Skip to content

Commit 32a96f8

Browse files
authored
Apply suggestions from code review
1 parent 917e9ca commit 32a96f8

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/sentinel/data-connectors/threat-intelligence-upload-indicators-api.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,13 +36,13 @@ ThreatIntelligenceIndicator
3636
You can connect your threat intelligence data sources to Microsoft Sentinel by either:
3737

3838

39-
>Using an integrated Threat Intelligence Platform (TIP), such as Threat Connect, Palo Alto Networks MineMeld, MISP, and others.
39+
- Using an integrated Threat Intelligence Platform (TIP), such as Threat Connect, Palo Alto Networks MineMeld, MISP, and others.
4040

41-
>Calling the Microsoft Sentinel data plane API directly from another application.
41+
- Calling the Microsoft Sentinel data plane API directly from another application.
4242

4343
Follow These Steps to Connect to your Threat Intelligence:
4444

45-
1. Get AAD Access Token
45+
Get AAD Access Token
4646

4747
To send request to the APIs, you need to acquire Azure Active Directory access token. You can follow instruction in this page: [Get Azure AD tokens for users by using MSAL](/azure/databricks/dev-tools/api/latest/aad/app-aad-token#get-an-azure-ad-access-token).
4848
- Notice: Please request AAD access token with appropriate scope value.

0 commit comments

Comments
 (0)