Skip to content

Commit 3401883

Browse files
acro fix
1 parent 71fca5d commit 3401883

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-xdr/advanced-hunting-cloudprocessevents-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ For information on other tables in the advanced hunting schema, [see the advance
4141
| `AzureResourceId` | `string` | Unique identifier of the Azure resource associated with the process |
4242
| `AwsResourceName` | `string` | Unique identifier specific to Amazon Web Services devices, containing the Amazon resource name|
4343
| `GcpFullResourceName` | `string` | Unique identifier specific to Google Cloud Platform devices, containing a combination of zone and ID for GCP |
44-
| `ContainerImageName` | `string` | UThe container image name or ID, if it exists |
44+
| `ContainerImageName` | `string` | The container image name or ID, if it exists |
4545
| `KubernetesNamespace` | `string` | The Kubernetes namespace name |
4646
| `KubernetesPodName` | `string` | The Kubernetes pod name |
4747
| `KubernetesResource` | `string` | Identifier value that includes namespace, resource type and name |
@@ -76,7 +76,7 @@ To hunt for process events including a given term (represented by "x" in the que
7676
CloudProcessEvents | where ProcessCommandLine has "x"
7777
```
7878

79-
### Rare process events for a pod in a Kuberentes cluster
79+
### Rare process events for a pod in a Kubernetes cluster
8080
To investigate unusual process events invoked as part of a pod in a Kubernetes cluster:
8181

8282
```kusto

0 commit comments

Comments
 (0)