Skip to content

Commit 36a3135

Browse files
committed
Acrolinx
1 parent cc5cd49 commit 36a3135

File tree

3 files changed

+23
-23
lines changed

3 files changed

+23
-23
lines changed

articles/purview/concept-insights.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,32 +22,32 @@ Data Estate Insights are one of the key pillars of Microsoft Purview. The featur
2222

2323
This report gives a bird's eye view of your data estate, and its distribution by source type, by classification and by file size as some of the dimensions. This report caters to different types of stakeholder in the data governance and cataloging roles, who are interested to know state of their DataMap, by classification and file extensions.
2424

25-
The report provides broad insights through graphs and KPIs and later deep dive into specific anomalies such as misplaced files. The report also supports an end-to-end customer experience, where customer can view count of assets with a specific classification, can breakdown the information by source types and top folders, and can also view the list of assets for further investigation.
25+
The report provides broad insights through graphs and KPIs and later deep dive into specific anomalies such as misplaced files. The report also supports an end-to-end customer experience, where customer can view count of assets with a specific classification, can break down the information by source types and top folders, and can also view the list of assets for further investigation.
2626

2727
> [!NOTE]
28-
> File Extension Insights has been merged into Asset Insights with richer trend report showing growth in data size by file extension. Learn more by exploring [Asset Insights](asset-insights.md)
28+
> File Extension Insights has been merged into Asset Insights with richer trend report showing growth in data size by file extension. Learn more by exploring [Asset Insights](asset-insights.md).
2929
3030
## Glossary Insights
3131

32-
This report gives the Data Stewards a status report on glossary. Data Stewards can view this report to understand distribution of glossary terms by status, learn how many glossary terms are attached to assets and how many are not yet attached to any asset. Business users can also learn about completeness of their glossary terms.
32+
This report gives the Data Stewards a status report on glossary. Data Stewards can view this report to understand distribution of glossary terms by status, learn how many glossary terms are attached to assets and how many aren't yet attached to any asset. Business users can also learn about completeness of their glossary terms.
3333

34-
This report summarizes top items that a Data Steward needs to focus on, to create a complete and usable glossary for his/her organization. Stewards can also navigate into the "Glossary" experience from "Glossary Insights" experience, to make changes on a specific glossary term.
34+
This report summarizes top items that a Data Steward needs to focus on, to create a complete and usable glossary for their organization. Stewards can also navigate into the "Glossary" experience from "Glossary Insights" experience, to make changes on a specific glossary term.
3535

3636
## Classification Insights
3737

3838
This report provides details about where classified data is located, the classifications found during a scan, and a drill-down to the classified files themselves. It enables Stewards, Curators and Security Administrators to understand the types of information found in their organization's data estate.
3939

4040
In Microsoft Purview, classifications are similar to subject tags, and are used to mark and identify content of a specific type in your data estate.
4141

42-
Use the Classification Insights report to identify content with specific classifications and understand required actions, such as adding additional security to the repositories, or moving content to a more secure location.
42+
Use the Classification Insights report to identify content with specific classifications and understand required actions, such as adding more security to the repositories, or moving content to a more secure location.
4343

4444
For more information, see [Classification insights about your data from Microsoft Purview](classification-insights.md).
4545

4646
## Sensitivity Labeling Insights
4747

48-
This report provides details about the sensitivity labels found during a scan, as well as a drill-down to the labeled files themselves. It enables security administrators to ensure the security of information found in their organization's data estate.
48+
This report provides details about the sensitivity labels found during a scan, and a drill-down to the labeled files themselves. It enables security administrators to ensure the security of information found in their organization's data estate.
4949

50-
In Microsoft Purview, sensitivity labels are used to identify classification type categories, as well as the group security policies that you want to apply to each category.
50+
In Microsoft Purview, sensitivity labels are used to identify classification type categories, and the group security policies that you want to apply to each category.
5151

5252
Use the Labeling Insights report to identify the sensitivity labels found in your content and understand required actions, such as managing access to specific repositories or files.
5353

articles/purview/register-scan-amazon-rds.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@ For this service, use Microsoft Purview to provide a Microsoft account with secu
2929

3030
- **Supported database engines**: Amazon RDS structured data storage supports multiple database engines. Microsoft Purview supports Amazon RDS with/based on Microsoft SQL and PostgreSQL.
3131

32-
- **Maximum columns supported**: Scanning RDS tables with more than 300 columns is not supported.
32+
- **Maximum columns supported**: Scanning RDS tables with more than 300 columns isn't supported.
3333

34-
- **Public access support**: Microsoft Purview supports scanning only with VPC Private Link in AWS, and does not include public access scanning.
34+
- **Public access support**: Microsoft Purview supports scanning only with VPC Private Link in AWS, and doesn't include public access scanning.
3535

3636
- **Supported regions**: Microsoft Purview only supports Amazon RDS databases that are located in the following AWS regions:
3737

@@ -49,7 +49,7 @@ For this service, use Microsoft Purview to provide a Microsoft account with secu
4949

5050
- **IP address requirements**: Your RDS database must have a static IP address. The static IP address is used to configure AWS PrivateLink, as described in this article.
5151

52-
- **Known issues**: The following functionality is not currently supported:
52+
- **Known issues**: The following functionality isn't currently supported:
5353

5454
- The **Test connection** button. The scan status messages will indicate any errors related to connection setup.
5555
- Selecting specific tables in your database to scan.
@@ -139,7 +139,7 @@ This CloudFormation template is available for download from the [Azure GitHub re
139139

140140
Define your settings as needed for your environment. For more information, select the **Learn more** links to access the AWS documentation. When you're done, select **Next** to continue.
141141

142-
1. On the **Review** page, check to make sure that the values you selected are correct for your environment. Make any changes needed, and then select **Create stack** when you're done.
142+
1. On the **Review** page, check to make sure that the values you selected are correct for your environment. Make any changes needed and then select **Create stack** when you're done.
143143

144144
1. Watch for the resources to be created. When complete, relevant data for this procedure is shown on the following tabs:
145145

@@ -151,7 +151,7 @@ This CloudFormation template is available for download from the [Azure GitHub re
151151

152152
1. In the **Outputs** tab, copy the **ServiceName** key value to the clipboard.
153153

154-
You'll use the value of the **ServiceName** key in the Microsoft Purview portal, when [registering your RDS database](#register-an-amazon-rds-data-source) as Microsoft Purview data source. There, enter the **ServiceName** key in the **Connect to private network via endpoint service** field.
154+
You'll use the value of the **ServiceName** key in the Microsoft Purview governance portal, when [registering your RDS database](#register-an-amazon-rds-data-source) as Microsoft Purview data source. There, enter the **ServiceName** key in the **Connect to private network via endpoint service** field.
155155

156156
## Register an Amazon RDS data source
157157

@@ -469,7 +469,7 @@ After the [Load Balancer is created](#step-4-create-a-load-balancer) and its Sta
469469
470470
<a name="service-name"></a>**To copy the service name for use in Microsoft Purview**:
471471

472-
After you’ve created your endpoint service, you can copy the **Service name** value in the Microsoft Purview portal, when [registering your RDS database](#register-an-amazon-rds-data-source) as Microsoft Purview data source.
472+
After you’ve created your endpoint service, you can copy the **Service name** value in the Microsoft Purview governance portal, when [registering your RDS database](#register-an-amazon-rds-data-source) as Microsoft Purview data source.
473473

474474
Locate the **Service name** on the **Details** tab for your selected endpoint service.
475475

articles/purview/register-scan-amazon-s3.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ For this service, use Microsoft Purview to provide a Microsoft account with secu
3636

3737
## Microsoft Purview scope for Amazon S3
3838

39-
We currently do not support ingestion private endpoints that work with your AWS sources.
39+
We currently don't support ingestion private endpoints that work with your AWS sources.
4040

4141
For more information about Microsoft Purview limits, see:
4242

@@ -45,7 +45,7 @@ For more information about Microsoft Purview limits, see:
4545

4646
### Storage and scanning regions
4747

48-
The Microsoft Purview connector for the Amazon S3 service is currently deployed in specific regions only. The following table maps the regions where you data is stored to the region where it would be scanned by Microsoft Purview.
48+
The Microsoft Purview connector for the Amazon S3 service is currently deployed in specific regions only. The following table maps the regions where your data is stored to the region where it would be scanned by Microsoft Purview.
4949

5050
> [!IMPORTANT]
5151
> Customers will be charged for all related data transfer charges according to the region of their bucket.
@@ -167,7 +167,7 @@ This procedure describes how to create the AWS role, with the required Microsoft
167167

168168
- For buckets that use **AWS-KMS** encryption, [special configuration](#configure-scanning-for-encrypted-amazon-s3-buckets) is required to enable scanning.
169169

170-
- Make sure that your bucket policy does not block the connection. For more information, see:
170+
- Make sure that your bucket policy doesn't block the connection. For more information, see:
171171

172172
- [Confirm your bucket policy access](#confirm-your-bucket-policy-access)
173173
- [Confirm your SCP policy access](#confirm-your-scp-policy-access)
@@ -189,7 +189,7 @@ This procedure describes how to create a new Microsoft Purview credential to use
189189
|Field |Description |
190190
|---------|---------|
191191
|**Name** |Enter a meaningful name for this credential. |
192-
|**Description** |Enter a optional description for this credential, such as `Used to scan the tutorial S3 buckets` |
192+
|**Description** |Enter an optional description for this credential, such as `Used to scan the tutorial S3 buckets` |
193193
|**Authentication method** |Select **Role ARN**, since you're using a role ARN to access your bucket. |
194194
|**Role ARN** | Once you've [created your Amazon IAM role](#create-a-new-aws-role-for-microsoft-purview), navigate to your role in the AWS IAM area, copy the **Role ARN** value, and enter it here. For example: `arn:aws:iam::181328463391:role/S3Role`. <br><br>For more information, see [Retrieve your new Role ARN](#retrieve-your-new-role-arn). |
195195
| | |
@@ -262,14 +262,14 @@ AWS buckets support multiple encryption types. For buckets that use **AWS-KMS**
262262

263263
### Confirm your bucket policy access
264264

265-
Make sure that the S3 bucket [policy](https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-iam-policies.html) does not block the connection:
265+
Make sure that the S3 bucket [policy](https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-iam-policies.html) doesn't block the connection:
266266

267267
1. In AWS, navigate to your S3 bucket, and then select the **Permissions** tab > **Bucket policy**.
268268
1. Check the policy details to make sure that it doesn't block the connection from the Microsoft Purview scanner service.
269269

270270
### Confirm your SCP policy access
271271

272-
Make sure that there is no [SCP policy](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html) that blocks the connection to the S3 bucket.
272+
Make sure that there's no [SCP policy](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html) that blocks the connection to the S3 bucket.
273273

274274
For example, your SCP policy might block read API calls to the [AWS Region](#storage-and-scanning-regions) where your S3 bucket is hosted.
275275

@@ -332,7 +332,7 @@ For example:
332332

333333
## Add a single Amazon S3 bucket as a Microsoft Purview account
334334

335-
Use this procedure if you only have a single S3 bucket that you want to register to Microsoft Purview as a data source, or if you have multiple buckets in your AWS account, but do not want to register all of them to Microsoft Purview.
335+
Use this procedure if you only have a single S3 bucket that you want to register to Microsoft Purview as a data source, or if you have multiple buckets in your AWS account, but don't want to register all of them to Microsoft Purview.
336336

337337
**To add your bucket**:
338338

@@ -460,7 +460,7 @@ Use the other areas of Microsoft Purview to find out details about the content i
460460

461461
- **View Insight reports** to view statistics for the classification, sensitivity labels, file types, and more details about your content.
462462

463-
All Microsoft Purview Insight reports include the Amazon S3 scanning results, along with the rest of the results from your Azure data sources. When relevant, an additional **Amazon S3** asset type was added to the report filtering options.
463+
All Microsoft Purview Insight reports include the Amazon S3 scanning results, along with the rest of the results from your Azure data sources. When relevant, another **Amazon S3** asset type was added to the report filtering options.
464464

465465
For more information, see the [Understand Data Estate Insights in Microsoft Purview](concept-insights.md).
466466

@@ -581,9 +581,9 @@ This is a general error that indicates an issue when using the Role ARN. For exa
581581

582582
- Make sure that the AWS role has the correct Microsoft account ID. In the AWS IAM area, select the **Role > Trust relationships** tab and then follow the steps in [Create a new AWS role for Microsoft Purview](#create-a-new-aws-role-for-microsoft-purview) again to verify your details.
583583

584-
For more information, see [Cannot find the specified bucket](#cannot-find-the-specified-bucket),
584+
For more information, see [Can't find the specified bucket](#cannot-find-the-specified-bucket),
585585

586-
### Cannot find the specified bucket
586+
### Can't find the specified bucket
587587

588588
Make sure that the S3 bucket URL is properly defined:
589589

0 commit comments

Comments
 (0)