Skip to content

Commit ba700b9

Browse files
authored
Fix egregious acrolinx issues
1 parent 6a823c5 commit ba700b9

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed

articles/sentinel/data-connectors/1password.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ To integrate with 1Password (using Azure Functions) make sure you have:
6666
[Follow these instructions](https://support.1password.com/events-reporting/#appendix-issue-or-revoke-bearer-tokens) provided by 1Password to obtain an Events Reporting API Token. A 1Password Business account is required.
6767

6868

69-
**STEP 2 - Deploy the functionApp using DeployToAzure button to create the table, dcr and the associated Azure Function**
69+
**STEP 2 - Deploy the functionApp using DeployToAzure button to create the table, data collection rule, and the associated Azure Function**
7070

7171
**IMPORTANT:** Before deploying the 1Password connector, a custom table needs to be created.
7272

@@ -77,7 +77,7 @@ This method provides an automated deployment of the 1Password connector using an
7777
1. Click the **Deploy to Azure** button below.
7878

7979
[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-OnePassword-azuredeploy)
80-
2. Select the preferred **Subscription**, **Resource Group** and **Location**.
80+
2. Select the preferred **Subscription**, **Resource Group**, and **Location**.
8181
3. Enter the **Workspace Name**, **Workspace Name**, **1Password Events API Key**, and **URI**.
8282
- The default **Time Interval** is set to five (5) minutes. If you'd like to modify the interval, you can adjust the Function App Timer Trigger accordingly (in the function.json file, post deployment) to prevent overlapping data ingestion.
8383
- If using Azure Key Vault secrets for any of the values above, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Key Vault references documentation](/azure/app-service/app-service-key-vault-references) for further details.

articles/sentinel/data-connectors/tenable-identity-exposure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.collection: sentinel-data-connector
1111

1212
# Tenable Identity Exposure connector for Microsoft Sentinel
1313

14-
Tenable Identity Exposure connector allows Indicators of Exposure, Indicators of Attack and trailflow logs to be ingested into Microsoft Sentinel.The different work books and data parsers allow you to more easily manipulate logs and monitor your Active Directory environment. The analytic templates allow you to automate responses regarding different events, exposures and attacks.
14+
Tenable Identity Exposure connector allows Indicators of Exposure, Indicators of Attack and trailflow logs to be ingested into Microsoft Sentinel.The different work books and data parsers allow you to more easily manipulate logs and monitor your Active Directory environment. The analytic templates allow you to automate responses regarding different events, exposures, and attacks.
1515

1616
This is autogenerated content. For changes, contact the solution provider.
1717

@@ -151,7 +151,7 @@ This data connector depends on [afad_parser](https://aka.ms/sentinel-TenableApp-
151151
152152
2. Install and onboard the Microsoft agent for Linux
153153
154-
The OMS agent will receive the TenableIE syslog events and publish it in Microsoft Sentinel :
154+
The OMS agent will receive the TenableIE syslog events and publish it in Microsoft Sentinel.
155155
156156
157157
3. Check agent logs on the Syslog server
@@ -183,7 +183,7 @@ Configure the agent to collect the logs.
183183
184184
6. Enjoy!
185185
186-
You should now be able to receive logs in the *Tenable_IE_CL* table, logs data can be parse using the **afad_parser()** function, used by all query samples, workbooks and analytic templates.
186+
You should now be able to receive logs in the *Tenable_IE_CL* table, logs data can be parse using the **afad_parser()** function, used by all query samples, workbooks, and analytic templates.
187187
188188
189189

articles/sentinel/data-connectors/tenable-vulnerability-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Use this method for automated deployment of the TenableVM Vulnerability Manageme
102102
1. Click the **Deploy to Azure** button below.
103103

104104
[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-TenableVM-azuredeploy)
105-
2. Select the preferred **Subscription**, **Resource Group** and **Location**.
105+
2. Select the preferred **Subscription**, **Resource Group**, and **Location**.
106106
3. Enter the **TenableAccessKey** and **TenableSecretKey** and deploy.
107107
4. Mark the checkbox labeled **I agree to the terms and conditions stated above**.
108108
5. Click **Purchase** to deploy.

articles/sentinel/data-connectors/transmit-security-connector.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.collection: sentinel-data-connector
1111

1212
# Transmit Security Connector (using Azure Functions) connector for Microsoft Sentinel
1313

14-
The [Transmit Security] data connector provides the capability to ingest common Transmit Security API events into Microsoft Sentinel through the REST API. [Refer to API documentation for more information](https://developer.transmitsecurity.com/). The connector provides ability to get events which helps to examine potential security risks, analyze your team's use of collaboration, diagnose configuration problems and more.
14+
The Transmit Security data connector provides the capability to ingest common Transmit Security API events into Microsoft Sentinel through the REST API. [Refer to API documentation for more information](https://developer.transmitsecurity.com/). The connector provides ability to get events which helps to examine potential security risks, analyze your team's use of collaboration, diagnose configuration problems and more.
1515

1616
This is autogenerated content. For changes, contact the solution provider.
1717

@@ -119,10 +119,10 @@ If you're already signed in, go to the next step.
119119

120120
e. **Select a runtime:** Choose Python 3.8.
121121

122-
f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located.
122+
f. Select a location for new resources. For better performance and lower costs, choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located.
123123

124124
6. Deployment will begin. A notification is displayed after your function app is created and the deployment package is applied.
125-
7. Go to Azure Portal for the Function App configuration.
125+
7. Go to Azure portal for the Function App configuration.
126126

127127

128128
**2. Configure the Function App**

0 commit comments

Comments
 (0)