Skip to content

Commit cef0fff

Browse files
authored
Update how-to-accelerate-alert-incident-response.md
1 parent bb3223e commit cef0fff

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/defender-for-iot/organizations/how-to-accelerate-alert-incident-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ This section describes how to create an alert suppression rule on the Azure port
8080
1. In the **Alert name** dropdown list, select one or more alerts for your rule. Selecting the name of an alert engine instead of a specific rule name applies the rule to all existing and future alerts associated with that engine.
8181

8282
1. Optionally filter your rule further by defining additional conditions, such as for traffic coming from specific sources, to specific destinations, or on specific subnets.
83-
When specifying subnets as conditions, note that it refer to both the source and destination devices.
83+
When specifying subnets as conditions, note that the subnets refer to both the source and destination devices.
8484

8585
1. When you're finished configuring your rule conditions, select **Next**.
8686

0 commit comments

Comments
 (0)