Skip to content

Commit d3f8439

Browse files
committed
update examples
1 parent e98c4ee commit d3f8439

15 files changed

+31
-30
lines changed

src/SecurityInsights/SecurityInsights.Autorest/Properties/AssemblyInfo.cs

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,3 +24,4 @@
2424
[assembly: System.Reflection.AssemblyVersionAttribute("3.2.0")]
2525
[assembly: System.Runtime.InteropServices.ComVisibleAttribute(false)]
2626
[assembly: System.CLSCompliantAttribute(false)]
27+

src/SecurityInsights/SecurityInsights.Autorest/docs/Get-AzSentinelEntity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,8 +67,8 @@ This command gets an Entity.
6767

6868
### Example 3: Get a Entity by object Id
6969
```powershell
70-
$Entitys = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName"
71-
$Entitys[0] | Get-AzSentinelEntity
70+
$Entities = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName"
71+
$Entities[0] | Get-AzSentinelEntity
7272
```
7373

7474
```output

src/SecurityInsights/SecurityInsights.Autorest/docs/Get-AzSentinelEntityInsight.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ This command gets insights for an Entity for a given time range.
5252
```powershell
5353
$startTime = (Get-Date).AddDays(-7).ToUniversalTime() | Get-Date -Format "yyyy-MM-ddThh:00:00.000Z"
5454
$endTime = (Get-Date).ToUniversalTime() | Get-Date -Format "yyyy-MM-ddThh:00:00.000Z"
55-
$Entity = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName" -EntityId "8d036a2d-f37d-e936-6cca-4e172687cb79"
55+
$Entity = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName" -EntityId "00001111-aaaa-2222-bbbb-3333cccc4444"
5656
$Entity | Get-AzSentinelEntityInsight -EndTime $endTime -StartTime $startTime
5757
```
5858

src/SecurityInsights/SecurityInsights.Autorest/docs/New-AzSentinelAlertRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ This command creates an Alert Rule of the MicrosoftSecurityIncidentCreation kind
9595

9696
### Example 5: Create a Scheduled Alert Rule
9797
```powershell
98-
New-AzSentinelAlertRule -ResourceGroupName "myResourceGroup" -WorkspaceName "myWorkspaceName" -Kind Scheduled -Enabled -DisplayName "Powershell Exection Alert (Several Times per Hour)" -Severity Low -Query "SecurityEvent | where EventId == 4688" -QueryFrequency (New-TimeSpan -Hours 1) -QueryPeriod (New-TimeSpan -Hours 1) -TriggerThreshold 10
98+
New-AzSentinelAlertRule -ResourceGroupName "myResourceGroup" -WorkspaceName "myWorkspaceName" -Kind Scheduled -Enabled -DisplayName "Powershell Execution Alert (Several Times per Hour)" -Severity Low -Query "SecurityEvent | where EventID == 4688" -QueryFrequency (New-TimeSpan -Hours 1) -QueryPeriod (New-TimeSpan -Hours 1) -TriggerThreshold 10
9999
```
100100

101101
This command creates an Alert Rule of the Scheduled kind.

src/SecurityInsights/SecurityInsights.Autorest/docs/New-AzSentinelIncidentTeam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Create a Microsoft team to investigate the incident by sharing information and i
4848
Description :
4949
Name : Incident : NewIncident3
5050
PrimaryChannelUrl : https://teams.microsoft.com/l/team/19:vYoGjeGlZmTEDmu0gTbrk9T_eDS4pKIkEU7UuM1IyZk1%40thread.tacv2/conversations?groupId=3c637cc5-caf1-46c7-93ac-069c6
51-
4b05395&tenantId=8f21ced5-2eff-4f8d-aff1-4dbb4cee8e3d
51+
4b05395&tenantId=00001111-aaaa-2222-bbbb-3333cccc4444
5252
TeamCreationTimeUtc : 2/4/2022 3:02:03 PM
5353
TeamId : 3c637cc5-caf1-46c7-93ac-069c64b05395
5454
```

src/SecurityInsights/SecurityInsights.Autorest/examples/Get-AzSentinelEntity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,8 @@ This command gets an Entity.
2828

2929
### Example 3: Get a Entity by object Id
3030
```powershell
31-
$Entitys = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName"
32-
$Entitys[0] | Get-AzSentinelEntity
31+
$Entities = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName"
32+
$Entities[0] | Get-AzSentinelEntity
3333
```
3434
```output
3535
FriendlyName : WIN2019

src/SecurityInsights/SecurityInsights.Autorest/examples/Get-AzSentinelEntityInsight.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This command gets insights for an Entity for a given time range.
1818
```powershell
1919
$startTime = (Get-Date).AddDays(-7).ToUniversalTime() | Get-Date -Format "yyyy-MM-ddThh:00:00.000Z"
2020
$endTime = (Get-Date).ToUniversalTime() | Get-Date -Format "yyyy-MM-ddThh:00:00.000Z"
21-
$Entity = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName" -EntityId "8d036a2d-f37d-e936-6cca-4e172687cb79"
21+
$Entity = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName" -EntityId "00001111-aaaa-2222-bbbb-3333cccc4444"
2222
$Entity | Get-AzSentinelEntityInsight -EndTime $endTime -StartTime $startTime
2323
```
2424
```output

src/SecurityInsights/SecurityInsights.Autorest/examples/New-AzSentinelAlertRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ This command creates an Alert Rule of the MicrosoftSecurityIncidentCreation kind
3232

3333
### Example 5: Create a Scheduled Alert Rule
3434
```powershell
35-
New-AzSentinelAlertRule -ResourceGroupName "myResourceGroup" -WorkspaceName "myWorkspaceName" -Kind Scheduled -Enabled -DisplayName "Powershell Exection Alert (Several Times per Hour)" -Severity Low -Query "SecurityEvent | where EventId == 4688" -QueryFrequency (New-TimeSpan -Hours 1) -QueryPeriod (New-TimeSpan -Hours 1) -TriggerThreshold 10
35+
New-AzSentinelAlertRule -ResourceGroupName "myResourceGroup" -WorkspaceName "myWorkspaceName" -Kind Scheduled -Enabled -DisplayName "Powershell Execution Alert (Several Times per Hour)" -Severity Low -Query "SecurityEvent | where EventID == 4688" -QueryFrequency (New-TimeSpan -Hours 1) -QueryPeriod (New-TimeSpan -Hours 1) -TriggerThreshold 10
3636
```
3737

3838
This command creates an Alert Rule of the Scheduled kind. Please note that that query (parameter -Query) needs to be on a single line as as string.

src/SecurityInsights/SecurityInsights.Autorest/examples/New-AzSentinelIncidentTeam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
Description :
88
Name : Incident : NewIncident3
99
PrimaryChannelUrl : https://teams.microsoft.com/l/team/19:vYoGjeGlZmTEDmu0gTbrk9T_eDS4pKIkEU7UuM1IyZk1%40thread.tacv2/conversations?groupId=3c637cc5-caf1-46c7-93ac-069c6
10-
4b05395&tenantId=8f21ced5-2eff-4f8d-aff1-4dbb4cee8e3d
10+
4b05395&tenantId=00001111-aaaa-2222-bbbb-3333cccc4444
1111
TeamCreationTimeUtc : 2/4/2022 3:02:03 PM
1212
TeamId : 3c637cc5-caf1-46c7-93ac-069c64b05395
1313
```
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
{
2-
"generate_Id": "496dabe7-a21a-4aa9-89cb-d1cf3d594335"
2+
"generate_Id": "c4f99f0d-5aec-4d01-96cc-b028f40fbd48"
33
}

0 commit comments

Comments
 (0)