Skip to content

Commit 17f09de

Browse files
Update reference/data-analysis/machine-learning/ootb-ml-jobs-siem.md
Co-authored-by: Susan <[email protected]>
1 parent 409e490 commit 17f09de

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

reference/data-analysis/machine-learning/ootb-ml-jobs-siem.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ By default, when you create these job in the {{security-app}}, it uses a {{data-
3737
| suspicious_login_activity | Detect unusually high number of authentication attempts. | [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_auth/ml/suspicious_login_activity.json)| [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_auth/ml/datafeed_suspicious_login_activity.json)| [System](https://www.elastic.co/docs/reference/integrations/system), [{{elastic-defend}}](https://www.elastic.co/docs/reference/integrations/endpoint), [Auditd Manager](https://www.elastic.co/docs/reference/integrations/auditd_manager) | windows, linux |
3838

3939

40-
## Security: Azure Activiy Logs [security-azure-activitylogs]
40+
## Security: Azure Activity Logs [security-azure-activitylogs]
4141

4242
Detect suspicious activity recorded in your Azure Activity Logs.
4343

0 commit comments

Comments
 (0)