Skip to content

Commit a1cad49

Browse files
committedJun 25, 2020
Reviewer requests round 2
1 parent ca1b9ad commit a1cad49

File tree

6 files changed

+4
-4
lines changed

6 files changed

+4
-4
lines changed
 

‎articles/sentinel/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@
9999
href: connect-cef-solution-config.md
100100
items:
101101
- name: AI Vectra Detect
102-
href: connect-aivectra-detect.md
102+
href: connect-ai-vectra-detect.md
103103
- name: Check Point
104104
href: connect-checkpoint.md
105105
- name: Cisco ASA

‎articles/sentinel/connect-alcide-kaudit.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Alcide kAudit can export logs directly to Azure Sentinel.
4242

4343
1. When asked for the Workspace ID and the Primary Key, you can copy them from the Alcide kAudit data connector page.
4444

45-
:::image type="content" source="media/connect-alcide-kaudit/alcide-workspace-id-primkey.png" alt-text="Workspace ID and Primary Key":::
45+
:::image type="content" source="media/connect-alcide-kaudit/alcide-workspace-id-primary-key.png" alt-text="Workspace ID and Primary Key":::
4646

4747
## Find your data
4848

‎articles/sentinel/connect-cef-solution-config.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ In this step you will perform the necessary configuration changes on your securi
2525

2626
If your security solution already has an existing connector, use the connector-specific instructions as follows:
2727

28-
- [AI Vectra Detect](connect-aivectra-detect.md)
28+
- [AI Vectra Detect](connect-ai-vectra-detect.md)
2929
- [Check Point](connect-checkpoint.md)
3030
- [Cisco](connect-cisco.md)
3131
- [ExtraHop Reveal(x)](connect-extrahop.md)

‎articles/sentinel/connect-data-sources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ The following data connection methods are supported by Azure Sentinel:
7676
The Azure Sentinel agent, which is actually the Log Analytics agent, converts CEF-formatted logs into a format that can be ingested by Log Analytics. Depending on the appliance type, the agent is installed either directly on the appliance, or on a dedicated Linux-based log forwarder. The agent for Linux receives events from the Syslog daemon over UDP, but if a Linux machine is expected to collect a high volume of Syslog events, they are sent over TCP from the Syslog daemon to the agent and from there to Log Analytics.
7777

7878
- **Firewalls, proxies, and endpoints:**
79-
- [AI Vectra Detect](connect-aivectra-detect.md)
79+
- [AI Vectra Detect](connect-ai-vectra-detect.md)
8080
- [Check Point](connect-checkpoint.md)
8181
- [Cisco ASA](connect-cisco.md)
8282
- [ExtraHop Reveal(x)](connect-extrahop.md)

0 commit comments

Comments
 (0)
Please sign in to comment.