Skip to content

Commit 3b54237

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into SANetwork
2 parents 6110e00 + 532493d commit 3b54237

22 files changed

+82
-77
lines changed

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ git clone https://github.com/Azure-Samples/active-directory-b2c-msal-node-sign-i
7373

7474
Extract the sample file to a folder. You'll get a web app with the following directory structure:
7575

76-
```text
76+
```output
7777
active-directory-b2c-msal-node-sign-in-sign-out-webapp/
7878
├── index.js
7979
└── package.json

articles/aks/howto-deploy-java-liberty-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@ The following steps deploy and test the application.
240240

241241
You should see output similar to the following to indicate that all the pods are running.
242242

243-
```bash
243+
```output
244244
NAME READY STATUS RESTARTS AGE
245245
javaee-cafe-cluster-agic-67cdc95bc-2j2gr 1/1 Running 0 29s
246246
javaee-cafe-cluster-agic-67cdc95bc-fgtt8 1/1 Running 0 29s

articles/azure-monitor/agents/agent-linux.md

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -51,22 +51,35 @@ Starting from agent version 1.13.27, the Linux agent will support both Python 2
5151

5252
If you're using an older version of the agent, you must have the virtual machine use Python 2 by default. If your virtual machine is using a distro that doesn't include Python 2 by default, then you must install it. The following sample commands will install Python 2 on different distros:
5353

54-
- **Red Hat, CentOS, Oracle**: `yum install -y python2`
55-
- **Ubuntu, Debian**: `apt-get install -y python2`
56-
- **SUSE**: `zypper install -y python2`
54+
- **Red Hat, CentOS, Oracle**:
55+
56+
```bash
57+
sudo yum install -y python2
58+
```
59+
- **Ubuntu, Debian**:
60+
61+
```bash
62+
sudo apt-get update
63+
sudo apt-get install -y python2
64+
```
65+
- **SUSE**:
66+
67+
```bash
68+
sudo zypper install -y python2
69+
```
5770

5871
Again, only if you're using an older version of the agent, the python2 executable must be aliased to *python*. Use the following method to set this alias:
5972

6073
1. Run the following command to remove any existing aliases:
6174

62-
```
75+
```bash
6376
sudo update-alternatives --remove-all python
6477
```
6578

6679
1. Run the following command to create the alias:
6780

68-
```
69-
sudo update-alternatives --install /usr/bin/python python /usr/bin/python2 1
81+
```bash
82+
sudo update-alternatives --install /usr/bin/python python /usr/bin/python2
7083
```
7184

7285
### Supported Linux hardening

articles/sentinel/TOC.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,14 +17,14 @@
1717
href: forward-syslog-monitor-agent.md
1818
- name: Configure data retention policy
1919
href: configure-data-retention.md
20-
- name: Investigate with UEBA
21-
href: investigate-with-ueba.md
22-
- name: Use automation to respond to threats
23-
href: tutorial-respond-threats-playbook.md
20+
- name: Detect threats using analytics rules
21+
href: tutorial-log4j-detection.md
2422
- name: Automatically enrich incident information
2523
href: tutorial-enrich-ip-information.md
26-
- name: Detect Log4j vulnerability exploits
27-
href: tutorial-log4j-detection.md
24+
- name: Respond to threats using automation
25+
href: tutorial-respond-threats-playbook.md
26+
- name: Investigate with UEBA
27+
href: investigate-with-ueba.md
2828
- name: Build and monitor Zero Trust
2929
href: sentinel-solution.md
3030
- name: Integrate with Microsoft Defender for IoT

articles/sentinel/forward-syslog-monitor-agent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Forward syslog data to Microsoft Sentinel and Azure Monitor by using the Azure Monitor agent
3-
description: Monitor linux-based devices by forwarding syslog data to a Log Analytics workspace.
2+
title: Tutorial - Forward syslog data to Microsoft Sentinel and Azure Monitor by using the Azure Monitor agent
3+
description: In this tutorial, you'll learn how to monitor linux-based devices by forwarding syslog data to a Log Analytics workspace.
44
author: cwatson-cat
55
ms.author: cwatson
66
ms.service: microsoft-sentinel

articles/sentinel/tutorial-log4j-detection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Tutorial - Detect Log4j vulnerability exploits with Microsoft Sentinel
3-
description: In this tutorial, learn how to detect exploits of the Apache Log4j vulnerability in any of your susceptible systems with Microsoft Sentinel analytics rules, taking advantage of alert enrichment capabilities to surface as much information as possible to benefit an investigation.
2+
title: Tutorial - Detect threats by using analytics rules in Microsoft Sentinel
3+
description: In this tutorial, learn how to use analytics rules in Microsoft Sentinel to detect exploits of the Apache Log4j vulnerability in any of your susceptible systems. Take advantage of the alert enrichment capabilities to surface as much information as possible for your investigation.
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: tutorial
77
ms.date: 01/08/2023
88
---
99

10-
# Tutorial: Detect Log4j vulnerability exploits in your systems and produce enriched alerts
10+
# Tutorial: Detect threats by using analytics rules in Microsoft Sentinel
1111

1212
As a Security Information and Event Management (SIEM) service, Microsoft Sentinel is responsible for detecting security threats to your organization. It does this by analyzing the massive volumes of data generated by all of your systems' logs.
1313

articles/sentinel/tutorial-respond-threats-playbook.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Use playbooks with automation rules in Microsoft Sentinel
2+
title: Tutorial - Automate threat response in Microsoft Sentinel
33
description: Use this tutorial to help you use playbooks together with automation rules in Microsoft Sentinel to automate your incident response and remediate security threats.
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: tutorial
77
ms.date: 01/17/2023
88
---
99

10-
# Tutorial: Use playbooks with automation rules in Microsoft Sentinel
10+
# Tutorial: Respond to threats by using playbooks with automation rules in Microsoft Sentinel
1111

1212
This tutorial shows you how to use playbooks together with automation rules to automate your incident response and remediate security threats detected by Microsoft Sentinel. When you complete this tutorial you will be able to:
1313

articles/site-recovery/hyper-v-azure-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ If you're running a Hyper-V Core server, download the setup file and complete th
9595

9696
1. Register the server by running this command:
9797

98-
```bash
98+
```cmd
9999
cd "C:\Program Files\Microsoft Azure Site Recovery Provider"
100100
"C:\Program Files\Microsoft Azure Site Recovery Provider\DRConfigurator.exe" /r /Friendlyname "FriendlyName of the Server" /Credentials "path to where the credential file is saved"
101101
```

articles/site-recovery/vmware-physical-manage-mobility-service.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -74,8 +74,8 @@ Uninstall from the UI or from a command prompt.
7474
1. On the Linux machine, sign in as a **root** user.
7575
2. In a terminal, go to /usr/local/ASR.
7676
3. Run the following command:
77-
```
78-
./uninstall.sh -Y
77+
```bash
78+
./uninstall.sh -Y
7979
```
8080

8181
## Install Site Recovery VSS provider on source machine

articles/virtual-machines/workloads/oracle/configure-oracle-asm.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,9 @@ To install Oracle ASM, complete the following steps.
8282

8383
For more information about installing Oracle ASM, see [Oracle ASMLib Downloads for Oracle Linux 6](https://www.oracle.com/technetwork/server-storage/linux/asmlib/ol6-1709075.html).
8484

85+
> [!IMPORTANT]
86+
> Keep in consideration Oracle Linux 6.x is already EOL. Oracle Linux version 6.10 has available [ELS support](https://www.oracle.com/a/ocom/docs/linux/oracle-linux-extended-support-ds.pdf), which [will end on 07/2024](https://www.oracle.com/a/ocom/docs/elsp-lifetime-069338.pdf).
87+
8588
1. You need to login as root in order to continue with ASM installation:
8689

8790
```bash
@@ -131,7 +134,7 @@ For more information about installing Oracle ASM, see [Oracle ASMLib Downloads f
131134

132135
The output of this command should list the following users and groups:
133136

134-
```bash
137+
```output
135138
uid=3000(grid) gid=54321(oinstall) groups=54321(oinstall),54322(dba),54345(asmadmin),54346(asmdba),54347(asmoper)
136139
```
137140

0 commit comments

Comments
 (0)