Skip to content

Commit 0ff32d4

Browse files
author
cabailey
committed
fix list
1 parent 8d99ac6 commit 0ff32d4

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/sentinel/connect-threat-intelligence.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -62,12 +62,12 @@ You can stream threat indicators to Azure Sentinel by using one of the integrate
6262
3. Ask your Azure Active Directory tenant administrator to grant admin consent to the registered application for your organization. From the Azure portal: **Azure Active Directory** > **App registrations** > **\<*app name*>** > **View API Permissions** > **Grant admin consent for \<*tenant name*>**.
6363

6464
4. Configure your TIP product or app that uses direct integration with Microsoft Graph Security tiIndicators API to send indicators to Azure Sentinel by specifying the following:
65-
66-
a. The values for the registered application's ID, secret, and tenant ID.
67-
68-
b. For the target product, specify Azure Sentinel.
69-
70-
c. For the action, specify alert.
65+
66+
a. The values for the registered application's ID, secret, and tenant ID.
67+
68+
b. For the target product, specify Azure Sentinel.
69+
70+
c. For the action, specify alert.
7171

7272
5. In the Azure portal, navigate to **Azure Sentinel** > **Data connectors** and then select the **Threat Intelligence Platforms (Preview)** connector.
7373

0 commit comments

Comments
 (0)