-
Notifications
You must be signed in to change notification settings - Fork 1.8k
Apply markdownlint (23) #39471
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Apply markdownlint (23) #39471
Conversation
Your contributed AlphaSOC_Wisdom pack has been modified on files:Packs/AlphaSOC_Wisdom/Integrations/AlphaSOCWisdom/README.md |
|
Validate summary Verdict: PR can be force merged from validate perspective? ✅ |
47fd5c6
into
packwise/markdownlint-0421-21-26
* AWS-SecurityLake: Apply markdownlint * CrowdStrikeIntel: Apply markdownlint * Fortanix-DSM: Apply markdownlint * C2sec: Apply markdownlint * CheckpointFirewall: Apply markdownlint * Arkime: Apply markdownlint * DynamicSectionReports: Apply markdownlint * jamf: Apply markdownlint * Attlasian: Apply markdownlint * NetscoutAED: Apply markdownlint * AnsibleTower: Apply markdownlint * Lansweeper: Apply markdownlint * Sigma: Apply markdownlint * ConcentricAI: Apply markdownlint * Oracle: Apply markdownlint * DelineaALM: Apply markdownlint * ThreatExchange: Apply markdownlint * ThinkstCanary: Apply markdownlint * AlphaSOC_Wisdom: Apply markdownlint * Tripwire: Apply markdownlint * SandBlastAppliance: Apply markdownlint * NGINXWebServer: Apply markdownlint * OSQuery: Apply markdownlint * KnowBe4KMSAT: Apply markdownlint * SignalSciences: Apply markdownlint --------- Co-authored-by: Content Bot <bot@demisto.com> Co-authored-by: Maya Goldman <94686128+mayyagoldman@users.noreply.github.com>
* required yml fields to allow mapping * added markdownlint hook to pre commit * Revert Microsoft365Defender.yml to match master * mdx-validation * invalid.md test file * valid * invalid + run on mdx * changed files * invalid readme * modified is_html_doc * for file in $(git ls-files '*.md') * refactor test * refactor test * refactor test * refactor test * Validate MDX for README.md files * Validate MDX for README.md files * Validate MDX for README.md files * Validate MDX for README.md files * fix * only changed files * changed * the EOF delimiter should be alone on its own line without quotes * `EOF' * Validate README.md files * Validate README.md files * Validate README.md files * check which files are returne * Validate Root README.md with MDX * Validate All README.md Files with MDX * removed echo - too long * removed echo - too long * all of them * removed echos * eof * fi * done * pass file * collect errors * collect errors * collect errors * collect errors * collect errors * check if html * fix mdx * dependencies * read entire file + html placeholders * exclude node mosules * exclude node mosules * validate-mdx hook init * markdown lint version * markdown lint version * markdown lint version * Test commit * stage * validate mdx custom hook * validate mdx custom hook * validate mdx custom hook added to template * removed unnecessery logs * html should pass validation * modified logs * removed the workflow * removed top of file * require_serial: true * require_serial: true revert * - "@mdx-js/mdx@^1.6.22" * require_serial: true * markdownlint hook for readmes * test readme * removed unneccesery logs * mdx-validation versioning * delete test * revert README.md * remove pre-commit-config * revert test readme * frop require serieal * demo comments * demo comments * html rules * excluded non fixable > 150 occurences rules * md042 * MD052 and MD036 excluded * updated markdownlint * use markdownlint-cli2 * "default": false dont allow any rules * Revert "md042" This reverts commit f0ce628. * added rules that currently aren't violated in content * Revert "added rules that currently aren't violated in content" This reverts commit cde0a8a. * added rules that trigger 0 erros in our repo (#39393) * Ciac 11349 md039 (#39363) * fixed MD039 * added rule MD039 * Ciac 11349 md042 (#39365) * md042 * added MD042 to rules * added MD042 to rules * Ciac 11349 md025 (#39366) * added MD025 to rules * manual fixes * Ciac 11349 md005 (#39367) * manual fixes * added rule * auto fix * disable md005 fp * remove dot * Ciac 11349 md052 (#39368) * added md052 * disabled md052 fp * pre commit * pr comments - use power of async with promises * pre commit * pre commit * rn * clean up * updated rn * validate * rn * rn * Bump pack from version MicrosoftGraphSecurity to 2.2.27. * Bump pack from version AzureSQLManagement to 1.2.7. * Bump pack from version MicrosoftGraphAPI to 1.1.56. * Update 1_2_8.md * Update 1_0_4.md * Update 1_0_14.md * Update 1_0_17.md * Update 1_5_45.md * Update 1_3_8.md * Update 1_4_9.md * Update 1_0_14.md * Update 1_1_46.md * Update 1_2_7.md * Update 1_3_8.md * Update 1_2_39.md * Update 1_2_33.md * Update 1_2_9.md * Update 1_0_4.md * Update 1_1_31.md * Update 1_0_17.md * Update 1_1_56.md * Update 1_6_26.md * Update 2_2_27.md * Update 1_5_45.md * Update 1_3_54.md * Update 1_0_19.md * update docker image * update docker image rn * Apply markdownlint (20) (#39468) * CrowdStrikeFalconX: Apply markdownlint * SailPointIdentityNow: Apply markdownlint * IP2LocationIO: Apply markdownlint * CSCDomainManager: Apply markdownlint * DelineaDSV: Apply markdownlint * CyberChef: Apply markdownlint * BeyondTrustPrivilegedRemoteAccess: Apply markdownlint * ICEBRG: Apply markdownlint * RemoteAccess: Apply markdownlint * MalwareBazaar: Apply markdownlint * Celonis: Apply markdownlint * AzureSecurityCenter: Apply markdownlint * Active_Directory_Query: Apply markdownlint * Infocyte: Apply markdownlint * DigitalGuardian: Apply markdownlint * SecBI: Apply markdownlint * XSIAMCompliance_PCI_DSS: Apply markdownlint * FeedSpamhaus: Apply markdownlint * Barracuda: Apply markdownlint * McAfee-TIE: Apply markdownlint * GitHub: Apply markdownlint * OpenCTI: Apply markdownlint * CarbonBlackDefense: Apply markdownlint * FeedCyrenThreatInDepth: Apply markdownlint * Rapid7AppSec: Apply markdownlint --------- Co-authored-by: Content Bot <bot@demisto.com> * Apply markdownlint (21) (#39469) * MicrosoftGraphAPI: Apply markdownlint * XSIAMCompliance_GDPR: Apply markdownlint * ProofpointIsolation: Apply markdownlint * Vectra: Apply markdownlint * SafeNet_Trusted_Access: Apply markdownlint * OSXCollector: Apply markdownlint * Imperva_WAF: Apply markdownlint * CrowdSec: Apply markdownlint * FortiAuthenticator: Apply markdownlint * McAfee_Advanced_Threat_Defense: Apply markdownlint * iDefense: Apply markdownlint * CybleEvents: Apply markdownlint * UltraMSG: Apply markdownlint * BloodHoundEnterprise: Apply markdownlint * ThreatMiner: Apply markdownlint * RTIR: Apply markdownlint * MajorBreachesInvestigationandResponse: Apply markdownlint * VaronisDataSecurityPlatform: Apply markdownlint * nessus: Apply markdownlint * FreeFeeds: Apply markdownlint * FireEyeHX: Apply markdownlint * Flashpoint: Apply markdownlint * AlienVault_USM_Anywhere: Apply markdownlint * CheckPointHarmonyEndpoint: Apply markdownlint * Orca: Apply markdownlint --------- Co-authored-by: Content Bot <bot@demisto.com> Co-authored-by: mayagoldman <mgoldman@paloaltonetworks.com> * Apply markdownlint (22) (#39470) * MandiantAdvantageThreatIntelligence: Apply markdownlint * GoogleChatViaWebhook: Apply markdownlint * SplunkPy: Apply markdownlint * Trellix_ePO: Apply markdownlint * AWS-CloudTrail: Apply markdownlint * GmailSingleUser: Apply markdownlint * FeedCognyteLuminar: Apply markdownlint * ZeroFox: Apply markdownlint * JARM: Apply markdownlint * GoogleKubernetesEngine: Apply markdownlint * SkyhighSecurity: Apply markdownlint * FeedPlainText: Apply markdownlint * PaloAltoNetworksAIOps: Apply markdownlint * CaseManagement-Generic: Apply markdownlint * Code42: Apply markdownlint * AnsibleAlibabaCloud: Apply markdownlint * AzureSentinel: Apply markdownlint * MicrosoftExchangeOnline: Apply markdownlint * Kafka: Apply markdownlint * CrisisManagement: Apply markdownlint * VMwareWorkspaceONEUEM: Apply markdownlint * MicrosoftGraphApplications: Apply markdownlint * AnsibleLinux: Apply markdownlint * DemistoLocking: Apply markdownlint * 3CXDesktopApp_Supply_Chain_Attack: Apply markdownlint --------- Co-authored-by: Content Bot <bot@demisto.com> Co-authored-by: mayagoldman <mgoldman@paloaltonetworks.com> * Apply markdownlint (23) (#39471) * AWS-SecurityLake: Apply markdownlint * CrowdStrikeIntel: Apply markdownlint * Fortanix-DSM: Apply markdownlint * C2sec: Apply markdownlint * CheckpointFirewall: Apply markdownlint * Arkime: Apply markdownlint * DynamicSectionReports: Apply markdownlint * jamf: Apply markdownlint * Attlasian: Apply markdownlint * NetscoutAED: Apply markdownlint * AnsibleTower: Apply markdownlint * Lansweeper: Apply markdownlint * Sigma: Apply markdownlint * ConcentricAI: Apply markdownlint * Oracle: Apply markdownlint * DelineaALM: Apply markdownlint * ThreatExchange: Apply markdownlint * ThinkstCanary: Apply markdownlint * AlphaSOC_Wisdom: Apply markdownlint * Tripwire: Apply markdownlint * SandBlastAppliance: Apply markdownlint * NGINXWebServer: Apply markdownlint * OSQuery: Apply markdownlint * KnowBe4KMSAT: Apply markdownlint * SignalSciences: Apply markdownlint --------- Co-authored-by: Content Bot <bot@demisto.com> Co-authored-by: Maya Goldman <94686128+mayyagoldman@users.noreply.github.com> * secrets ignore * RM102 * REVERT CHANGES TO RN --------- Co-authored-by: Content Bot <bot@demisto.com> Co-authored-by: content-bot <55035720+content-bot@users.noreply.github.com>
* required yml fields to allow mapping * added markdownlint hook to pre commit * Revert Microsoft365Defender.yml to match master * mdx-validation * invalid.md test file * valid * invalid + run on mdx * changed files * invalid readme * modified is_html_doc * for file in $(git ls-files '*.md') * refactor test * refactor test * refactor test * refactor test * Validate MDX for README.md files * Validate MDX for README.md files * Validate MDX for README.md files * Validate MDX for README.md files * fix * only changed files * changed * the EOF delimiter should be alone on its own line without quotes * `EOF' * Validate README.md files * Validate README.md files * Validate README.md files * check which files are returne * Validate Root README.md with MDX * Validate All README.md Files with MDX * removed echo - too long * removed echo - too long * all of them * removed echos * eof * fi * done * pass file * collect errors * collect errors * collect errors * collect errors * collect errors * check if html * fix mdx * dependencies * read entire file + html placeholders * exclude node mosules * exclude node mosules * validate-mdx hook init * markdown lint version * markdown lint version * markdown lint version * Test commit * stage * validate mdx custom hook * validate mdx custom hook * validate mdx custom hook added to template * removed unnecessery logs * html should pass validation * modified logs * removed the workflow * removed top of file * require_serial: true * require_serial: true revert * - "@mdx-js/mdx@^1.6.22" * require_serial: true * markdownlint hook for readmes * test readme * removed unneccesery logs * mdx-validation versioning * delete test * revert README.md * remove pre-commit-config * revert test readme * frop require serieal * demo comments * demo comments * html rules * excluded non fixable > 150 occurences rules * md042 * MD052 and MD036 excluded * updated markdownlint * use markdownlint-cli2 * "default": false dont allow any rules * Revert "md042" This reverts commit f0ce628. * added rules that currently aren't violated in content * Revert "added rules that currently aren't violated in content" This reverts commit cde0a8a. * added rules that trigger 0 erros in our repo (demisto#39393) * Ciac 11349 md039 (demisto#39363) * fixed MD039 * added rule MD039 * Ciac 11349 md042 (demisto#39365) * md042 * added MD042 to rules * added MD042 to rules * Ciac 11349 md025 (demisto#39366) * added MD025 to rules * manual fixes * Ciac 11349 md005 (demisto#39367) * manual fixes * added rule * auto fix * disable md005 fp * remove dot * Ciac 11349 md052 (demisto#39368) * added md052 * disabled md052 fp * pre commit * pr comments - use power of async with promises * pre commit * pre commit * rn * clean up * updated rn * validate * rn * rn * Bump pack from version MicrosoftGraphSecurity to 2.2.27. * Bump pack from version AzureSQLManagement to 1.2.7. * Bump pack from version MicrosoftGraphAPI to 1.1.56. * Update 1_2_8.md * Update 1_0_4.md * Update 1_0_14.md * Update 1_0_17.md * Update 1_5_45.md * Update 1_3_8.md * Update 1_4_9.md * Update 1_0_14.md * Update 1_1_46.md * Update 1_2_7.md * Update 1_3_8.md * Update 1_2_39.md * Update 1_2_33.md * Update 1_2_9.md * Update 1_0_4.md * Update 1_1_31.md * Update 1_0_17.md * Update 1_1_56.md * Update 1_6_26.md * Update 2_2_27.md * Update 1_5_45.md * Update 1_3_54.md * Update 1_0_19.md * update docker image * update docker image rn * Apply markdownlint (20) (demisto#39468) * CrowdStrikeFalconX: Apply markdownlint * SailPointIdentityNow: Apply markdownlint * IP2LocationIO: Apply markdownlint * CSCDomainManager: Apply markdownlint * DelineaDSV: Apply markdownlint * CyberChef: Apply markdownlint * BeyondTrustPrivilegedRemoteAccess: Apply markdownlint * ICEBRG: Apply markdownlint * RemoteAccess: Apply markdownlint * MalwareBazaar: Apply markdownlint * Celonis: Apply markdownlint * AzureSecurityCenter: Apply markdownlint * Active_Directory_Query: Apply markdownlint * Infocyte: Apply markdownlint * DigitalGuardian: Apply markdownlint * SecBI: Apply markdownlint * XSIAMCompliance_PCI_DSS: Apply markdownlint * FeedSpamhaus: Apply markdownlint * Barracuda: Apply markdownlint * McAfee-TIE: Apply markdownlint * GitHub: Apply markdownlint * OpenCTI: Apply markdownlint * CarbonBlackDefense: Apply markdownlint * FeedCyrenThreatInDepth: Apply markdownlint * Rapid7AppSec: Apply markdownlint --------- Co-authored-by: Content Bot <bot@demisto.com> * Apply markdownlint (21) (demisto#39469) * MicrosoftGraphAPI: Apply markdownlint * XSIAMCompliance_GDPR: Apply markdownlint * ProofpointIsolation: Apply markdownlint * Vectra: Apply markdownlint * SafeNet_Trusted_Access: Apply markdownlint * OSXCollector: Apply markdownlint * Imperva_WAF: Apply markdownlint * CrowdSec: Apply markdownlint * FortiAuthenticator: Apply markdownlint * McAfee_Advanced_Threat_Defense: Apply markdownlint * iDefense: Apply markdownlint * CybleEvents: Apply markdownlint * UltraMSG: Apply markdownlint * BloodHoundEnterprise: Apply markdownlint * ThreatMiner: Apply markdownlint * RTIR: Apply markdownlint * MajorBreachesInvestigationandResponse: Apply markdownlint * VaronisDataSecurityPlatform: Apply markdownlint * nessus: Apply markdownlint * FreeFeeds: Apply markdownlint * FireEyeHX: Apply markdownlint * Flashpoint: Apply markdownlint * AlienVault_USM_Anywhere: Apply markdownlint * CheckPointHarmonyEndpoint: Apply markdownlint * Orca: Apply markdownlint --------- Co-authored-by: Content Bot <bot@demisto.com> Co-authored-by: mayagoldman <mgoldman@paloaltonetworks.com> * Apply markdownlint (22) (demisto#39470) * MandiantAdvantageThreatIntelligence: Apply markdownlint * GoogleChatViaWebhook: Apply markdownlint * SplunkPy: Apply markdownlint * Trellix_ePO: Apply markdownlint * AWS-CloudTrail: Apply markdownlint * GmailSingleUser: Apply markdownlint * FeedCognyteLuminar: Apply markdownlint * ZeroFox: Apply markdownlint * JARM: Apply markdownlint * GoogleKubernetesEngine: Apply markdownlint * SkyhighSecurity: Apply markdownlint * FeedPlainText: Apply markdownlint * PaloAltoNetworksAIOps: Apply markdownlint * CaseManagement-Generic: Apply markdownlint * Code42: Apply markdownlint * AnsibleAlibabaCloud: Apply markdownlint * AzureSentinel: Apply markdownlint * MicrosoftExchangeOnline: Apply markdownlint * Kafka: Apply markdownlint * CrisisManagement: Apply markdownlint * VMwareWorkspaceONEUEM: Apply markdownlint * MicrosoftGraphApplications: Apply markdownlint * AnsibleLinux: Apply markdownlint * DemistoLocking: Apply markdownlint * 3CXDesktopApp_Supply_Chain_Attack: Apply markdownlint --------- Co-authored-by: Content Bot <bot@demisto.com> Co-authored-by: mayagoldman <mgoldman@paloaltonetworks.com> * Apply markdownlint (23) (demisto#39471) * AWS-SecurityLake: Apply markdownlint * CrowdStrikeIntel: Apply markdownlint * Fortanix-DSM: Apply markdownlint * C2sec: Apply markdownlint * CheckpointFirewall: Apply markdownlint * Arkime: Apply markdownlint * DynamicSectionReports: Apply markdownlint * jamf: Apply markdownlint * Attlasian: Apply markdownlint * NetscoutAED: Apply markdownlint * AnsibleTower: Apply markdownlint * Lansweeper: Apply markdownlint * Sigma: Apply markdownlint * ConcentricAI: Apply markdownlint * Oracle: Apply markdownlint * DelineaALM: Apply markdownlint * ThreatExchange: Apply markdownlint * ThinkstCanary: Apply markdownlint * AlphaSOC_Wisdom: Apply markdownlint * Tripwire: Apply markdownlint * SandBlastAppliance: Apply markdownlint * NGINXWebServer: Apply markdownlint * OSQuery: Apply markdownlint * KnowBe4KMSAT: Apply markdownlint * SignalSciences: Apply markdownlint --------- Co-authored-by: Content Bot <bot@demisto.com> Co-authored-by: Maya Goldman <94686128+mayyagoldman@users.noreply.github.com> * secrets ignore * RM102 * REVERT CHANGES TO RN --------- Co-authored-by: Content Bot <bot@demisto.com> Co-authored-by: content-bot <55035720+content-bot@users.noreply.github.com>
* required yml fields to allow mapping * added markdownlint hook to pre commit * Revert Microsoft365Defender.yml to match master * mdx-validation * invalid.md test file * valid * invalid + run on mdx * changed files * invalid readme * modified is_html_doc * for file in $(git ls-files '*.md') * refactor test * refactor test * refactor test * refactor test * Validate MDX for README.md files * Validate MDX for README.md files * Validate MDX for README.md files * Validate MDX for README.md files * fix * only changed files * changed * the EOF delimiter should be alone on its own line without quotes * `EOF' * Validate README.md files * Validate README.md files * Validate README.md files * check which files are returne * Validate Root README.md with MDX * Validate All README.md Files with MDX * removed echo - too long * removed echo - too long * all of them * removed echos * eof * fi * done * pass file * collect errors * collect errors * collect errors * collect errors * collect errors * check if html * fix mdx * dependencies * read entire file + html placeholders * exclude node mosules * exclude node mosules * validate-mdx hook init * markdown lint version * markdown lint version * markdown lint version * Test commit * stage * validate mdx custom hook * validate mdx custom hook * validate mdx custom hook added to template * removed unnecessery logs * html should pass validation * modified logs * removed the workflow * removed top of file * require_serial: true * require_serial: true revert * - "@mdx-js/mdx@^1.6.22" * require_serial: true * markdownlint hook for readmes * test readme * removed unneccesery logs * mdx-validation versioning * delete test * revert README.md * remove pre-commit-config * revert test readme * frop require serieal * demo comments * demo comments * html rules * excluded non fixable > 150 occurences rules * md042 * MD052 and MD036 excluded * updated markdownlint * use markdownlint-cli2 * "default": false dont allow any rules * Revert "md042" This reverts commit f0ce628. * added rules that currently aren't violated in content * Revert "added rules that currently aren't violated in content" This reverts commit cde0a8a. * added rules that trigger 0 erros in our repo (demisto#39393) * Ciac 11349 md039 (demisto#39363) * fixed MD039 * added rule MD039 * Ciac 11349 md042 (demisto#39365) * md042 * added MD042 to rules * added MD042 to rules * Ciac 11349 md025 (demisto#39366) * added MD025 to rules * manual fixes * Ciac 11349 md005 (demisto#39367) * manual fixes * added rule * auto fix * disable md005 fp * remove dot * Ciac 11349 md052 (demisto#39368) * added md052 * disabled md052 fp * pre commit * pr comments - use power of async with promises * pre commit * pre commit * rn * clean up * updated rn * validate * rn * rn * Bump pack from version MicrosoftGraphSecurity to 2.2.27. * Bump pack from version AzureSQLManagement to 1.2.7. * Bump pack from version MicrosoftGraphAPI to 1.1.56. * Update 1_2_8.md * Update 1_0_4.md * Update 1_0_14.md * Update 1_0_17.md * Update 1_5_45.md * Update 1_3_8.md * Update 1_4_9.md * Update 1_0_14.md * Update 1_1_46.md * Update 1_2_7.md * Update 1_3_8.md * Update 1_2_39.md * Update 1_2_33.md * Update 1_2_9.md * Update 1_0_4.md * Update 1_1_31.md * Update 1_0_17.md * Update 1_1_56.md * Update 1_6_26.md * Update 2_2_27.md * Update 1_5_45.md * Update 1_3_54.md * Update 1_0_19.md * update docker image * update docker image rn * Apply markdownlint (20) (demisto#39468) * CrowdStrikeFalconX: Apply markdownlint * SailPointIdentityNow: Apply markdownlint * IP2LocationIO: Apply markdownlint * CSCDomainManager: Apply markdownlint * DelineaDSV: Apply markdownlint * CyberChef: Apply markdownlint * BeyondTrustPrivilegedRemoteAccess: Apply markdownlint * ICEBRG: Apply markdownlint * RemoteAccess: Apply markdownlint * MalwareBazaar: Apply markdownlint * Celonis: Apply markdownlint * AzureSecurityCenter: Apply markdownlint * Active_Directory_Query: Apply markdownlint * Infocyte: Apply markdownlint * DigitalGuardian: Apply markdownlint * SecBI: Apply markdownlint * XSIAMCompliance_PCI_DSS: Apply markdownlint * FeedSpamhaus: Apply markdownlint * Barracuda: Apply markdownlint * McAfee-TIE: Apply markdownlint * GitHub: Apply markdownlint * OpenCTI: Apply markdownlint * CarbonBlackDefense: Apply markdownlint * FeedCyrenThreatInDepth: Apply markdownlint * Rapid7AppSec: Apply markdownlint --------- Co-authored-by: Content Bot <bot@demisto.com> * Apply markdownlint (21) (demisto#39469) * MicrosoftGraphAPI: Apply markdownlint * XSIAMCompliance_GDPR: Apply markdownlint * ProofpointIsolation: Apply markdownlint * Vectra: Apply markdownlint * SafeNet_Trusted_Access: Apply markdownlint * OSXCollector: Apply markdownlint * Imperva_WAF: Apply markdownlint * CrowdSec: Apply markdownlint * FortiAuthenticator: Apply markdownlint * McAfee_Advanced_Threat_Defense: Apply markdownlint * iDefense: Apply markdownlint * CybleEvents: Apply markdownlint * UltraMSG: Apply markdownlint * BloodHoundEnterprise: Apply markdownlint * ThreatMiner: Apply markdownlint * RTIR: Apply markdownlint * MajorBreachesInvestigationandResponse: Apply markdownlint * VaronisDataSecurityPlatform: Apply markdownlint * nessus: Apply markdownlint * FreeFeeds: Apply markdownlint * FireEyeHX: Apply markdownlint * Flashpoint: Apply markdownlint * AlienVault_USM_Anywhere: Apply markdownlint * CheckPointHarmonyEndpoint: Apply markdownlint * Orca: Apply markdownlint --------- Co-authored-by: Content Bot <bot@demisto.com> Co-authored-by: mayagoldman <mgoldman@paloaltonetworks.com> * Apply markdownlint (22) (demisto#39470) * MandiantAdvantageThreatIntelligence: Apply markdownlint * GoogleChatViaWebhook: Apply markdownlint * SplunkPy: Apply markdownlint * Trellix_ePO: Apply markdownlint * AWS-CloudTrail: Apply markdownlint * GmailSingleUser: Apply markdownlint * FeedCognyteLuminar: Apply markdownlint * ZeroFox: Apply markdownlint * JARM: Apply markdownlint * GoogleKubernetesEngine: Apply markdownlint * SkyhighSecurity: Apply markdownlint * FeedPlainText: Apply markdownlint * PaloAltoNetworksAIOps: Apply markdownlint * CaseManagement-Generic: Apply markdownlint * Code42: Apply markdownlint * AnsibleAlibabaCloud: Apply markdownlint * AzureSentinel: Apply markdownlint * MicrosoftExchangeOnline: Apply markdownlint * Kafka: Apply markdownlint * CrisisManagement: Apply markdownlint * VMwareWorkspaceONEUEM: Apply markdownlint * MicrosoftGraphApplications: Apply markdownlint * AnsibleLinux: Apply markdownlint * DemistoLocking: Apply markdownlint * 3CXDesktopApp_Supply_Chain_Attack: Apply markdownlint --------- Co-authored-by: Content Bot <bot@demisto.com> Co-authored-by: mayagoldman <mgoldman@paloaltonetworks.com> * Apply markdownlint (23) (demisto#39471) * AWS-SecurityLake: Apply markdownlint * CrowdStrikeIntel: Apply markdownlint * Fortanix-DSM: Apply markdownlint * C2sec: Apply markdownlint * CheckpointFirewall: Apply markdownlint * Arkime: Apply markdownlint * DynamicSectionReports: Apply markdownlint * jamf: Apply markdownlint * Attlasian: Apply markdownlint * NetscoutAED: Apply markdownlint * AnsibleTower: Apply markdownlint * Lansweeper: Apply markdownlint * Sigma: Apply markdownlint * ConcentricAI: Apply markdownlint * Oracle: Apply markdownlint * DelineaALM: Apply markdownlint * ThreatExchange: Apply markdownlint * ThinkstCanary: Apply markdownlint * AlphaSOC_Wisdom: Apply markdownlint * Tripwire: Apply markdownlint * SandBlastAppliance: Apply markdownlint * NGINXWebServer: Apply markdownlint * OSQuery: Apply markdownlint * KnowBe4KMSAT: Apply markdownlint * SignalSciences: Apply markdownlint --------- Co-authored-by: Content Bot <bot@demisto.com> Co-authored-by: Maya Goldman <94686128+mayyagoldman@users.noreply.github.com> * secrets ignore * RM102 * REVERT CHANGES TO RN --------- Co-authored-by: Content Bot <bot@demisto.com> Co-authored-by: content-bot <55035720+content-bot@users.noreply.github.com>
Metadata and documentation improvements.