Skip to content

fix spelling #3633

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Jun 4, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion azps-12.5.0/Az.Search/New-AzSearchService.md
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ The command creates an Azure Cognitive Search service.
## PARAMETERS

### -AadAuthFailureMode
(Optional) What status code to return when failing AAD authentication, if both api key and AAD authenticaiton are allowed for the Azure Cognitive Search service
(Optional) What status code to return when failing AAD authentication, if both api key and AAD authentication are allowed for the Azure Cognitive Search service

```yaml
Type: System.Nullable`1[Microsoft.Azure.Commands.Management.Search.Models.PSAadAuthFailureMode]
Expand Down
2 changes: 1 addition & 1 deletion azps-12.5.0/Az.Search/Set-AzSearchService.md
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ The example changes partition count and replica count of the Azure Cognitive Sea
## PARAMETERS

### -AadAuthFailureMode
(Optional) What status code to return when failing AAD authentication, if both api key and AAD authenticaiton are allowed for the Azure Cognitive Search service
(Optional) What status code to return when failing AAD authentication, if both api key and AAD authentication are allowed for the Azure Cognitive Search service

```yaml
Type: System.Nullable`1[Microsoft.Azure.Commands.Management.Search.Models.PSAadAuthFailureMode]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -68,10 +68,10 @@ Supported resources are:
- VM: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/Microsoft.Compute/virtualMachines/{machineName}
- On-Premise: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/microsoft.operationalinsights/workspaces/{workspaceName}/onPremiseMachines/{machineName}

For on premise resources, the patameter machineName is composed as follows:
For on premise resources, the parameter machineName is composed as follows:
{ComputerName}_{AgentId}_{VmUuid}

Notice the @(,@('a','b',...)) syntax for array of arrays of string with only one inner array. Eeach inner array represents a row in the query results.
Notice the @(,@('a','b',...)) syntax for array of arrays of string with only one inner array. Each inner array represents a row in the query results.

### Example 2: Add results as baseline using on premise parameters.
```powershell
Expand Down
2 changes: 1 addition & 1 deletion azps-12.5.0/Az.Security/Az.Security.md
Original file line number Diff line number Diff line change
Expand Up @@ -93,7 +93,7 @@ If an Azure API Management API is onboarded to Microsoft Defender for APIs, the
Gets security assessments and their results on a subscription

### [Get-AzSecurityAssessmentMetadata](Get-AzSecurityAssessmentMetadata.md)
Gets security assessments types and metadta in a subscription.
Gets security assessments types and metadata in a subscription.

### [Get-AzSecurityAutomation](Get-AzSecurityAutomation.md)
Gets security automations
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,24 +36,24 @@ Disable-AzIotSecurityAnalyticsAggregatedAlert -ResourceId <String> [-PassThru]
```

## DESCRIPTION
The Disable-AzIotSecurityAnalyticsAggregatedAlert cmdlet dismisses a specific aggragated alert on devices of iot hub.
The name of the aggregated alerts is a combination of the alert type and the alert aggragted date, separated by '/'.
The Disable-AzIotSecurityAnalyticsAggregatedAlert cmdlet dismisses a specific aggregated alert on devices of iot hub.
The name of the aggregated alerts is a combination of the alert type and the alert aggregated date, separated by '/'.

## EXAMPLES

### Example 1
```powershell
Disable-AzIotSecurityAnalyticsAggregatedAlert -ResourceGroupName "MyResourceGroup" -SolutionName "MySolutionName" -Name "IoT_SucessfulLocalLogin/2020-03-15"
Disable-AzIotSecurityAnalyticsAggregatedAlert -ResourceGroupName "MyResourceGroup" -SolutionName "MySolutionName" -Name "IoT_SuccessfulLocalLogin/2020-03-15"
```

Dismiss aggregated alert "IoT_SucessfulLocalLogin/2020-03-15" (name combined from alert type and its aggregated date) from the IoT security solution "MySolutionName" in resource group "MyResourceGroup"
Dismiss aggregated alert "IoT_SuccessfulLocalLogin/2020-03-15" (name combined from alert type and its aggregated date) from the IoT security solution "MySolutionName" in resource group "MyResourceGroup"

### Example 2
```powershell
Disable-AzIotSecurityAnalyticsAggregatedAlert -ResourceId "/subscriptions/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Security/iotSecuritySolutions/MySolutionName/analyticsModels/default/aggregatedAlerts/IoT_SucessfulLocalLogin/2020-03-15"
Disable-AzIotSecurityAnalyticsAggregatedAlert -ResourceId "/subscriptions/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Security/iotSecuritySolutions/MySolutionName/analyticsModels/default/aggregatedAlerts/IoT_SuccessfulLocalLogin/2020-03-15"
```

Dismiss aggregated alert with resource Id "/subscriptions/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Security/iotSecuritySolutions/MySolutionName/analyticsModels/default/aggregatedAlerts/IoT_SucessfulLocalLogin/2020-03-15"
Dismiss aggregated alert with resource Id "/subscriptions/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Security/iotSecuritySolutions/MySolutionName/analyticsModels/default/aggregatedAlerts/IoT_SuccessfulLocalLogin/2020-03-15"

## PARAMETERS

Expand Down
4 changes: 2 additions & 2 deletions azps-12.5.0/Az.Security/Get-AzDeviceSecurityGroup.md
Original file line number Diff line number Diff line change
Expand Up @@ -80,7 +80,7 @@ AllowlistRules: [
DenylistRules: []
```

Get device security group "MySecurityGroup" in IoT Hub with reasource Id "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Devices/IotHubs/MyHub"
Get device security group "MySecurityGroup" in IoT Hub with resource Id "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Devices/IotHubs/MyHub"

### Example 2
```powershell
Expand All @@ -91,7 +91,7 @@ Get-AzDeviceSecurityGroup -HubResourceId "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXX
Array of security group items like the item returned in example 1
```

Get list of device security group in IoT Hub with reasource Id "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Devices/IotHubs/MyHub"
Get list of device security group in IoT Hub with resource Id "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Devices/IotHubs/MyHub"

## PARAMETERS

Expand Down
2 changes: 1 addition & 1 deletion azps-12.5.0/Az.Security/Get-AzIotSecurityAnalytics.md
Original file line number Diff line number Diff line change
Expand Up @@ -109,7 +109,7 @@ MostPrevalentDeviceRecommendations: [
}
```

Get the deafult IoT Security Analytics for Security Solution "MySolution" in reasource group "MyResourceGroup"
Get the default IoT Security Analytics for Security Solution "MySolution" in resource group "MyResourceGroup"

## PARAMETERS

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ Get-AzIotSecurityAnalyticsAggregatedAlert -ResourceGroupName <String> -SolutionN

## DESCRIPTION
The Get-AzIotSecurityAnalyticsAggregatedAlert cmdlet returns one or more aggregated alerts on devices of iot hub.
The name of the aggregated alerts is a combination of the alert type and the alert aggragted date, separated by '/'.
The name of the aggregated alerts is a combination of the alert type and the alert aggregated date, separated by '/'.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ Get-AzRegulatoryComplianceAssessment -ResourceId <String> [-DefaultProfile <IAzu
```

## DESCRIPTION
Get a spcific assessment details or list all the assessments under specific control and regulatory compliance standard.
Get a specific assessment details or list all the assessments under specific control and regulatory compliance standard.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ Get-AzRegulatoryComplianceControl -ResourceId <String> [-DefaultProfile <IAzureC
```

## DESCRIPTION
Get a spcific control details or list all the controls under specific regulatory compliance standard.
Get a specific control details or list all the controls under specific regulatory compliance standard.

## EXAMPLES

Expand Down
2 changes: 1 addition & 1 deletion azps-12.5.0/Az.Security/Get-AzSecurityAssessment.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ Get-AzSecurityAssessment -ResourceId <String> [-DefaultProfile <IAzureContextCon
```

## DESCRIPTION
Gets security assessment and their results on subscription. Security assessments will let you know which best practices are recommanded by Azure Security Center to be mitigated on your Azure subscription.
Gets security assessment and their results on subscription. Security assessments will let you know which best practices are recommended by Azure Security Center to be mitigated on your Azure subscription.

## EXAMPLES

Expand Down
4 changes: 2 additions & 2 deletions azps-12.5.0/Az.Security/Get-AzSecurityAssessmentMetadata.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/main/sr
# Get-AzSecurityAssessmentMetadata

## SYNOPSIS
Gets security assessments types and metadta in a subscription.
Gets security assessments types and metadata in a subscription.

## SYNTAX

Expand All @@ -33,7 +33,7 @@ Get-AzSecurityAssessmentMetadata -ResourceId <String> [-DefaultProfile <IAzureCo
```

## DESCRIPTION
Gets security assessments types and metadta in a subscription. Security Assessment metadata include Built-In assessments and custom assessment types that the user can define.
Gets security assessments types and metadata in a subscription. Security Assessment metadata include Built-In assessments and custom assessment types that the user can define.

## EXAMPLES

Expand Down
2 changes: 1 addition & 1 deletion azps-12.5.0/Az.Security/Get-AzSecuritySecureScore.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ Get-AzSecuritySecureScore -Name <String> [-DefaultProfile <IAzureContextContaine
```

## DESCRIPTION
The Get-AzSecuritySecureScore comlet gets security secure scores and their results on a subscription.
The Get-AzSecuritySecureScore cmdlet gets security secure scores and their results on a subscription.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ Get-AzSecuritySecureScoreControl -Name <String> [-DefaultProfile <IAzureContextC
```

## DESCRIPTION
The Get-AzSecuritySecureScoreControl comlet gets security secure score controls and their results on a subscription.
The Get-AzSecuritySecureScoreControl cmdlet gets security secure score controls and their results on a subscription.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ Get-AzSecuritySecureScoreControlDefinition -Name <String> [-DefaultProfile <IAzu
```

## DESCRIPTION
The Get-AzSecuritySecureScoreControlDefinition comlet gets security secure score control definitions on a subscription.
The Get-AzSecuritySecureScoreControlDefinition cmdlet gets security secure score control definitions on a subscription.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ Get SQL vulnerability assessment baseline.

## EXAMPLES

### Example 1: Get baseline on a specific rule using resource id paramaters
### Example 1: Get baseline on a specific rule using resource id parameters
```powershell
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -RuleId "VA2108"
```
Expand All @@ -51,7 +51,7 @@ Supported resources are:
- VM: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/Microsoft.Compute/virtualMachines/{machineName}
- On-Premise: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/microsoft.operationalinsights/workspaces/{workspaceName}/onPremiseMachines/{machineName}

### Example 2: Get baseline on a specific rule using on premise paramaters
### Example 2: Get baseline on a specific rule using on premise parameters
```powershell
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -RuleId "VA2108"
```
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ ValueType: "String"
AllowlistValues: []
```

Create new allow list custom alert rull from type "LocalUserNotAllowed" with status set to disable
Create new allow list custom alert rule from type "LocalUserNotAllowed" with status set to disable

## PARAMETERS

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject -Enabled <Boolean> -Type
```

## DESCRIPTION
The New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject cmdlet creates a new list of denyed custom alert rules for device security group in IoT security solution.
The New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject cmdlet creates a new list of denied custom alert rules for device security group in IoT security solution.

## EXAMPLES

Expand All @@ -39,7 +39,7 @@ ValueType: "String"
DenylistValues: []
```

Create new deny list custom alert rule with rull type "SomeRuleType" and status set to desable
Create new deny list custom alert rule with rule type "SomeRuleType" and status set to disable

## PARAMETERS

Expand Down
2 changes: 1 addition & 1 deletion azps-12.5.0/Az.Security/New-AzSecurityConnector.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ $dcspmOffering = New-AzSecurityDefenderCspmAwsOfferingObject `
-MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SCloudRoleArn "$arnPrefix/MDCContainersAgentlessDiscoveryK8sRole"

$defenderForContainersOffering = New-AzSecurityDefenderForContainersAwsOfferingObject `
-AutoProvisioning $true -KuberneteServiceCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s" -KuberneteScubaReaderCloudRoleArn "$arnPrefix/DefenderForCloud-DataCollection" `
-AutoProvisioning $true -KubernetesServiceCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s" -KubernetesScubaReaderCloudRoleArn "$arnPrefix/DefenderForCloud-DataCollection" `
-KinesiToS3CloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s-kinesis-to-s3" -CloudWatchToKinesiCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s-cloudwatch-to-kinesis" `
-KubeAuditRetentionTime 30 -ScubaExternalId "a47ae0a2-7bf7-482a-897a-7a139d30736c" `
-MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SCloudRoleArn "$arnPrefix/MDCContainersAgentlessDiscoveryK8sRole" `
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,8 +19,8 @@ New-AzSecurityDefenderForContainersAwsOfferingObject [-AutoProvisioning <Boolean
[-CloudWatchToKinesiCloudRoleArn <String>] [-ContainerVulnerabilityAssessmentCloudRoleArn <String>]
[-ContainerVulnerabilityAssessmentTaskCloudRoleArn <String>]
[-EnableContainerVulnerabilityAssessment <Boolean>] [-KinesiToS3CloudRoleArn <String>]
[-KubeAuditRetentionTime <Int64>] [-KuberneteScubaReaderCloudRoleArn <String>]
[-KuberneteServiceCloudRoleArn <String>] [-MdcContainerAgentlessDiscoveryK8SCloudRoleArn <String>]
[-KubeAuditRetentionTime <Int64>] [-KubernetesScubaReaderCloudRoleArn <String>]
[-KubernetesServiceCloudRoleArn <String>] [-MdcContainerAgentlessDiscoveryK8SCloudRoleArn <String>]
[-MdcContainerAgentlessDiscoveryK8SEnabled <Boolean>] [-MdcContainerImageAssessmentCloudRoleArn <String>]
[-MdcContainerImageAssessmentEnabled <Boolean>] [-ScubaExternalId <String>]
[<CommonParameters>]
Expand All @@ -35,7 +35,7 @@ Create an in-memory object for DefenderForContainersAwsOffering.
```powershell
$arnPrefix = "arn:aws:iam::123456789012:role"
New-AzSecurityDefenderForContainersAwsOfferingObject `
-AutoProvisioning $true -KuberneteServiceCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s" -KuberneteScubaReaderCloudRoleArn "$arnPrefix/DefenderForCloud-DataCollection" `
-AutoProvisioning $true -KubernetesServiceCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s" -KubernetesScubaReaderCloudRoleArn "$arnPrefix/DefenderForCloud-DataCollection" `
-KinesiToS3CloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s-kinesis-to-s3" -CloudWatchToKinesiCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s-cloudwatch-to-kinesis" `
-KubeAuditRetentionTime 30 -ScubaExternalId "a47ae0a2-7bf7-482a-897a-7a139d30736c" `
-MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SCloudRoleArn "$arnPrefix/MDCContainersAgentlessDiscoveryK8sRole" `
Expand Down Expand Up @@ -169,7 +169,7 @@ Accept pipeline input: False
Accept wildcard characters: False
```

### -KuberneteScubaReaderCloudRoleArn
### -KubernetesScubaReaderCloudRoleArn
The cloud role ARN in AWS for this feature used for reading data.

```yaml
Expand All @@ -184,7 +184,7 @@ Accept pipeline input: False
Accept wildcard characters: False
```

### -KuberneteServiceCloudRoleArn
### -KubernetesServiceCloudRoleArn
The cloud role ARN in AWS for this feature used for provisioning resources.

```yaml
Expand Down
2 changes: 1 addition & 1 deletion azps-12.5.0/Az.Security/Remove-AzSecurityAssessment.md
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ Remove-AzSecurityAssessment -InputObject <PSSecurityAssessment> [-PassThru]
```

## DESCRIPTION
Deletes a security assessment result from a subscription, usually used when a resoruce is deleted or when the assessment is not relevant for a specific resource anymore
Deletes a security assessment result from a subscription, usually used when a resource is deleted or when the assessment is not relevant for a specific resource anymore

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -70,14 +70,14 @@ Are you sure you want to proceed with removing baseline for rule VA2108
[Y] Yes [N] No [S] Suspend [?] Help (default is "Y"): y
```

Example of using on premise parametes.
Example of using on premise parameters.

### Example 3: Remove all baselines on SQL Database using pipe
```powershell
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master | Remove-AzSecuritySqlVulnerabilityAssessmentBaseline -Force
```

Example for force removing all the baslines for all rules on a specific database.
Example for force removing all the baselines for all rules on a specific database.

## PARAMETERS

Expand Down
4 changes: 2 additions & 2 deletions azps-12.5.0/Az.Security/Set-AzSecurityAssessment.md
Original file line number Diff line number Diff line change
Expand Up @@ -108,7 +108,7 @@ Accept wildcard characters: False
```

### -StatusCause
Progremmatic code for the cause of the assessment's result.
Programmatic code for the cause of the assessment's result.

```yaml
Type: System.String
Expand All @@ -123,7 +123,7 @@ Accept wildcard characters: False
```

### -StatusCode
Progremmatic code for the result of the assessment.
Programmatic code for the result of the assessment.
can be "Healthy", "Unhealthy" or "NotApplicable"

```yaml
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@ Supported resources are:
- VM: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/Microsoft.Compute/virtualMachines/{machineName}
- On-Premise: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/microsoft.operationalinsights/workspaces/{workspaceName}/onPremiseMachines/{machineName}

For on premise resources, the patameter machineName is composed as follows:
For on premise resources, the parameter machineName is composed as follows:
{ComputerName}_{AgentId}_{VmUuid}

### Example 2: Set results as baseline using on premise parameters.
Expand Down
2 changes: 1 addition & 1 deletion azps-12.5.0/Az.Security/Update-AzIotSecuritySolution.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ Update-AzIotSecuritySolution -InputObject <PSIotSecuritySolution> [-Tag <Hashtab
```

## DESCRIPTION
The Update-AzIotSecuritySolution cmdlet updayes one or more of the following properties in a specific IoT security solution: tags, recommendation configuration, user defined resources.
The Update-AzIotSecuritySolution cmdlet updates one or more of the following properties in a specific IoT security solution: tags, recommendation configuration, user defined resources.
Only the specified properties will be updated inside the iot security solution.
The IoT security solution collects security data and events from iot devices and iot hub to help prevent and detect threats.

Expand Down
4 changes: 2 additions & 2 deletions azps-12.5.0/Az.SecurityInsights/Get-AzSentinelEntity.md
Original file line number Diff line number Diff line change
Expand Up @@ -69,8 +69,8 @@ This command gets an Entity.

### Example 3: Get a Entity by object Id
```powershell
$Entitys = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName"
$Entitys[0] | Get-AzSentinelEntity
$Entities = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName"
$Entities[0] | Get-AzSentinelEntity
```

```output
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ $Entity = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspa
$Entity | Get-AzSentinelEntityActivity
```

This command gets insights and activies for an Entity by object
This command gets insights and activities for an Entity by object

## PARAMETERS

Expand Down
Loading