Skip to content

Commit 59ade02

Browse files
committed
fixed small errors
1 parent 657162e commit 59ade02

File tree

4 files changed

+7
-6
lines changed

4 files changed

+7
-6
lines changed

articles/sentinel/mulitple-tenants-service-providers.md renamed to articles/sentinel/multiple-tenants-service-providers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,11 @@ ms.author: rkarlin
1919
---
2020
# Work with multiple tenants in Azure Sentinel
2121

22-
If you’re an managed security service provider (MSSP) and you’re using [Azure Lighthouse](../lighthouse/overview.md) to manage your customers’ security operations centers (SOC), you will be able to manage your customers’ Azure Sentinel resources without connecting directly to the customer’s tenant, from your own Azure tenant.
22+
If you’re a managed security service provider (MSSP) and you’re using [Azure Lighthouse](../lighthouse/overview.md) to manage your customers’ security operations centers (SOC), you will be able to manage your customers’ Azure Sentinel resources without connecting directly to the customer’s tenant, from your own Azure tenant.
2323

2424
## Prerequisites
2525
- [Onboard Azure Lighthouse](../lighthouse/how-to/onboard-customer.md)
26-
- For this to work properly, your tenant must be registered to the Azure Sentinel Resource Provider on at least one subscription. If you have a running Azure Sentinel in your tenant you are ready to get started. If not, in the Azure Portal, select **Subscriptions** followed by **Resource providers** and then search for `Microsoft.Security.Insights` and select **Register**.
26+
- For this to work properly, your tenant must be registered to the Azure Sentinel Resource Provider on at least one subscription. If you have a registered Azure Sentinel in your tenant, you are ready to get started. If not, in the Azure portal, select **Subscriptions** followed by **Resource providers** and then search for `Microsoft.Security.Insights` and select **Register**.
2727
![Check resource providers](media/multiple-tenants-service-providers/check-resource-provider.png)
2828
## How to access Azure Sentinel from other tenants
2929
1. Under **Directory + subscription**, select the delegated directories, and the subscriptions where your customer’s Azure Sentinel workspaces are located.

articles/sentinel/offboard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ If you no longer want to use the Azure Sentinel, this article explains how to re
2323

2424
## How to delete Azure Sentinel
2525

26-
In the background when you install Azure Sentinel, the **SecurityInsights** solution is installed on your selected workspace. So the first thing you need to do is remove the solution. In the Azure portal, you need to delete the SecurityInsights solution.
26+
In the background, when you install Azure Sentinel, the **SecurityInsights** solution is installed on your selected workspace. So the first thing you need to do is remove the solution. In the Azure portal, you need to delete the SecurityInsights solution.
2727

2828
1. Go to **Workspace settings** and then **Solutions**.
2929

@@ -71,7 +71,7 @@ Within the first 48 hours, the data and alert rules (including real-time automat
7171

7272
Your playbooks, saved workbooks, saved hunting queries, and notebooks are not deleted. **Some may brake due to the removed data. You can remove those manually.**
7373

74-
From the time you remove the service, there is a grace period of 30 days during which you can re-enable the solution and your data and alert rules will be restored but the configured connectors that were disconnected must be reconnected.
74+
After you remove the service, there is a grace period of 30 days during which you can re-enable the solution and your data and alert rules will be restored but the configured connectors that were disconnected must be reconnected.
7575

7676
> [!NOTE]
7777
> If you remove the solution, your subscription will continue to be registered with the Azure Sentinel resource provider. **You can remove it manually.**

articles/sentinel/roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ In addition to Azure Sentinel dedicated RBAC roles, there are Azure and Log Anal
3636

3737
- **Azure roles:** [Owner](../role-based-access-control/built-in-roles.md#owner), [Contributor](../role-based-access-control/built-in-roles.md#contributor), and [Reader](../role-based-access-control/built-in-roles.md#reader). Azure roles grant access across all your Azure resources, including Log Analytics workspaces and Azure Sentinel resources.
3838

39-
- **Log Analytics roles:** [Log Analytics contributor](..azure/role-based-access-control/built-in-roles.md#log-analytics-contributor), [Log Analytics reader](../role-based-access-control/built-in-roles.md#log-analytics-reader). Log Analytics roles grant access across all your Log Analytics workspaces.
39+
- **Log Analytics roles:** [Log Analytics contributor](../role-based-access-control/built-in-roles.md#log-analytics-contributor), [Log Analytics reader](../role-based-access-control/built-in-roles.md#log-analytics-reader). Log Analytics roles grant access across all your Log Analytics workspaces.
4040

4141
> [!NOTE]
4242
> Log Analytics roles also grant read access across all Azure resources but will only assign write permissions to Log Analytics resources.

articles/sentinel/tutorial-investigate-cases.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,8 @@ To use the investigation graph:
7070

7171
1. Select an incident, then select **Investigate**. This takes you to the investigation graph. The graph provides an illustrative map of the entities directly connected to the alert and each resource connected further.
7272

73-
> [!IMPORTANT] You'll only be able to investigate the incident if you used the entity mapping fields when you set up your analytic rule. The investigation graph requires that your original incident includes entities.
73+
> [!IMPORTANT]
74+
> You'll only be able to investigate the incident if you used the entity mapping fields when you set up your analytic rule. The investigation graph requires that your original incident includes entities.
7475
7576
![View map](media/tutorial-investigate-cases/map1.png)
7677

0 commit comments

Comments
 (0)