Skip to content

Commit 6307200

Browse files
authored
Merge pull request #125157 from ArieHein/Spelling-Wave-37
Spelling Fixes
2 parents 9dd1484 + dfc0bba commit 6307200

20 files changed

+35
-35
lines changed

articles/sentinel/data-connectors/microsoft-exchange-message-tracking-logs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,14 +39,14 @@ MessageTrackingLog_CL
3939
To integrate with Microsoft Exchange Message Tracking Logs make sure you have:
4040

4141
- **Azure Log Analytics will be deprecated**: Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
42-
- **Detailled documentation**: >**NOTE:** Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)
42+
- **Detailed documentation**: >**NOTE:** Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)
4343

4444

4545
## Vendor installation instructions
4646

4747

4848
> [!NOTE]
49-
> This solution is based on options. This allows you to choose which data will be ingest as some options can generate a very high volume of data. Depending on what you want to collect, track in your Workbooks, Analytics Rules, Hunting capabilities you will choose the option(s) you will deploy. Each options are independant for one from the other. To learn more about each option: ['Microsoft Exchange Security' wiki](https://aka.ms/ESI_DataConnectorOptions)
49+
> This solution is based on options. This allows you to choose which data will be ingest as some options can generate a very high volume of data. Depending on what you want to collect, track in your Workbooks, Analytics Rules, Hunting capabilities you will choose the option(s) you will deploy. Each options are independent for one from the other. To learn more about each option: ['Microsoft Exchange Security' wiki](https://aka.ms/ESI_DataConnectorOptions)
5050
5151
>This Data Connector is the **option 6** of the wiki.
5252

articles/sentinel/data-connectors/mimecast-audit-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ Deploy the Mimecast Audit & Authentication Data Connector:
9696
- appName: Unique string that will be used as id for the app in Azure platform
9797
- objectId: Azure portal ---> Azure Active Directory ---> more info ---> Profile -----> Object ID
9898
- appInsightsLocation(default): westeurope
99-
- mimecastEmail: Email address of dedicated user for this integraion
99+
- mimecastEmail: Email address of dedicated user for this integration
100100
- mimecastPassword: Password for dedicated user
101101
- mimecastAppId: Application Id from the Microsoft Sentinel app registered with Mimecast
102102
- mimecastAppKey: Application Key from the Microsoft Sentinel app registered with Mimecast

articles/sentinel/data-connectors/mimecast-intelligence-for-microsoft-microsoft-sentinel.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ Enable Mimecast Intelligence for Microsoft - Microsoft Sentinel Connector:
9797
- appName: Unique string that will be used as id for the app in Azure platform
9898
- objectId: Azure portal ---> Azure Active Directory ---> more info ---> Profile -----> Object ID
9999
- appInsightsLocation(default): westeurope
100-
- mimecastEmail: Email address of dedicated user for this integraion
100+
- mimecastEmail: Email address of dedicated user for this integration
101101
- mimecastPassword: Password for dedicated user
102102
- mimecastAppId: Application Id from the Microsoft Sentinel app registered with Mimecast
103103
- mimecastAppKey: Application Key from the Microsoft Sentinel app registered with Mimecast

articles/sentinel/data-connectors/mimecast-secure-email-gateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ Deploy the Mimecast Secure Email Gateway Data Connector:
104104
- appName: Unique string that will be used as id for the app in Azure platform
105105
- objectId: Azure portal ---> Azure Active Directory ---> more info ---> Profile -----> Object ID
106106
- appInsightsLocation(default): westeurope
107-
- mimecastEmail: Email address of dedicated user for this integraion
107+
- mimecastEmail: Email address of dedicated user for this integration
108108
- mimecastPassword: Password for dedicated user
109109
- mimecastAppId: Application Id from the Microsoft Sentinel app registered with Mimecast
110110
- mimecastAppKey: Application Key from the Microsoft Sentinel app registered with Mimecast

articles/sentinel/data-connectors/mimecast-targeted-threat-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ Deploy the Mimecast Targeted Threat Protection Data Connector:
120120
- appName: Unique string that will be used as id for the app in Azure platform
121121
- objectId: Azure portal ---> Azure Active Directory ---> more info ---> Profile -----> Object ID
122122
- appInsightsLocation(default): westeurope
123-
- mimecastEmail: Email address of dedicated user for this integraion
123+
- mimecastEmail: Email address of dedicated user for this integration
124124
- mimecastPassword: Password for dedicated user
125125
- mimecastAppId: Application Id from the Microsoft Sentinel app registered with Mimecast
126126
- mimecastAppKey: Application Key from the Microsoft Sentinel app registered with Mimecast

articles/sentinel/data-connectors/mulesoft-cloudhub.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ To integrate with MuleSoft Cloudhub (using Azure Functions) make sure you have:
7979

8080
**Option 1 - Azure Resource Manager (ARM) Template**
8181

82-
Use this method for automated deployment of the MuleSoft Cloudhub data connector using an ARM Tempate.
82+
Use this method for automated deployment of the MuleSoft Cloudhub data connector using an ARM Template.
8383

8484
1. Click the **Deploy to Azure** button below.
8585

articles/sentinel/data-connectors/netclean-proactive-incidents.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Netclean_Incidents_CL
5151
In your Logic app designer, click +New Step and search for “Azure Log Analytics Data Collector” click it and select “Send Data”
5252
Enter the Custom Log Name: Netclean_Incidents and a dummy value in the Json request body and click save
5353
Go to code view on the top ribbon and scroll down to line ~100 it should start with "Body"
54-
replace the line entirly with:
54+
replace the line entirely with:
5555

5656
"body": "{\n\"Hostname\":\"@{variables('machineName')}\",\n\"agentType\":\"@{triggerBody()['value']['agent']['type']}\",\n\"Identifier\":\"@{triggerBody()?['key']?['identifier']}\",\n\"type\":\"@{triggerBody()?['key']?['type']}\",\n\"version\":\"@{triggerBody()?['value']?['incidentVersion']}\",\n\"foundTime\":\"@{triggerBody()?['value']?['foundTime']}\",\n\"detectionMethod\":\"@{triggerBody()?['value']?['detectionHashType']}\",\n\"agentInformatonIdentifier\":\"@{triggerBody()?['value']?['device']?['identifier']}\",\n\"osVersion\":\"@{triggerBody()?['value']?['device']?['operatingSystemVersion']}\",\n\"machineName\":\"@{variables('machineName')}\",\n\"microsoftCultureId\":\"@{triggerBody()?['value']?['device']?['microsoftCultureId']}\",\n\"timeZoneId\":\"@{triggerBody()?['value']?['device']?['timeZoneName']}\",\n\"microsoftGeoId\":\"@{triggerBody()?['value']?['device']?['microsoftGeoId']}\",\n\"domainname\":\"@{variables('domain')}\",\n\"Agentversion\":\"@{triggerBody()['value']['agent']['version']}\",\n\"Agentidentifier\":\"@{triggerBody()['value']['identifier']}\",\n\"loggedOnUsers\":\"@{variables('Usernames')}\",\n\"size\":\"@{triggerBody()?['value']?['file']?['size']}\",\n\"creationTime\":\"@{triggerBody()?['value']?['file']?['creationTime']}\",\n\"lastAccessTime\":\"@{triggerBody()?['value']?['file']?['lastAccessTime']}\",\n\"lastWriteTime\":\"@{triggerBody()?['value']?['file']?['lastModifiedTime']}\",\n\"sha1\":\"@{triggerBody()?['value']?['file']?['calculatedHashes']?['sha1']}\",\n\"nearbyFiles_sha1\":\"@{variables('nearbyFiles_sha1s')}\",\n\"externalIP\":\"@{triggerBody()?['value']?['device']?['resolvedExternalIp']}\",\n\"domain\":\"@{variables('domain')}\",\n\"hasCollectedNearbyFiles\":\"@{variables('hasCollectedNearbyFiles')}\",\n\"filePath\":\"@{replace(triggerBody()['value']['file']['path'], '\\', '\\\\')}\",\n\"m365WebUrl\":\"@{triggerBody()?['value']?['file']?['microsoft365']?['webUrl']}\",\n\"m365CreatedBymail\":\"@{triggerBody()?['value']?['file']?['createdBy']?['graphIdentity']?['user']?['mail']}\",\n\"m365LastModifiedByMail\":\"@{triggerBody()?['value']?['file']?['lastModifiedBy']?['graphIdentity']?['user']?['mail']}\",\n\"m365LibraryId\":\"@{triggerBody()?['value']?['file']?['microsoft365']?['library']?['id']}\",\n\"m365LibraryDisplayName\":\"@{triggerBody()?['value']?['file']?['microsoft365']?['library']?['displayName']}\",\n\"m365Librarytype\":\"@{triggerBody()?['value']?['file']?['microsoft365']?['library']?['type']}\",\n\"m365siteid\":\"@{triggerBody()?['value']?['file']?['microsoft365']?['site']?['id']}\",\n\"m365sitedisplayName\":\"@{triggerBody()?['value']?['file']?['microsoft365']?['site']?['displayName']}\",\n\"m365sitename\":\"@{triggerBody()?['value']?['file']?['microsoft365']?['parent']?['name']}\",\n\"countOfAllNearByFiles\":\"@{variables('countOfAllNearByFiles')}\",\n\n}",
5757
click save
@@ -64,7 +64,7 @@ Netclean_Incidents_CL
6464
Ingest data using a api function. please use the script found on [Send log data to Azure Monitor by using the HTTP Data Collector API](/azure/azure-monitor/logs/data-collector-api?tabs=powershell)
6565
Replace the CustomerId and SharedKey values with your values
6666
Replace the content in $json variable to the sample data.
67-
Set the LogType varible to **Netclean_Incidents_CL**
67+
Set the LogType variable to **Netclean_Incidents_CL**
6868
Run the script
6969

7070

articles/sentinel/data-connectors/netskope.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ To integrate with Netskope (using Azure Functions) make sure you have:
8686

8787
Option 1 - Azure Resource Manager (ARM) Template
8888

89-
This method provides an automated deployment of the Netskope connector using an ARM Tempate.
89+
This method provides an automated deployment of the Netskope connector using an ARM Template.
9090

9191
1. Click the **Deploy to Azure** button below.
9292

@@ -111,7 +111,7 @@ This method provides the step-by-step instructions to deploy the Netskope connec
111111
1. From the Azure Portal, navigate to [Function App](https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.Web%2Fsites/kind/functionapp), and select **+ Add**.
112112
2. In the **Basics** tab, ensure Runtime stack is set to **Powershell Core**.
113113
3. In the **Hosting** tab, ensure the **Consumption (Serverless)** plan type is selected.
114-
4. Make other preferrable configuration changes, if needed, then click **Create**.
114+
4. Make other preferable configuration changes, if needed, then click **Create**.
115115

116116

117117
**2. Import Function App Code**
@@ -136,9 +136,9 @@ This method provides the step-by-step instructions to deploy the Netskope connec
136136
timeInterval
137137
logTypes
138138
logAnalyticsUri (optional)
139-
> - Enter the URI that corresponds to your region. The `uri` value must follow the following schema: `https://<Tenant Name>.goskope.com` - There is no need to add subsquent parameters to the Uri, the Function App will dynamically append the parameteres in the proper format.
139+
> - Enter the URI that corresponds to your region. The `uri` value must follow the following schema: `https://<Tenant Name>.goskope.com` - There is no need to add subsequent parameters to the Uri, the Function App will dynamically append the parameters in the proper format.
140140
> - Set the `timeInterval` (in minutes) to the default value of `5` to correspond to the default Timer Trigger of every `5` minutes. If the time interval needs to be modified, it is recommended to change the Function App Timer Trigger accordingly to prevent overlapping data ingestion.
141-
> - Set the `logTypes` to `alert, page, application, audit, infrastructure, network` - This list represents all the avaliable log types. Select the log types based on logging requirements, seperating each by a single comma.
141+
> - Set the `logTypes` to `alert, page, application, audit, infrastructure, network` - This list represents all the available log types. Select the log types based on logging requirements, separating each by a single comma.
142142
> - Note: If using Azure Key Vault, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Key Vault references documentation](/azure/app-service/app-service-key-vault-references) for further details.
143143
> - Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format: `https://<CustomerId>.ods.opinsights.azure.us`.
144144
4. Once all application settings have been entered, click **Save**.

articles/sentinel/data-connectors/nxlog-aix-audit.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ NXLog_parsed_AIX_Audit_view
3232
3333
| summarize count() by EventType
3434
35-
| render piechart title="AIX Audit event type distributon"
35+
| render piechart title="AIX Audit event type distribution"
3636
```
3737

3838
**Highest event per second (EPS) AIX Audit event types**

articles/sentinel/data-connectors/oracle-cloud-infrastructure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ To integrate with Oracle Cloud Infrastructure (using Azure Functions) make sure
6969
7. Select Source: Logging
7070
8. Select Target: Streaming
7171
9. (Optional) Configure *Log Group*, *Filters* or use custom search query to stream only logs that you need.
72-
10. Configure Target - select the strem created before.
72+
10. Configure Target - select the stream created before.
7373
11. Click *Create*
7474

7575
Check the documentation to get more information about [Streaming](https://docs.oracle.com/en-us/iaas/Content/Streaming/home.htm) and [Service Connectors](https://docs.oracle.com/en-us/iaas/Content/service-connector-hub/home.htm).

0 commit comments

Comments
 (0)