Skip to content

Commit d4f16cb

Browse files
committed
hani's feedback
1 parent 231c237 commit d4f16cb

File tree

1 file changed

+10
-6
lines changed

1 file changed

+10
-6
lines changed

articles/sentinel/monitor-key-vault-honeytokens.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -109,13 +109,13 @@ The following steps describe specific actions required for the **Azure Sentinel
109109

110110
1. On the **Azure Functions** tab, define the following values:
111111

112-
**Key vault configuration**: The following fields define values for the key vault where you'll store your AAD app's ID and secret. These fields do not *not* define the the key vault where you'll be deploying honeytokens.
112+
**Key vault configuration**: The following fields define values for the key vault where you'll store your AAD app's secret. These fields do not *not* define the the key vault where you'll be deploying honeytokens.
113113
114114
|Field |Description |
115115
|---------|---------|
116116
| **Service plan** | Select whether you want to use a **Premium** or **Consumption** plan for your function app. For more information, see [Azure Functions Consumption plan hosting](/azure/azure-functions/consumption-plan) and [Azure Functions Premium plan](/azure/azure-functions/functions-premium-plan). |
117-
| **Should a new KeyVault be created** | Select **new** to create a new key vault for your application key, or **existing** to use an already existing key vault. |
118-
| **KeyVault name** | Displayed only when you've selected to create a new key vault. <br><br>Enter the name of the key vault you want to use to store your client ID and secret. This name must be globally unique. |
117+
| **Should a new KeyVault be created** | Select **new** to create a new key vault for your app's secret, or **existing** to use an already existing key vault. |
118+
| **KeyVault name** | Displayed only when you've selected to create a new key vault. <br><br>Enter the name of the key vault you want to use to store your app's secret. This name must be globally unique. |
119119
| **KeyVault resource group** |Displayed only when you've selected to create a new key vault. <br><br> Select the name of the resource group where you want to store the key vault for your application key. |
120120
| **Existing key vaults** | Displayed only when you've selected to use an existing key vault. Select the key vault you want to use. |
121121
| **KeyVault secret name** | Enter the name of the secret used to store the client secret. |
@@ -204,10 +204,14 @@ We recommend that you share the **SOCHTManagement** workbook with key vault owne
204204
205205
- Select **Click to validate the key-vault is audited**. In Azure Key Vault, verify that your key vault diagnostic settings are set to send audit events to Log Analytics.
206206
- Select **Enable your user in the key-vault's policy if missing**. In Azure Key Vault, make sure that your user has access to deploy honeytokens to your required locations. Select **Save** to save any changes.
207-
- Select **Click to add a honey token to the key-vault** to deploy your configured honeytoken to your selected key vault.
208-
- Select **Click to add monitoring in the SOC**. If successful, a confirmation message is displayed on a new tab: `Honey-token was successfully added to monitored list`.
207+
- Select **Click to add a honey token to the key-vault** to open Azure Key Vault. Add a new honeytoken, like a new secret, to the configured key vault.
208+
- Select **Click to add monitoring in the SOC**. If successful, a confirmation message is displayed on a new tab: `Honey-token was successfully added to monitored list`.
209209

210-
Make sure to select the **Disable back your user in the key-vault's policy if needed** link to remove the access policy created grant rights to create the honeytokens.
210+
For more information, see the [Azure Key Vault documentation](/azure/key-vault/secrets/about-secrets).
211+
212+
> [!NOTE]
213+
> Make sure to select the **Disable back your user in the key-vault's policy if needed** link to remove the access policy created grant rights to create the honeytokens.
214+
>
211215
212216
# [Remove a honeytoken](#tab/remove-a-honeytoken)
213217

0 commit comments

Comments
 (0)