Skip to content

Commit e4fcd72

Browse files
committed
more acrolinx fixes
1 parent b0081da commit e4fcd72

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

CloudAppSecurityDocs/protect-atlassian.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -146,13 +146,13 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
146146

147147
## Rate limits and limitations
148148

149-
- **Rate limits** include 1000 requests per minute (per API key/connector instance).
149+
- **Rate limits** include 1,000 requests per minute (per API key/connector instance).
150150

151151
For more information about the Atlassian API limitation, see [Atlassian admin REST APIs](https://developer.atlassian.com/cloud/admin/about/#about-the-cloud-admin-rest-apis).
152152

153153
- **Limitations** include:
154154

155-
- Activities will be shown in Defender for Cloud Apps only for users with a verified domain.
155+
- Activities are shown in Defender for Cloud Apps only for users with a verified domain.
156156

157157
- The API key has a maximum expiration period of one year. After one year, you'll need to create another API key from the Atlassian Admin portal and replace it for the old API Key in the Defender for Cloud Apps console.
158158

CloudAppSecurityDocs/protect-azure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88

99

1010

11-
Azure is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the benefits of leveraging infrastructure in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and virtual private networks that enable access to your organization.
11+
Azure is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the benefits of leveraging infrastructure in the cloud, your organization's most critical assets might be exposed to threats. Exposed assets include storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and virtual private networks that enable access to your organization.
1212

1313
Connecting Azure to Defender for Cloud Apps helps you secure your assets and detect potential threats by monitoring administrative and sign-in activities, notifying on possible brute force attacks, malicious use of a privileged user account, and unusual deletions of VMs.
1414

@@ -74,7 +74,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
7474
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
7575

7676
> [!NOTE]
77-
> After connecting Azure, data will be pulled. You will see data from then onwards.
77+
> After connecting to Azure, data will be pulled. You'll see data from then onwards.
7878
7979
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
8080

0 commit comments

Comments
 (0)