Skip to content

Commit 85b374e

Browse files
committed
clear up syn issues
1 parent 61250cd commit 85b374e

File tree

4 files changed

+0
-655
lines changed

4 files changed

+0
-655
lines changed

articles/defender-for-cloud/azure-devops-extension.md

Lines changed: 0 additions & 148 deletions
This file was deleted.

articles/sentinel/notebooks.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -85,13 +85,8 @@ While you can run Microsoft Sentinel notebooks in JupyterLab or Jupyter classic,
8585

8686
|Permission |Description |
8787
|---------|---------|
88-
<<<<<<< HEAD
8988
|**Microsoft Sentinel permissions** | Like other Microsoft Sentinel resources, to access notebooks on Microsoft Sentinel Notebooks blade, a Microsoft Sentinel Reader, Microsoft Sentinel Responder, or Microsoft Sentinel Contributor role is required. <br><br>For more information, see [Permissions in Microsoft Sentinel](roles.md).|
9089
|**Azure Machine Learning permissions** | An Azure Machine Learning workspace is an Azure resource. Like other Azure resources, when a new Azure Machine Learning workspace is created, it comes with default roles. You can add users to the workspace and assign them to one of these built-in roles. For more information, see [Azure Machine Learning default roles](../machine-learning/how-to-assign-roles.md) and [Azure built-in roles](../role-based-access-control/built-in-roles.md). <br><br> **Important**: Role access can be scoped to multiple levels in Azure. For example, someone with owner access to a workspace may not have owner access to the resource group that contains the workspace. For more information, see [How Azure RBAC works](../role-based-access-control/overview.md). <br><br>If you're an owner of an Azure ML workspace, you can add and remove roles for the workspace and assign roles to users. For more information, see:<br> - [Azure portal](../role-based-access-control/role-assignments-portal.yml)<br> - [PowerShell](../role-based-access-control/role-assignments-powershell.md)<br> - [Azure CLI](../role-based-access-control/role-assignments-cli.md)<br> - [REST API](../role-based-access-control/role-assignments-rest.md)<br> - [Azure Resource Manager templates](../role-based-access-control/role-assignments-template.md)<br> - [Azure Machine Learning CLI ](../machine-learning/how-to-assign-roles.md#manage-workspace-access)<br><br>If the built-in roles are insufficient, you can also create custom roles. Custom roles might have read, write, delete, and compute resource permissions in that workspace. You can make the role available at a specific workspace level, a specific resource group level, or a specific subscription level. For more information, see [Create custom role](../machine-learning/how-to-assign-roles.md#create-custom-role). |
91-
=======
92-
|**Microsoft Sentinel permissions** | Like other Microsoft Sentinel resources, to access notebooks in Microsoft Sentinel, a Microsoft Sentinel Reader, Microsoft Sentinel Responder, or Microsoft Sentinel Contributor role is required. <br><br>For more information, see [Permissions in Microsoft Sentinel](roles.md).|
93-
|**Azure Machine Learning permissions** | An Azure Machine Learning workspace is an Azure resource. Like other Azure resources, when a new Azure Machine Learning workspace is created, it comes with default roles. You can add users to the workspace and assign them to one of these built-in roles. For more information, see [Azure Machine Learning default roles](../machine-learning/how-to-assign-roles.md) and [Azure built-in roles](../role-based-access-control/built-in-roles.md). <br><br> **Important**: Role access can be scoped to multiple levels in Azure. For example, someone with owner access to a workspace might not have owner access to the resource group that contains the workspace. For more information, see [How Azure RBAC works](../role-based-access-control/overview.md). <br><br>If you're an owner of an Azure Machine Learning workspace, you can add and remove roles for the workspace and assign roles to users. For more information, see:<br> - [Azure portal](../role-based-access-control/role-assignments-portal.md)<br> - [PowerShell](../role-based-access-control/role-assignments-powershell.md)<br> - [Azure CLI](../role-based-access-control/role-assignments-cli.md)<br> - [REST API](../role-based-access-control/role-assignments-rest.md)<br> - [Azure Resource Manager templates](../role-based-access-control/role-assignments-template.md)<br> - [Azure Machine Learning CLI ](../machine-learning/how-to-assign-roles.md#manage-workspace-access)<br><br>If the built-in roles are insufficient, you can also create custom roles. Custom roles might have read, write, delete, and compute resource permissions in that workspace. You can make the role available at a specific workspace level, a specific resource group level, or a specific subscription level. For more information, see [Create custom role](../machine-learning/how-to-assign-roles.md#create-custom-role). |
94-
>>>>>>> 7eacd7c198a4595c110466ca0e7feffec8a9819f
9590

9691
## Submit feedback for a notebook
9792

0 commit comments

Comments
 (0)