Skip to content

Commit 162bb7a

Browse files
authored
Update azure-sentinel.md
1 parent ea88468 commit 162bb7a

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory-b2c/azure-sentinel.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.subservice: B2C
1919

2020
Increase the security of your Azure Active Directory B2C (Azure AD B2C) environment by routing logs and audit information to Microsoft Sentinel. The scalable Microsoft Sentinel is a cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. Use the solution for alert detection, threat visibility, proactive hunting, and threat response for Azure AD B2C.
2121

22-
Lear more:
22+
Learn more:
2323

2424
* [What is Microsoft Sentinel?](../sentinel/overview.md)
2525
* [What is SOAR?](https://www.microsoft.com/security/business/security-101/what-is-soar)
@@ -91,7 +91,7 @@ Use the following steps to receive notification about two or more unsuccessful,
9191

9292
![Screenshot of the Create option under Analytics.](./media/azure-sentinel/create-scheduled-rule.png)
9393

94-
3. In the Analytics Rule wizard, go to the **General**.
94+
3. In the Analytics Rule wizard, go to **General**.
9595
4. For **Name**, enter a name for unsuccessful logins.
9696
5. For **Description**, indicate the rule notifies for two or more unsuccessful sign-ins, within 60 seconds.
9797
6. For **Tactics**, select a category. For example, select **PreAttack**.

0 commit comments

Comments
 (0)