Skip to content

Commit c71e4ed

Browse files
authored
Merge pull request #205849 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 4316f83 + 8a891cd commit c71e4ed

File tree

4 files changed

+5
-9
lines changed

4 files changed

+5
-9
lines changed

articles/cognitive-services/QnAMaker/Quickstarts/create-publish-knowledge-base.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ When you are done creating the resource in the Azure portal, return to the QnA M
4444
|--|--|
4545
|**Enable multi-turn extraction from URLs, .pdf or .docx files.**|Checked|
4646
|**Multi-turn default text**| Select an option|
47-
|**+ Add URL**|`https://www.microsoft.com/en-us/software-download/faq`|
47+
|**+ Add URL**|`https://www.microsoft.com/download/faq.aspx`|
4848
|**Chit-chat**|Select **Professional**|
4949

5050
7. In **Step 5**, Select **Create your KB**.

articles/cognitive-services/Speech-Service/includes/how-to/speech-synthesis/javascript.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ function synthesizeSpeech() {
260260
const speechConfig = SpeechConfig.fromSubscription("<paste-your-speech-key-here>", "<paste-your-speech-location/region-here>");
261261

262262
// Set the output format
263-
speechConfig.speechSynthesisOutputFormat = SpeechSynthesisOutputFormat.Riff24Khz16BitMonoPcm;
263+
speechConfig.speechSynthesisOutputFormat = sdk.SpeechSynthesisOutputFormat.Riff24Khz16BitMonoPcm;
264264

265265
const synthesizer = new sdk.SpeechSynthesizer(speechConfig, null);
266266
synthesizer.speakTextAsync(

articles/cognitive-services/Speech-Service/includes/quickstarts/text-to-speech-basics/rest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,8 @@ At a command prompt, run the following cURL command. Insert the following values
2222
key="YourSubscriptionKey"
2323
region="YourServiceRegion"
2424

25-
curl --location --request POST 'https://$region.tts.speech.microsoft.com/cognitiveservices/v1' \
26-
--header 'Ocp-Apim-Subscription-Key: $key' \
25+
curl --location --request POST "https://$region.tts.speech.microsoft.com/cognitiveservices/v1" \
26+
--header "Ocp-Apim-Subscription-Key: $key" \
2727
--header 'Content-Type: application/ssml+xml' \
2828
--header 'X-Microsoft-OutputFormat: audio-16khz-128kbitrate-mono-mp3' \
2929
--header 'User-Agent: curl' \

articles/web-application-firewall/afds/waf-front-door-drs.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ DRS 2.0 includes 17 rule groups, as shown in the following table. Each group con
111111
|**[APPLICATION-ATTACK-RFI](#drs931-10)**|Protection against remote file inclusion attacks|
112112
|**[APPLICATION-ATTACK-RCE](#drs932-10)**|Protection against remote command execution|
113113
|**[APPLICATION-ATTACK-PHP](#drs933-10)**|Protect against PHP-injection attacks|
114-
|**[CROSS-SITE-SCRIPTING](#drs941-10)**|XSS - Cross-site Scripting|
114+
|**[APPLICATION-ATTACK-XSS](#drs941-10)**|Protect against cross-site scripting attacks|
115115
|**[APPLICATION-ATTACK-SQLI](#drs942-10)**|Protect against SQL-injection attacks|
116116
|**[APPLICATION-ATTACK-SESSION-FIXATION](#drs943-10)**|Protect against session-fixation attacks|
117117
|**[APPLICATION-ATTACK-SESSION-JAVA](#drs944-10)**|Protect against JAVA attacks|
@@ -238,12 +238,10 @@ Front Door.
238238
|933110|PHP Injection Attack: PHP Script File Upload Found|
239239
|933120|PHP Injection Attack: Configuration Directive Found|
240240
|933130|PHP Injection Attack: Variables Found|
241-
|933131|PHP Injection Attack: Variables Found|
242241
|933140|PHP Injection Attack: I/O Stream Found|
243242
|933150|PHP Injection Attack: High-Risk PHP Function Name Found|
244243
|933151|PHP Injection Attack: Medium-Risk PHP Function Name Found|
245244
|933160|PHP Injection Attack: High-Risk PHP Function Call Found|
246-
|933161|PHP Injection Attack: Low-Value PHP Function Call Found|
247245
|933170|PHP Injection Attack: Serialized Object Injection|
248246
|933180|PHP Injection Attack: Variable Function Call Found|
249247
|933200|PHP Injection Attack: Wrapper scheme detected|
@@ -622,12 +620,10 @@ Front Door.
622620
|933110|PHP Injection Attack: PHP Script File Upload Found|
623621
|933120|PHP Injection Attack: Configuration Directive Found|
624622
|933130|PHP Injection Attack: Variables Found|
625-
|933131|PHP Injection Attack: Variables Found|
626623
|933140|PHP Injection Attack: I/O Stream Found|
627624
|933150|PHP Injection Attack: High-Risk PHP Function Name Found|
628625
|933151|PHP Injection Attack: Medium-Risk PHP Function Name Found|
629626
|933160|PHP Injection Attack: High-Risk PHP Function Call Found|
630-
|933161|PHP Injection Attack: Low-Value PHP Function Call Found|
631627
|933170|PHP Injection Attack: Serialized Object Injection|
632628
|933180|PHP Injection Attack: Variable Function Call Found|
633629

0 commit comments

Comments
 (0)