Skip to content

Spelling Fixes #27935

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 7 commits into from
Jun 13, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion src/ScVmm/ScVmm/help/Update-AzScVmmVMNic.md
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ Type : microsoft.scvmm/virtualmachineinsta
```

Update Network Interface of the SCVMM Virtual Machine.
It might take some time to sync the MacAddewss and Ipv4Address in the response.
It might take some time to sync the MacAddress and Ipv4Address in the response.
Use `Get-AzScVmmVM` command to fetch the latest configuration of the virtual machine.

## PARAMETERS
Expand Down
2 changes: 1 addition & 1 deletion src/Search/Search/help/New-AzSearchService.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ The command creates an Azure Cognitive Search service.
## PARAMETERS

### -AadAuthFailureMode
(Optional) What status code to return when failing AAD authentication, if both api key and AAD authenticaiton are allowed for the Azure Cognitive Search service
(Optional) What status code to return when failing AAD authentication, if both api key and AAD authentication are allowed for the Azure Cognitive Search service

```yaml
Type: System.Nullable`1[Microsoft.Azure.Commands.Management.Search.Models.PSAadAuthFailureMode]
Expand Down
2 changes: 1 addition & 1 deletion src/Search/Search/help/Set-AzSearchService.md
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@ The example changes partition count and replica count of the Azure Cognitive Sea
## PARAMETERS

### -AadAuthFailureMode
(Optional) What status code to return when failing AAD authentication, if both api key and AAD authenticaiton are allowed for the Azure Cognitive Search service
(Optional) What status code to return when failing AAD authentication, if both api key and AAD authentication are allowed for the Azure Cognitive Search service

```yaml
Type: System.Nullable`1[Microsoft.Azure.Commands.Management.Search.Models.PSAadAuthFailureMode]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -66,10 +66,10 @@ Supported resources are:
- VM: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/Microsoft.Compute/virtualMachines/{machineName}
- On-Premise: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/microsoft.operationalinsights/workspaces/{workspaceName}/onPremiseMachines/{machineName}

For on premise resources, the patameter machineName is composed as follows:
For on premise resources, the parameter machineName is composed as follows:
{ComputerName}_{AgentId}_{VmUuid}

Notice the @(,@('a','b',...)) syntax for array of arrays of string with only one inner array. Eeach inner array represents a row in the query results.
Notice the @(,@('a','b',...)) syntax for array of arrays of string with only one inner array. Each inner array represents a row in the query results.

### Example 2: Add results as baseline using on premise parameters.
```powershell
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,8 +34,8 @@ Disable-AzIotSecurityAnalyticsAggregatedAlert -ResourceId <String> [-PassThru]
```

## DESCRIPTION
The Disable-AzIotSecurityAnalyticsAggregatedAlert cmdlet dismisses a specific aggragated alert on devices of iot hub.
The name of the aggregated alerts is a combination of the alert type and the alert aggragted date, separated by '/'.
The Disable-AzIotSecurityAnalyticsAggregatedAlert cmdlet dismisses a specific aggregated alert on devices of iot hub.
The name of the aggregated alerts is a combination of the alert type and the alert aggregated date, separated by '/'.

## EXAMPLES

Expand Down
4 changes: 2 additions & 2 deletions src/Security/Security/help/Get-AzDeviceSecurityGroup.md
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ AllowlistRules: [
DenylistRules: []
```

Get device security group "MySecurityGroup" in IoT Hub with reasource Id "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Devices/IotHubs/MyHub"
Get device security group "MySecurityGroup" in IoT Hub with resource Id "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Devices/IotHubs/MyHub"

### Example 2
```powershell
Expand All @@ -89,7 +89,7 @@ Get-AzDeviceSecurityGroup -HubResourceId "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXX
Array of security group items like the item returned in example 1
```

Get list of device security group in IoT Hub with reasource Id "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Devices/IotHubs/MyHub"
Get list of device security group in IoT Hub with resource Id "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Devices/IotHubs/MyHub"

## PARAMETERS

Expand Down
4 changes: 2 additions & 2 deletions src/Security/Security/help/Get-AzIotSecurityAnalytics.md
Original file line number Diff line number Diff line change
Expand Up @@ -98,7 +98,7 @@ MostPrevalentDeviceRecommendations: [
DevicesCount: 170
}
{
RrecommendationDisplayName: "Same Authentication Credentials used by multiple devices"
RecommendationDisplayName: "Same Authentication Credentials used by multiple devices"
ReportedSeverity: "Medium"
DevicesCount: 150
}
Expand All @@ -107,7 +107,7 @@ MostPrevalentDeviceRecommendations: [
}
```

Get the deafult IoT Security Analytics for Security Solution "MySolution" in reasource group "MyResourceGroup"
Get the default IoT Security Analytics for Security Solution "MySolution" in resource group "MyResourceGroup"

## PARAMETERS

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ Get-AzIotSecurityAnalyticsAggregatedAlert -ResourceGroupName <String> -SolutionN

## DESCRIPTION
The Get-AzIotSecurityAnalyticsAggregatedAlert cmdlet returns one or more aggregated alerts on devices of iot hub.
The name of the aggregated alerts is a combination of the alert type and the alert aggragted date, separated by '/'.
The name of the aggregated alerts is a combination of the alert type and the alert aggregated date, separated by '/'.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Get-AzRegulatoryComplianceAssessment -ResourceId <String> [-DefaultProfile <IAzu
```

## DESCRIPTION
Get a spcific assessment details or list all the assessments under specific control and regulatory compliance standard.
Get a specific assessment details or list all the assessments under specific control and regulatory compliance standard.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Get-AzRegulatoryComplianceControl -ResourceId <String> [-DefaultProfile <IAzureC
```

## DESCRIPTION
Get a spcific control details or list all the controls under specific regulatory compliance standard.
Get a specific control details or list all the controls under specific regulatory compliance standard.

## EXAMPLES

Expand Down
2 changes: 1 addition & 1 deletion src/Security/Security/help/Get-AzSecurityAssessment.md
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ Get-AzSecurityAssessment -ResourceId <String> [-DefaultProfile <IAzureContextCon
```

## DESCRIPTION
Gets security assessment and their results on subscription. Security assessments will let you know which best practices are recommanded by Azure Security Center to be mitigated on your Azure subscription.
Gets security assessment and their results on subscription. Security assessments will let you know which best practices are recommended by Azure Security Center to be mitigated on your Azure subscription.

## EXAMPLES

Expand Down
2 changes: 1 addition & 1 deletion src/Security/Security/help/Get-AzSecuritySecureScore.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Get-AzSecuritySecureScore -Name <String> [-DefaultProfile <IAzureContextContaine
```

## DESCRIPTION
The Get-AzSecuritySecureScore comlet gets security secure scores and their results on a subscription.
The Get-AzSecuritySecureScore cmdlet gets security secure scores and their results on a subscription.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Get-AzSecuritySecureScoreControl -Name <String> [-DefaultProfile <IAzureContextC
```

## DESCRIPTION
The Get-AzSecuritySecureScoreControl comlet gets security secure score controls and their results on a subscription.
The Get-AzSecuritySecureScoreControl cmdlet gets security secure score controls and their results on a subscription.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Get-AzSecuritySecureScoreControlDefinition -Name <String> [-DefaultProfile <IAzu
```

## DESCRIPTION
The Get-AzSecuritySecureScoreControlDefinition comlet gets security secure score control definitions on a subscription.
The Get-AzSecuritySecureScoreControlDefinition cmdlet gets security secure score control definitions on a subscription.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ Get SQL vulnerability assessment baseline.

## EXAMPLES

### Example 1: Get baseline on a specific rule using resource id paramaters
### Example 1: Get baseline on a specific rule using resource id parameters
```powershell
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -RuleId "VA2108"
```
Expand All @@ -49,7 +49,7 @@ Supported resources are:
- VM: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/Microsoft.Compute/virtualMachines/{machineName}
- On-Premise: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/microsoft.operationalinsights/workspaces/{workspaceName}/onPremiseMachines/{machineName}

### Example 2: Get baseline on a specific rule using on premise paramaters
### Example 2: Get baseline on a specific rule using on premise parameters
```powershell
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -RuleId "VA2108"
```
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject -Enabled <Boolean> -Type
```

## DESCRIPTION
The New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject cmdlet creates a new list of denyed custom alert rules for device security group in IoT security solution.
The New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject cmdlet creates a new list of denied custom alert rules for device security group in IoT security solution.

## EXAMPLES

Expand All @@ -37,7 +37,7 @@ ValueType: "String"
DenylistValues: []
```

Create new deny list custom alert rule with rull type "SomeRuleType" and status set to desable
Create new deny list custom alert rule with rule type "SomeRuleType" and status set to disable

## PARAMETERS

Expand Down
2 changes: 1 addition & 1 deletion src/Security/Security/help/Remove-AzSecurityAssessment.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ Remove-AzSecurityAssessment -InputObject <PSSecurityAssessment> [-PassThru]
```

## DESCRIPTION
Deletes a security assessment result from a subscription, usually used when a resoruce is deleted or when the assessment is not relevant for a specific resource anymore
Deletes a security assessment result from a subscription, usually used when a resource is deleted or when the assessment is not relevant for a specific resource anymore

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -68,14 +68,14 @@ Are you sure you want to proceed with removing baseline for rule VA2108
[Y] Yes [N] No [S] Suspend [?] Help (default is "Y"): y
```

Example of using on premise parametes.
Example of using on premise parameters.

### Example 3: Remove all baselines on SQL Database using pipe
```powershell
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master | Remove-AzSecuritySqlVulnerabilityAssessmentBaseline -Force
```

Example for force removing all the baslines for all rules on a specific database.
Example for force removing all the baselines for all rules on a specific database.

## PARAMETERS

Expand Down
4 changes: 2 additions & 2 deletions src/Security/Security/help/Set-AzSecurityAssessment.md
Original file line number Diff line number Diff line change
Expand Up @@ -106,7 +106,7 @@ Accept wildcard characters: False
```

### -StatusCause
Progremmatic code for the cause of the assessment's result.
Programmatic code for the cause of the assessment's result.

```yaml
Type: System.String
Expand All @@ -121,7 +121,7 @@ Accept wildcard characters: False
```

### -StatusCode
Progremmatic code for the result of the assessment.
Programmatic code for the result of the assessment.
can be "Healthy", "Unhealthy" or "NotApplicable"

```yaml
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ Supported resources are:
- VM: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/Microsoft.Compute/virtualMachines/{machineName}
- On-Premise: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/microsoft.operationalinsights/workspaces/{workspaceName}/onPremiseMachines/{machineName}

For on premise resources, the patameter machineName is composed as follows:
For on premise resources, the parameter machineName is composed as follows:
{ComputerName}_{AgentId}_{VmUuid}

### Example 2: Set results as baseline using on premise parameters.
Expand Down
2 changes: 1 addition & 1 deletion src/Security/Security/help/Update-AzIotSecuritySolution.md
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ Update-AzIotSecuritySolution -InputObject <PSIotSecuritySolution> [-Tag <Hashtab
```

## DESCRIPTION
The Update-AzIotSecuritySolution cmdlet updayes one or more of the following properties in a specific IoT security solution: tags, recommendation configuration, user defined resources.
The Update-AzIotSecuritySolution cmdlet updates one or more of the following properties in a specific IoT security solution: tags, recommendation configuration, user defined resources.
Only the specified properties will be updated inside the iot security solution.
The IoT security solution collects security data and events from iot devices and iot hub to help prevent and detect threats.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -67,8 +67,8 @@ This command gets an Entity.

### Example 3: Get a Entity by object Id
```powershell
$Entitys = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName"
$Entitys[0] | Get-AzSentinelEntity
$Entities = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName"
$Entities[0] | Get-AzSentinelEntity
```

```output
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ $Entity = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspa
$Entity | Get-AzSentinelEntityActivity
```

This command gets insights and activies for an Entity by object
This command gets insights and activities for an Entity by object

## PARAMETERS

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,7 @@ This command creates an Alert Rule of the MicrosoftSecurityIncidentCreation kind

### Example 5: Create a Scheduled Alert Rule
```powershell
New-AzSentinelAlertRule -ResourceGroupName "myResourceGroup" -WorkspaceName "myWorkspaceName" -Kind Scheduled -Enabled -DisplayName "Powershell Exection Alert (Several Times per Hour)" -Severity Low -Query "SecurityEvent | where EventID == 4688" -QueryFrequency (New-TimeSpan -Hours 1) -QueryPeriod (New-TimeSpan -Hours 1) -TriggerThreshold 10 -TriggerOperator "GreaterThan"
New-AzSentinelAlertRule -ResourceGroupName "myResourceGroup" -WorkspaceName "myWorkspaceName" -Kind Scheduled -Enabled -DisplayName "Powershell Execution Alert (Several Times per Hour)" -Severity Low -Query "SecurityEvent | where EventID == 4688" -QueryFrequency (New-TimeSpan -Hours 1) -QueryPeriod (New-TimeSpan -Hours 1) -TriggerThreshold 10 -TriggerOperator "GreaterThan"
```

This command creates an Alert Rule of the Scheduled kind.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ Message NameAvailable Reason
True
```

Checks if resource name is avilabale/unique for the scope or not
Checks if resource name is available/unique for the scope or not

## PARAMETERS

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ ResourceGroupName : damorg
Status : Active
```

Get details of subcription `sub$$D` from ServiceBus topic `myTopic`.
Get details of subscription `sub$$D` from ServiceBus topic `myTopic`.

### Example 2: List all subscriptions in a topic
```powershell
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ New-AzServiceBusAuthorizationRuleSASToken [-AuthorizationRuleId] <String> [-KeyT
```

## DESCRIPTION
The New-AzServiceBusAuthorizationRuleSASToken cmdlet generates a Shared Access Signature (SAS) token for an Azure Eventhub Namesapce or Azure Eventhub
The New-AzServiceBusAuthorizationRuleSASToken cmdlet generates a Shared Access Signature (SAS) token for an Azure Eventhub Namespace or Azure Eventhub

## EXAMPLES

Expand Down
2 changes: 1 addition & 1 deletion src/ServiceBus/ServiceBus/help/Test-AzServiceBusName.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ Message
The specified name is not available. For more information visit https://aka.ms/eventhubsarmexceptions. False NameInUse
```

Checks the availability of alias name `myAlias` on namespace `myNamepace`.
Checks the availability of alias name `myAlias` on namespace `myNamespace`.

## PARAMETERS

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ Test-AzServiceBusNameAvailability -ResourceGroupName $resourceGroupName -Namespa
True
```

Returns True if the Provided $nameQueue name is Availabile or returns False if Provided $nameQueue name in not available
Returns True if the Provided $nameQueue name is Available or returns False if Provided $nameQueue name in not available

### Example 2
```powershell
Expand All @@ -49,7 +49,7 @@ Test-AzServiceBusNameAvailability -ResourceGroupName $resourceGroupName -Namespa
True
```

Returns True if the Provided $nameTopic name is Availabile or returns False if Provided $nameTopic name in not available
Returns True if the Provided $nameTopic name is Available or returns False if Provided $nameTopic name in not available

## PARAMETERS

Expand Down