Skip to content

Commit 1554f2a

Browse files
committed
Removed weird non-ASCII spaces
And smart quotes where found
1 parent 73a75f3 commit 1554f2a

21 files changed

+51
-51
lines changed

defender-xdr/advanced-hunting-deviceevents-table.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -97,12 +97,12 @@ For information on other tables in the advanced hunting schema, [see the advance
9797
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
9898
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
9999
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
100-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
101-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
100+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
101+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
102102
| `CreatedProcessSessionId` | `long` | Windows session ID of the created process |
103103
|`IsProcessRemoteSession` | `bool` | Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
104-
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created processs RDP session was initiated |
105-
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created processs RDP session was initiated |
104+
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created process's RDP session was initiated |
105+
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created process's RDP session was initiated |
106106

107107

108108

defender-xdr/advanced-hunting-devicefileevents-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,8 +94,8 @@ For information on other tables in the advanced hunting schema, [see the advance
9494
| `AdditionalFields` | `string` | Additional information about the entity or event |
9595
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
9696
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
97-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
98-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
97+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
98+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
9999

100100

101101
> [!NOTE]

defender-xdr/advanced-hunting-deviceimageloadevents-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,8 +78,8 @@ For information on other tables in the advanced hunting schema, [see the advance
7878
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
7979
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
8080
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
81-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
82-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
81+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
82+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
8383

8484

8585
## Related topics

defender-xdr/advanced-hunting-devicelogonevents-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,8 +87,8 @@ For information on other tables in the advanced hunting schema, [see the advance
8787
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
8888
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
8989
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
90-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
91-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
90+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
91+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
9292

9393

9494
> [!NOTE]

defender-xdr/advanced-hunting-devicenetworkevents-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,8 +83,8 @@ For information on other tables in the advanced hunting schema, [see the advance
8383
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
8484
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
8585
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
86-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
87-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
86+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
87+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
8888

8989

9090
## Related topics

defender-xdr/advanced-hunting-deviceprocessevents-table.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -101,12 +101,12 @@ For information on other tables in the advanced hunting schema, [see the advance
101101
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
102102
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
103103
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
104-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
105-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
104+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
105+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
106106
| `CreatedProcessSessionId` | `long` | Windows session ID of the created process |
107107
|`IsProcessRemoteSession` | `bool` | Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
108-
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created processs RDP session was initiated |
109-
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created processs RDP session was initiated |
108+
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created process's RDP session was initiated |
109+
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created process's RDP session was initiated |
110110

111111

112112
## Related topics

defender-xdr/advanced-hunting-deviceregistryevents-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,8 +79,8 @@ For information on other tables in the advanced hunting schema, [see the advance
7979
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
8080
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
8181
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
82-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
83-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
82+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
83+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
8484

8585

8686
## Related topics

defender-xdr/investigate-respond-container-threats.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ appliesto:
2626
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2727

2828
> [!IMPORTANT]
29-
> Some information in this article relates to a prereleased product, which may be substantially modified before its commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here
29+
> Some information in this article relates to a prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here
3030
3131
Security operations can now investigate and respond to container-related alerts in near real-time and hunt for related activities with the integration of cloud-native response actions and investigation logs in the Microsoft Defender portal. The availability of attack paths can also help analysts immediately investigate and address critical security issues to prevent a potential breach.
3232

@@ -100,7 +100,7 @@ Access threat analytics reports from **Threat intelligence > Threat analytics**.
100100

101101
:::image type="content" source="/defender/media/defender-containers/view-threat-analytics-small.png" alt-text="Highlighting how to view threat analytics reports from the incident page." lightbox="/defender/media/defender-containers/view-threat-analytics.png":::
102102

103-
Threat analytics reports also contain relevant mitigation, recovery, and prevention methods that analysts can assess and apply to their environment. Using the information in threat analytics reports helps SOC teams defend and protect their environment from container attacks. Heres an example of an analyst report about a container attack.
103+
Threat analytics reports also contain relevant mitigation, recovery, and prevention methods that analysts can assess and apply to their environment. Using the information in threat analytics reports helps SOC teams defend and protect their environment from container attacks. Here's an example of an analyst report about a container attack.
104104

105105
:::image type="content" source="/defender/media/defender-containers/threat-analytics-sample-small.png" alt-text="Sample page of a container attack threat analytics report." lightbox="/defender/media/defender-containers/threat-analytics-sample.png":::
106106

defender-xdr/irm-investigate-alerts-defender.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ appliesto:
2626
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2727

2828
> [!IMPORTANT]
29-
> Some information in this article relates to a prereleased product, which may be substantially modified before its commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here.
29+
> Some information in this article relates to a prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here.
3030
3131
[Microsoft Purview Insider Risk Management alerts](/purview/insider-risk-management-activities#alert-dashboard) in the Microsoft Defender portal are vital for protecting an organization's sensitive information and maintaining security. These alerts and insights from Microsoft Purview Insider Risk Management help identify and mitigate internal threats like data leaks and intellectual property theft by employees or contractors. Monitoring these alerts allows organizations to address security incidents proactively, ensuring sensitive data remains protected and compliance requirements are met.
3232

@@ -41,11 +41,11 @@ You can manage insider risk management alerts in the Microsoft Defender portal b
4141
- View individual insider risk alerts in the [alert queue](investigate-alerts.md).
4242
- Filter by service source on the incident and alert queues.
4343
- Hunt for all activities and all alerts related to the user in the insider risk alert.
44-
- View a users insider risk activity summary and risk level in the user entity page.
44+
- View a user's insider risk activity summary and risk level in the user entity page.
4545

4646
## Know before you begin
4747

48-
If youre new to Microsoft Purview and insider risk management, consider reading the following articles:
48+
If you're new to Microsoft Purview and insider risk management, consider reading the following articles:
4949

5050
- [Learn about Microsoft Purview](/purview/purview)
5151
- [Learn about Microsoft Purview Insider Risk Management](/purview/insider-risk-management)

defender-xdr/microsoft-threat-actor-naming.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The following table shows how the family names map to the threat actors that we
5252
|Influence operations|Influence operations|Flood|
5353
|Groups in development|Groups in development|Storm|
5454

55-
The following table lists publicly disclosed threat actor names with their origin or threat actor category, previous names, and corresponding names used by other security vendors where available. This page will be updated as more info on other vendors names become available.
55+
The following table lists publicly disclosed threat actor names with their origin or threat actor category, previous names, and corresponding names used by other security vendors where available. This page will be updated as more info on other vendors' names become available.
5656

5757
|Threat actor name|Origin/Threat actor category|Other names|
5858
|:-----|:-----|:---|

0 commit comments

Comments
 (0)