Skip to content

Commit d63d8ad

Browse files
author
ecfan
committed
Fix Acrolinx issues
1 parent 38617df commit d63d8ad

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/sentinel/automation/create-playbooks.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ This article describes how to create and manage Microsoft Sentinel playbooks. Yo
4040

4141
For more information, see the following documentation:
4242

43-
- [Access to logic app operationss](/azure/logic-apps/logic-apps-securing-a-logic-app#access-to-logic-app-operations)
43+
- [Access to logic app operations](/azure/logic-apps/logic-apps-securing-a-logic-app#access-to-logic-app-operations)
4444
- [Microsoft Sentinel playbook prerequisites](automate-responses-with-playbooks.md#prerequisites).
4545

4646
- Before you create your playbook, we recommend that you read [Azure Logic Apps for Microsoft Sentinel playbooks](../automation/logic-apps-playbooks.md).
@@ -112,15 +112,15 @@ Follow these steps to create your playbook:
112112

113113
1. For **Subscription** and **Resource group**, select the values you want from their respective lists.
114114

115-
The **Region** value is set to the same region as the associated Log Analyics workspace.
115+
The **Region** value is set to the same region as the associated Log Analytics workspace.
116116

117117
1. For **Playbook name**, enter a name for your playbook.
118118

119119
1. To monitor this playbook's activity for diagnostic purposes, select **Enable diagnostics logs in Log Analytics**, and then select a **Log Analytics workspace** unless you already selected a workspace.
120120

121121
1. Select **Next : Connections >**.
122122

123-
1. On the **Connections** tab, we recommend leaving the default values, which configures a logic app to connect to Microsoft Sentinel with a managed identity.
123+
1. On the **Connections** tab, we recommend leaving the default values, which configure a logic app to connect to Microsoft Sentinel with a managed identity.
124124

125125
For more information, see [Authenticate playbooks to Microsoft Sentinel](authenticate-playbooks-to-sentinel.md).
126126

@@ -162,7 +162,7 @@ Follow these steps to create your Standard logic app:
162162

163163
1. For **Pricing plan**, select the compute resources and their pricing for your logic app.
164164

165-
1. Under **Zone redunancy**, you can enable this capability if you selected an Azure region that supports availability zone redundancy.
165+
1. Under **Zone redundancy**, you can enable this capability if you selected an Azure region that supports availability zone redundancy.
166166

167167
For this example, leave the option disabled. For more information, see [Protect logic apps from region failures with zone redundancy and availability zones](/azure/logic-apps/set-up-zone-redundancy-availability-zones).
168168

@@ -188,7 +188,7 @@ Follow these steps to create your Standard logic app:
188188

189189
1. Under **Application Insights**, set **Enable Application Insights** to **No**.
190190

191-
This setting disables or enables performance monitoring with Application Insights in Azure Monitor. However, for Microsoft Sentintel, this capability isn't required and costs extra.
191+
This setting disables or enables performance monitoring with Application Insights in Azure Monitor. However, for Microsoft Sentinel, this capability isn't required and costs extra.
192192

193193
1. To apply tags to this logic app for resource categorization and billing purposes, select **Next : Tags >**. Otherwise, select **Review + create**.
194194

@@ -255,7 +255,7 @@ Follow these steps to create your Standard logic app:
255255

256256
1. Based on your selected authentication option, provide the necessary parameter values for the corresponding option.
257257

258-
For more information about these these parameters, see [Microsoft Sentinel connector reference](/connectors/azuresentinel/).
258+
For more information about these parameters, see [Microsoft Sentinel connector reference](/connectors/azuresentinel/).
259259

260260
1. When you finish, select **Create new**.
261261

@@ -308,15 +308,15 @@ To prevent this failure, we recommend that you create a condition that checks fo
308308

309309
1. In the editor, enter **null**, and select **Add**.
310310

311-
When you finish, your condtion looks simlar to the following example:
311+
When you finish, your condition looks similar to the following example:
312312

313313
:::image type="content" source="../media/create-playbooks/no-incident-id.png" alt-text="Screenshot shows extra condition to add before the Incident ARM ID field." lightbox="../media/create-playbooks/no-incident-id.png":::
314314

315315
### Dynamic content: Work with custom details
316316

317317
In the **Microsoft Sentinel incident** trigger, the **Alert custom details** output is an array of JSON objects where each represents a [custom detail from an alert](../surface-custom-details-in-alerts.md). Custom details are key-value pairs that let you surface information from events in the alert so they can be represented, tracked, and analyzed as part of the incident.
318318

319-
This field in the alert is customizable, so its schema depends on the type of event that's surfaced. To generate the schema that determines how to parse the custom details output, provide the data from an instance of this event:
319+
This field in the alert is customizable, so its schema depends on the type of event that is surfaced. To generate the schema that determines how to parse the custom details output, provide the data from an instance of this event:
320320

321321
1. On the Microsoft Sentinel workspace menu, under **Configuration**, select **Analytics**.
322322

@@ -365,17 +365,17 @@ To use custom fields for incident triggers, follow these steps for your workflow
365365

366366
:::image type="content" source="../media/create-playbooks/sample-payload.png" alt-text="Screenshot shows sample JSON payload." lightbox="../media/create-playbooks/sample-payload.png":::
367367

368-
When you finish, the **Schema** box now contains the generated schema based on the sample that you provided. The **Parse JSON** action creates custom fields that you cannow use as dynamic fields with **Array** type in your workflow's subsequent actions.
368+
When you finish, the **Schema** box now contains the generated schema based on the sample that you provided. The **Parse JSON** action creates custom fields that you can now use as dynamic fields with **Array** type in your workflow's subsequent actions.
369369

370-
The following example shows an array and its items, both in the schema and in the dynamic content list for a subsquent action named **Compose**:
370+
The following example shows an array and its items, both in the schema and in the dynamic content list for a subsequent action named **Compose**:
371371

372-
:::image type="content" source="../media/create-playbooks/custom-fields-ready-to-use.png" alt-text="Screenshot shows ready-to-use dynamic fields from the schema." lightbox="../media/create-playbooks/custom-fields-ready-to-use.png":::
372+
:::image type="content" source="../media/create-playbooks/custom-fields-ready-to-use.png" alt-text="Screenshot shows ready to use dynamic fields from the schema." lightbox="../media/create-playbooks/custom-fields-ready-to-use.png":::
373373

374374
## Manage your playbooks
375375

376376
Select the **Automation > Active playbooks** tab to view all the playbooks you have access to, filtered by your subscription view.
377377

378-
After onboarding to the unified security operations platform, by default the **Active playbooks** tab shows a predefined filter with onboarded workspace's subscription. **In the Azure portal**, edit the subscriptions you're showing from the **Directory + subscription** menu in the global Azure page header.
378+
After you onboard to the unified security operations platform, by default the **Active playbooks** tab shows a predefined filter with onboarded workspace's subscription. **In the Azure portal**, edit the subscriptions you're showing from the **Directory + subscription** menu in the global Azure page header.
379379

380380
While the **Active playbooks** tab displays all the active playbooks available across any selected subscriptions, by default a playbook can be used only within the subscription to which it belongs, unless you specifically grant Microsoft Sentinel permissions to the playbook's resource group.
381381

0 commit comments

Comments
 (0)