Skip to content

Commit 5513ce5

Browse files
committed
Fix spelling mistake
1 parent 6eabdb4 commit 5513ce5

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/cse/get-started-with-cloud-siem/intro-for-administrators.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -309,7 +309,7 @@ In this section, we’ll write a rule that looks for three unique Windows event
309309
1. For **On Entity** select **device_ip**, since that's the unique entity we want to track.
310310
1. Enter a description in **with the description**.
311311
1. Under **with a severity of** select any severity score you think is appropriate for your rule.
312-
1. In **with tags** select **Tactic** and **TA0001 - Intial Access**. Because we’re looking for failed logins, these are attempts at initial access.
312+
1. In **with tags** select **Tactic** and **TA0001 - Initial Access**. Because we’re looking for failed logins, these are attempts at initial access.
313313
1. Select the **Save this rule as a prototype** checkbox.
314314
1. Click **Submit** to save your rule.
315315

0 commit comments

Comments
 (0)