Skip to content

Commit 4f2e232

Browse files
authored
Merge pull request #290625 from Daidihuang/2024_11-Monthly-broken-links-fix-cwatson-cat
2024_11-Monthly-broken-links-fix-cwatson-cat
2 parents 9eea05c + 0ae3616 commit 4f2e232

File tree

3 files changed

+8
-13
lines changed

3 files changed

+8
-13
lines changed

articles/sentinel/data-connectors/hyas-protect.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection: sentinel-data-connector
1313

1414
HYAS Protect provide logs based on reputation values - Blocked, Malicious, Permitted, Suspicious.
1515

16-
This is autogenerated content. For changes, contact the solution provider.
16+
It's autogenerated content. For changes, contact the solution provider.
1717

1818
## Connector attributes
1919

@@ -36,7 +36,7 @@ HYASProtectDnsSecurityLogs_CL
3636

3737
## Prerequisites
3838

39-
To integrate with HYAS Protect (using Azure Functions) make sure you have:
39+
To integrate with HYAS Protect (using Azure Functions) make sure, you have:
4040

4141
- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/).
4242
- **REST API Credentials/permissions**: **HYAS API Key** is required for making API calls.
@@ -56,7 +56,7 @@ To integrate with HYAS Protect (using Azure Functions) make sure you have:
5656

5757
Option 1 - Azure Resource Manager (ARM) Template
5858

59-
Use this method for automated deployment of the HYAS Protect data connector using an ARM Tempate.
59+
Use this method for automated deployment of the HYAS Protect data connector using an ARM Template.
6060

6161
1. Click the **Deploy to Azure** button below.
6262

@@ -89,14 +89,14 @@ If you're already signed in, go to the next step.
8989

9090
c. Select **Create new Function App in Azure** (Don't choose the Advanced option)
9191

92-
d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. HyasProtectLogsXXX).
92+
d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (for example, HyasProtectLogsXXX).
9393

9494
e. **Select a runtime:** Choose Python 3.8.
9595

96-
f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft sentinel is located.
96+
f. Select a location for new resources. For better performance and lower costs, choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located.
9797

98-
6. Deployment will begin. A notification is displayed after your function app is created and the deployment package is applied.
99-
7. Go to Azure Portal for the Function App configuration.
98+
6. Deployment begins. A notification is displayed after your function app is created and the deployment package is applied.
99+
7. Go to Azure portal for the Function App configuration.
100100

101101

102102
**2. Configure the Function App**
@@ -111,7 +111,3 @@ If you're already signed in, go to the next step.
111111
. Once all application settings have been entered, click **Save**.
112112

113113

114-
115-
## Next steps
116-
117-
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/hyas.microsoft-sentinel-solution-hyas-protect?tab=Overview) in the Azure Marketplace.

articles/sentinel/unified-connector-cef-device.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ Set your security solution to send syslog messages in CEF format to the proxy ma
129129

130130
Set your security solution to send syslog messages in CEF format to the proxy machine. Make sure to send the logs to port 514 TCP on the machine IP address.
131131

132-
1. Follow the directions to install the [ExtraHop Detection SIEM Connector bundle](https://learn.extrahop.com/extrahop-detection-siem-connector-bundle) on your Reveal(x) system. The **SIEM Connector** is required for this integration.
132+
1. Follow the directions to install the [ExtraHop Detection SIEM Connector bundle](https://learn.extrahop.com/) on your Reveal(x) system. The **SIEM Connector** is required for this integration.
133133
1. Enable the trigger for **ExtraHop Detection SIEM Connector - CEF**.
134134
1. Update the trigger with the ODS syslog targets you created. 
135135

articles/sentinel/unified-connector-syslog-device.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -321,7 +321,6 @@ This data connector was developed using RSA SecurID Authentication Manager versi
321321

322322
1. Follow these instructions to configure the VMware ESXi to forward syslog:
323323

324-
- [VMware ESXi 3.5 and 4.x](https://kb.vmware.com/s/article/1016621)
325324
- [VMware ESXi 5.0+](https://docs.vmware.com/en/VMware-vSphere/5.5/com.vmware.vsphere.monitoring.doc/GUID-9F67DB52-F469-451F-B6C8-DAE8D95976E7.html)
326325

327326
1. Use the IP address or hostname for the Linux device with the Linux agent installed as the **Destination IP** address.

0 commit comments

Comments
 (0)