You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-threat-intelligence-tip.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ You can get this information from Microsoft Entra ID through app registration, w
66
66
#### Register an application with Microsoft Entra ID
67
67
68
68
1. In the Azure portal, go to **Microsoft Entra ID**.
69
-
1. On the menu, select **App Registrations** and then select **New registration**.
69
+
1. On the menu, select **App Registrations**, and then select **New registration**.
70
70
1. Choose a name for your application registration, select **Single tenant**, and then select **Register**.
71
71
72
72
:::image type="content" source="media/connect-threat-intelligence-tip/threat-intel-register-application.png" alt-text="Screenshot that shows registering an application.":::
@@ -77,7 +77,7 @@ You can get this information from Microsoft Entra ID through app registration, w
77
77
78
78
1. Go back to the main page of **Microsoft Entra ID**.
79
79
80
-
1. On the menu, select **App Registrations** and then select your newly registered app.
80
+
1. On the menu, select **App Registrations**, and then select your newly registered app.
81
81
82
82
1. On the menu, select **API Permissions** > **Add a permission**.
83
83
@@ -107,7 +107,7 @@ After your app is registered and permissions are granted, you need to get a clie
107
107
108
108
:::image type="content" source="media/connect-threat-intelligence-tip/threat-intel-client-secret.png" alt-text="Screenshot that shows getting a client secret.":::
109
109
110
-
1. Select **Add** and then copy the client secret.
110
+
1. Select **Add**, and then copy the client secret.
111
111
112
112
> [!IMPORTANT]
113
113
> You must copy the client secret before you leave this screen. You can't retrieve this secret again if you go away from this page. You need this value when you configure your TIP or custom solution.
Copy file name to clipboardExpand all lines: articles/sentinel/connect-threat-intelligence-upload-api.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,7 +75,7 @@ The Upload Indicators API ingests threat indicators at the workspace level and a
75
75
1. From the Azure portal, go to **Log Analytics workspaces**.
76
76
1. Select **Access control (IAM)**.
77
77
1. Select **Add** > **Add role assignment**.
78
-
1. On the **Role** tab, select the **Microsoft Sentinel Contributor** role and then select **Next**.
78
+
1. On the **Role** tab, select the **Microsoft Sentinel Contributor** role, and then select **Next**.
79
79
1. On the **Members** tab, select **Assign access to** > **User, group, or service principal**.
80
80
1. Select members. By default, Microsoft Entra applications aren't displayed in the available options. To find your application, search for it by name.
0 commit comments