Skip to content

Commit 2173c99

Browse files
author
Ken Lawson
committed
Improved Acrolinx scores
1 parent fb289f3 commit 2173c99

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed

learn-pr/wwl-sci/configure-siem-security-operations-using-microsoft-sentinel/includes/2-exercise.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11

22
Now it's your chance to deploy and configure a Microsoft Sentinel workspace.
33

4-
In this exercise, you’ll learn how to create an Azure Log Analytics workspace and Deploy Microsoft Sentinel to the workspace.
4+
In this exercise, you learn how to create an Azure Log Analytics workspace and Deploy Microsoft Sentinel to the workspace.
55

66
> [!NOTE]
7-
> To complete this exercise, you will need an [Azure subscription](https://azure.microsoft.com/free?azure-portal=true).
7+
> To complete this exercise, you need an [Azure subscription](https://azure.microsoft.com/free?azure-portal=true).
88
99
Launch the exercise and follow the instructions.
1010

learn-pr/wwl-sci/configure-siem-security-operations-using-microsoft-sentinel/includes/3-exercise.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11

22
You've deployed and configured a Microsoft Sentinel workspace, now it's your chance to configure Microsoft Sentinel to ingest data by using Microsoft Sentinel solutions.
33

4-
In this exercise, you’ll learn how to install Microsoft Sentinel Content Hub solutions and data connectors.
4+
In this exercise, you learn how to install Microsoft Sentinel Content Hub solutions and data connectors.
55

66
> [!NOTE]
7-
> To complete this exercise, you will need to have completed the previous exercise and have an [Azure subscription](https://azure.microsoft.com/free?azure-portal=true).
7+
> To complete this exercise, you need to complete the previous exercise and have an [Azure subscription](https://azure.microsoft.com/free?azure-portal=true).
88
99
Launch the exercise and follow the instructions.
1010

learn-pr/wwl-sci/configure-siem-security-operations-using-microsoft-sentinel/includes/4-exercise.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11

2-
Now it's time to validate your Microsoft Sentinel deployment and configure data connectors to collect security events. You'll also create a near-real-time (NRT) query rule and configure an Automation rule.
2+
Now it's time to validate your Microsoft Sentinel deployment and configure data connectors to collect security events. You also create a near-real-time (NRT) query rule and configure an Automation rule.
33

4-
In this exercise, you’ll learn how to configure a data connector Data Collection Rule (DCR), detect threats with near-real-time (NRT) analytic rules, and configure automation in Microsoft Sentinel.
4+
In this exercise, you learn how to configure a data connector Data Collection Rule (DCR), detect threats with near-real-time (NRT) analytic rules, and configure automation in Microsoft Sentinel.
55

66
> [!NOTE]
7-
> To complete this exercise, you will need to have completed the previous two exercises and have an [Azure subscription](https://azure.microsoft.com/free?azure-portal=true).
7+
> To complete this exercise, you need to complete the previous two exercises and have an [Azure subscription](https://azure.microsoft.com/free?azure-portal=true).
88
99
Launch the exercise and follow the instructions.
1010

learn-pr/wwl-sci/configure-siem-security-operations-using-microsoft-sentinel/includes/5-exercise.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11

22
Now it's time to validate that our Microsoft Sentinel deployment is receiving security events and creating incidents from virtual machines that run Windows.
33

4-
In this exercise, you’ll learn how to perform a simulated attack to validate that the Analytic and Automation rules create an incident and assign it to the `Operator1`. You'll perform a `Privilege Escalation` attack on `vm1`.
4+
In this exercise, you learn how to perform a simulated attack to validate that the Analytic and Automation rules create an incident and assign it to the `Operator1`. You perform a `Privilege Escalation` attack on `vm1`.
55

66
> [!NOTE]
7-
> To complete this exercise, you will need to have completed the previous three exercises and have an [Azure subscription](https://azure.microsoft.com/free?azure-portal=true).
7+
> To complete this exercise, you need to complete the previous three exercises and have an [Azure subscription](https://azure.microsoft.com/free?azure-portal=true).
88
99
Launch the exercise and follow the instructions.
1010

0 commit comments

Comments
 (0)