diff --git a/Labs/Modules/Module-13-Defender for APIs.md b/Labs/Modules/Module-13-Defender for APIs.md
index 057a3fa61..3723219e6 100644
--- a/Labs/Modules/Module-13-Defender for APIs.md
+++ b/Labs/Modules/Module-13-Defender for APIs.md
@@ -4,7 +4,7 @@
#### đ Level: 300 (Advanced)
#### â Estimated time to complete this lab: 120 minutes
-#### đ Author: Liana Anca Tomescu
+#### đ Author: Walner Dort
## Objectives
@@ -87,14 +87,15 @@ Note: It will take up to 45 minutes for the API you just created to appear in De
4. Under Cloud Workload protections, ensure that the APIs plan is switched **On**.
- ![](../Images/api7new.png?raw=true)
+ ![](../Images/api7.png?raw=true)
### Exercise 4: ONBOARD APIS TO DEFENDER FOR APIS
Next, you will onboard that API to be protected by Defender for API.
1. Navigate to the **Recommendations** pane in Microsoft Defender for Cloud
-2. Under the category âEnable enhanced security featuresâ select the recommendation **Azure API Management APIs should be onboarded to Defender for APIs**.
+2. Type "Defender for APIs" within the search box and select the recommendation **Azure API Management APIs should be onboarded to Defender for APIs**.
+
+
-![](../Images/api8.png?raw=true)
3. In the recommendation **Azure API Management APIs should be onboarded to Defender for APIs**, tick the box of the API labs-test and echo-api that you would like to onboard, and click **Fix**.
@@ -152,13 +153,11 @@ Next, you will explore other Defender for API recommendations.
![](../Images/api17.png?raw=true)
-4. Expand **Manage access and permissions, Enable enhanced security features and Implement security best practices**, to see the API recommendations that belong to these controls.
+4. Select the recommendation **API Management services should use a virtual network**.
+
+
-
-![](../Images/api18.png?raw=true)
-
-5. Select the recommendation **API Management services should use a virtual network**.
-6. Explore this recommendation by looking at whatâs displayed, such as **Unhealthy resources**.
+5. Explore this recommendation by looking at whatâs displayed, such as **Unhealthy resources**.
![](../Images/api19.png?raw=true)
@@ -227,52 +226,3 @@ After some time, Defender for APIs will trigger an alert with detailed informati
![](../Images/api28.png?raw=true)
Now you have successfully tested out Defender for API and triggered an alert.
-
-### Exercise 7: EXPLORE THE DATA CLASSIFICATIONS COMING FROM MICROSOFT PURVIEW IN THE DEFENDER FOR API TILE
-PREREQUISITE: Follow the [Microsoft Purview guidance](https://learn.microsoft.com/en-us/purview/sensitivity-insights) to enable sensitive data labels and data classifications for the API **API labs-test** in Microsoft Purview.
-
-1. Navigate to the Microsoft Defender for Cloudâs **Workload Protections** pane (from the left-hand navigation bar).
-
-![](../Images/api10.png?raw=true)
-
-2. In the bottom part of the blade, under Advanced protection section, click the **API Security** tile at the bottom right.
-
-
-![](../Images/api11.png?raw=true)
-
-3. Select the **API labs-test**.
-
-
-![](../Images/api12.png?raw=true)
-
-
-4. Notice how the data sensitivity labels and data classification is now coming from what you enabled in Microsoft Purview.
-
-![](../Images/purviewlabels.png?raw=true)
-
-
-5. Select **GetSessions** endpoint name that you tested in Exercise 2 to see this endpointâs **Resource Health** page.
-
-![](../Images/api13.png?raw=true)
-
-5. Explore the **Resource Health** page. Notice how the information available is the same as the information obtained from Microsoft Purview.
-
-![](../Images/api14.png?raw=true)
-
-
-## Exercise 8: Build query with Cloud Security Explorer
-1. Open **Azure Portal** and navigate to **Microsoft Defender for Cloud** blade.
-2. From Defender for Cloud's menu, open the **Cloud Security Explorer** page
-
-![](../Images/apidcspm.png?raw=true)
-
-3. Under Query templates, select a predefined query template **APIs communicating over unencrypted protocols with unauthenticated API endpoints** and click on **Open query**.
-
-![](../Images/api29.png?raw=true)
-
-4. Scroll to the top of the page, and hit **Search**.
-
-![](../Images/api30.png?raw=true)
-
-5. You will find the list of APIs that do not use TLS/SSL encryption, which are communicating with API endpoints that do not have any detected authentication.
-