may be used for authentication to storage accounts for trusted workspace access in shortcuts, pipelines, and shortcuts.This extension enables Defender for Cloud to proactively attest and watch the boot integri