Skip to content

Commit d48db38

Browse files
committed
Acrlinx edits
1 parent d322ddc commit d48db38

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/network-watcher/network-watcher-alert-triggered-packet-capture.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Network Watcher packet capture creates capture sessions to track traffic in and
1919

2020
This capability can be started remotely from other automation scenarios such as Azure Functions. Packet capture gives you the capability to run proactive captures based on defined network anomalies. Other uses include gathering network statistics, getting information about network intrusions, debugging client-server communications, and more.
2121

22-
Resources that are deployed in Azure run 24/7. You and your staff cannot actively monitor the status of all resources 24/7. For example, what happens if an issue occurs at 2 AM?
22+
Resources that are deployed in Azure run 24/7. You and your staff can't actively monitor the status of all resources 24/7. For example, what happens if an issue occurs at 2 AM?
2323

2424
By using Network Watcher, alerting and functions from within the Azure ecosystem, you can proactively respond with the data and tools to solve problems in your network.
2525

@@ -35,7 +35,7 @@ By using Network Watcher, alerting and functions from within the Azure ecosystem
3535

3636
In this example, your VM is sending more TCP segments than usual and you want to be alerted. TCP segments are used as an example here, but you can use any alert condition.
3737

38-
When you are alerted, the packet-level data helps to understand why communication has increased. You can take steps to return the virtual machine to regular communication.
38+
When you're alerted, the packet-level data helps to understand why communication has increased. You can take steps to return the virtual machine to regular communication.
3939

4040
This scenario assumes that you have an existing instance of Network Watcher and a resource group with a valid Virtual machine.
4141

@@ -67,13 +67,13 @@ The first step is to create an Azure function to process the alert and create a
6767
|**Setting** | **Value** | **Details** |
6868
|---|---|---|
6969
|**App name**|PacketCaptureExample|The name of the function app.|
70-
|**Subscription**|[Your subscription]The subscription for which to create the function app.||
70+
|**Subscription**|[Your subscription]The subscription for which you want to create the function app.||
7171
|**Resource Group**|PacketCaptureRG|The resource group to contain the function app.|
7272
|**Hosting Plan**|Consumption Plan| The type of plan your function app uses. Options are Consumption or Azure App Service plan. |
73-
|**Location**|Central US| The region in which to create the function app.|
73+
|**Location**|Central US| The region in which you want to create the function app.|
7474
|**Storage Account**|{autogenerated}| The storage account that Azure Functions needs for general-purpose storage.|
7575

76-
3. On the **PacketCaptureExample Function Apps** blade, select **Functions** > **Custom function** >**+**.
76+
3. In **PacketCaptureExample Function Apps**, select **Functions** > **Custom function** > **+**.
7777

7878
4. Select **HttpTrigger-Powershell** and enter the remaining information. Finally, to create the function, select **Create**.
7979

@@ -159,7 +159,7 @@ The client ID is the Application ID of an application in Azure Active Directory.
159159
160160
#### AzureTenant
161161
162-
Obtain the tenant ID by running the following PowerShell sample:
162+
Obtain the tenant ID by running the following PowerShell sample:
163163
164164
```powershell
165165
(Get-AzSubscription -SubscriptionName "<subscriptionName>").TenantId
@@ -272,7 +272,7 @@ The following example is PowerShell code that can be used in the function. There
272272
}
273273
```
274274

275-
Use the following PowerShell code if you are using the old schema:
275+
Use the following PowerShell code if you're using the old schema:
276276

277277
```powershell
278278
#Import Azure PowerShell modules required to make calls to Network Watcher

0 commit comments

Comments
 (0)