Skip to content

Commit bf3636f

Browse files
authored
Merge branch 'main' into sai-addfolderformapping
2 parents c2109d0 + 1e310ac commit bf3636f

File tree

111 files changed

+188
-188
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

111 files changed

+188
-188
lines changed

azps-12.5.0/Az.Search/New-AzSearchService.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The command creates an Azure Cognitive Search service.
5050
## PARAMETERS
5151

5252
### -AadAuthFailureMode
53-
(Optional) What status code to return when failing AAD authentication, if both api key and AAD authenticaiton are allowed for the Azure Cognitive Search service
53+
(Optional) What status code to return when failing AAD authentication, if both api key and AAD authentication are allowed for the Azure Cognitive Search service
5454

5555
```yaml
5656
Type: System.Nullable`1[Microsoft.Azure.Commands.Management.Search.Models.PSAadAuthFailureMode]

azps-12.5.0/Az.Search/Set-AzSearchService.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ The example changes partition count and replica count of the Azure Cognitive Sea
6666
## PARAMETERS
6767

6868
### -AadAuthFailureMode
69-
(Optional) What status code to return when failing AAD authentication, if both api key and AAD authenticaiton are allowed for the Azure Cognitive Search service
69+
(Optional) What status code to return when failing AAD authentication, if both api key and AAD authentication are allowed for the Azure Cognitive Search service
7070

7171
```yaml
7272
Type: System.Nullable`1[Microsoft.Azure.Commands.Management.Search.Models.PSAadAuthFailureMode]

azps-12.5.0/Az.Security/Add-AzSecuritySqlVulnerabilityAssessmentBaseline.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,10 +68,10 @@ Supported resources are:
6868
- VM: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/Microsoft.Compute/virtualMachines/{machineName}
6969
- On-Premise: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/microsoft.operationalinsights/workspaces/{workspaceName}/onPremiseMachines/{machineName}
7070

71-
For on premise resources, the patameter machineName is composed as follows:
71+
For on premise resources, the parameter machineName is composed as follows:
7272
{ComputerName}_{AgentId}_{VmUuid}
7373

74-
Notice the @(,@('a','b',...)) syntax for array of arrays of string with only one inner array. Eeach inner array represents a row in the query results.
74+
Notice the @(,@('a','b',...)) syntax for array of arrays of string with only one inner array. Each inner array represents a row in the query results.
7575

7676
### Example 2: Add results as baseline using on premise parameters.
7777
```powershell

azps-12.5.0/Az.Security/Az.Security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ If an Azure API Management API is onboarded to Microsoft Defender for APIs, the
9393
Gets security assessments and their results on a subscription
9494

9595
### [Get-AzSecurityAssessmentMetadata](Get-AzSecurityAssessmentMetadata.md)
96-
Gets security assessments types and metadta in a subscription.
96+
Gets security assessments types and metadata in a subscription.
9797

9898
### [Get-AzSecurityAutomation](Get-AzSecurityAutomation.md)
9999
Gets security automations

azps-12.5.0/Az.Security/Disable-AzIotSecurityAnalyticsAggregatedAlert.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -36,24 +36,24 @@ Disable-AzIotSecurityAnalyticsAggregatedAlert -ResourceId <String> [-PassThru]
3636
```
3737

3838
## DESCRIPTION
39-
The Disable-AzIotSecurityAnalyticsAggregatedAlert cmdlet dismisses a specific aggragated alert on devices of iot hub.
40-
The name of the aggregated alerts is a combination of the alert type and the alert aggragted date, separated by '/'.
39+
The Disable-AzIotSecurityAnalyticsAggregatedAlert cmdlet dismisses a specific aggregated alert on devices of iot hub.
40+
The name of the aggregated alerts is a combination of the alert type and the alert aggregated date, separated by '/'.
4141

4242
## EXAMPLES
4343

4444
### Example 1
4545
```powershell
46-
Disable-AzIotSecurityAnalyticsAggregatedAlert -ResourceGroupName "MyResourceGroup" -SolutionName "MySolutionName" -Name "IoT_SucessfulLocalLogin/2020-03-15"
46+
Disable-AzIotSecurityAnalyticsAggregatedAlert -ResourceGroupName "MyResourceGroup" -SolutionName "MySolutionName" -Name "IoT_SuccessfulLocalLogin/2020-03-15"
4747
```
4848

49-
Dismiss aggregated alert "IoT_SucessfulLocalLogin/2020-03-15" (name combined from alert type and its aggregated date) from the IoT security solution "MySolutionName" in resource group "MyResourceGroup"
49+
Dismiss aggregated alert "IoT_SuccessfulLocalLogin/2020-03-15" (name combined from alert type and its aggregated date) from the IoT security solution "MySolutionName" in resource group "MyResourceGroup"
5050

5151
### Example 2
5252
```powershell
53-
Disable-AzIotSecurityAnalyticsAggregatedAlert -ResourceId "/subscriptions/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Security/iotSecuritySolutions/MySolutionName/analyticsModels/default/aggregatedAlerts/IoT_SucessfulLocalLogin/2020-03-15"
53+
Disable-AzIotSecurityAnalyticsAggregatedAlert -ResourceId "/subscriptions/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Security/iotSecuritySolutions/MySolutionName/analyticsModels/default/aggregatedAlerts/IoT_SuccessfulLocalLogin/2020-03-15"
5454
```
5555

56-
Dismiss aggregated alert with resource Id "/subscriptions/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Security/iotSecuritySolutions/MySolutionName/analyticsModels/default/aggregatedAlerts/IoT_SucessfulLocalLogin/2020-03-15"
56+
Dismiss aggregated alert with resource Id "/subscriptions/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Security/iotSecuritySolutions/MySolutionName/analyticsModels/default/aggregatedAlerts/IoT_SuccessfulLocalLogin/2020-03-15"
5757

5858
## PARAMETERS
5959

azps-12.5.0/Az.Security/Get-AzDeviceSecurityGroup.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ AllowlistRules: [
8080
DenylistRules: []
8181
```
8282

83-
Get device security group "MySecurityGroup" in IoT Hub with reasource Id "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Devices/IotHubs/MyHub"
83+
Get device security group "MySecurityGroup" in IoT Hub with resource Id "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Devices/IotHubs/MyHub"
8484

8585
### Example 2
8686
```powershell
@@ -91,7 +91,7 @@ Get-AzDeviceSecurityGroup -HubResourceId "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXX
9191
Array of security group items like the item returned in example 1
9292
```
9393

94-
Get list of device security group in IoT Hub with reasource Id "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Devices/IotHubs/MyHub"
94+
Get list of device security group in IoT Hub with resource Id "/subscriptions/XXXXXXXX-XXXX-XXXXX-XXXX-XXXXXXXXXXXX/resourceGroups/MyResourceGroup/providers/Microsoft.Devices/IotHubs/MyHub"
9595

9696
## PARAMETERS
9797

azps-12.5.0/Az.Security/Get-AzIotSecurityAnalytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ MostPrevalentDeviceRecommendations: [
109109
}
110110
```
111111

112-
Get the deafult IoT Security Analytics for Security Solution "MySolution" in reasource group "MyResourceGroup"
112+
Get the default IoT Security Analytics for Security Solution "MySolution" in resource group "MyResourceGroup"
113113

114114
## PARAMETERS
115115

azps-12.5.0/Az.Security/Get-AzIotSecurityAnalyticsAggregatedAlert.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Get-AzIotSecurityAnalyticsAggregatedAlert -ResourceGroupName <String> -SolutionN
2828

2929
## DESCRIPTION
3030
The Get-AzIotSecurityAnalyticsAggregatedAlert cmdlet returns one or more aggregated alerts on devices of iot hub.
31-
The name of the aggregated alerts is a combination of the alert type and the alert aggragted date, separated by '/'.
31+
The name of the aggregated alerts is a combination of the alert type and the alert aggregated date, separated by '/'.
3232

3333
## EXAMPLES
3434

azps-12.5.0/Az.Security/Get-AzRegulatoryComplianceAssessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Get-AzRegulatoryComplianceAssessment -ResourceId <String> [-DefaultProfile <IAzu
2727
```
2828

2929
## DESCRIPTION
30-
Get a spcific assessment details or list all the assessments under specific control and regulatory compliance standard.
30+
Get a specific assessment details or list all the assessments under specific control and regulatory compliance standard.
3131

3232
## EXAMPLES
3333

azps-12.5.0/Az.Security/Get-AzRegulatoryComplianceControl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Get-AzRegulatoryComplianceControl -ResourceId <String> [-DefaultProfile <IAzureC
2727
```
2828

2929
## DESCRIPTION
30-
Get a spcific control details or list all the controls under specific regulatory compliance standard.
30+
Get a specific control details or list all the controls under specific regulatory compliance standard.
3131

3232
## EXAMPLES
3333

azps-12.5.0/Az.Security/Get-AzSecurityAssessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Get-AzSecurityAssessment -ResourceId <String> [-DefaultProfile <IAzureContextCon
3939
```
4040

4141
## DESCRIPTION
42-
Gets security assessment and their results on subscription. Security assessments will let you know which best practices are recommanded by Azure Security Center to be mitigated on your Azure subscription.
42+
Gets security assessment and their results on subscription. Security assessments will let you know which best practices are recommended by Azure Security Center to be mitigated on your Azure subscription.
4343

4444
## EXAMPLES
4545

azps-12.5.0/Az.Security/Get-AzSecurityAssessmentMetadata.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/main/sr
1010
# Get-AzSecurityAssessmentMetadata
1111

1212
## SYNOPSIS
13-
Gets security assessments types and metadta in a subscription.
13+
Gets security assessments types and metadata in a subscription.
1414

1515
## SYNTAX
1616

@@ -33,7 +33,7 @@ Get-AzSecurityAssessmentMetadata -ResourceId <String> [-DefaultProfile <IAzureCo
3333
```
3434

3535
## DESCRIPTION
36-
Gets security assessments types and metadta in a subscription. Security Assessment metadata include Built-In assessments and custom assessment types that the user can define.
36+
Gets security assessments types and metadata in a subscription. Security Assessment metadata include Built-In assessments and custom assessment types that the user can define.
3737

3838
## EXAMPLES
3939

azps-12.5.0/Az.Security/Get-AzSecuritySecureScore.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Get-AzSecuritySecureScore -Name <String> [-DefaultProfile <IAzureContextContaine
2727
```
2828

2929
## DESCRIPTION
30-
The Get-AzSecuritySecureScore comlet gets security secure scores and their results on a subscription.
30+
The Get-AzSecuritySecureScore cmdlet gets security secure scores and their results on a subscription.
3131

3232
## EXAMPLES
3333

azps-12.5.0/Az.Security/Get-AzSecuritySecureScoreControl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Get-AzSecuritySecureScoreControl -Name <String> [-DefaultProfile <IAzureContextC
2727
```
2828

2929
## DESCRIPTION
30-
The Get-AzSecuritySecureScoreControl comlet gets security secure score controls and their results on a subscription.
30+
The Get-AzSecuritySecureScoreControl cmdlet gets security secure score controls and their results on a subscription.
3131

3232
## EXAMPLES
3333

azps-12.5.0/Az.Security/Get-AzSecuritySecureScoreControlDefinition.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Get-AzSecuritySecureScoreControlDefinition -Name <String> [-DefaultProfile <IAzu
2727
```
2828

2929
## DESCRIPTION
30-
The Get-AzSecuritySecureScoreControlDefinition comlet gets security secure score control definitions on a subscription.
30+
The Get-AzSecuritySecureScoreControlDefinition cmdlet gets security secure score control definitions on a subscription.
3131

3232
## EXAMPLES
3333

azps-12.5.0/Az.Security/Get-AzSecuritySqlVulnerabilityAssessmentBaseline.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Get SQL vulnerability assessment baseline.
3333

3434
## EXAMPLES
3535

36-
### Example 1: Get baseline on a specific rule using resource id paramaters
36+
### Example 1: Get baseline on a specific rule using resource id parameters
3737
```powershell
3838
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -RuleId "VA2108"
3939
```
@@ -51,7 +51,7 @@ Supported resources are:
5151
- VM: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/Microsoft.Compute/virtualMachines/{machineName}
5252
- On-Premise: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/microsoft.operationalinsights/workspaces/{workspaceName}/onPremiseMachines/{machineName}
5353

54-
### Example 2: Get baseline on a specific rule using on premise paramaters
54+
### Example 2: Get baseline on a specific rule using on premise parameters
5555
```powershell
5656
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -RuleId "VA2108"
5757
```

azps-12.5.0/Az.Security/New-AzDeviceSecurityGroupAllowlistCustomAlertRuleObject.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ ValueType: "String"
3939
AllowlistValues: []
4040
```
4141

42-
Create new allow list custom alert rull from type "LocalUserNotAllowed" with status set to disable
42+
Create new allow list custom alert rule from type "LocalUserNotAllowed" with status set to disable
4343

4444
## PARAMETERS
4545

azps-12.5.0/Az.Security/New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject -Enabled <Boolean> -Type
2121
```
2222

2323
## DESCRIPTION
24-
The New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject cmdlet creates a new list of denyed custom alert rules for device security group in IoT security solution.
24+
The New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject cmdlet creates a new list of denied custom alert rules for device security group in IoT security solution.
2525

2626
## EXAMPLES
2727

@@ -39,7 +39,7 @@ ValueType: "String"
3939
DenylistValues: []
4040
```
4141

42-
Create new deny list custom alert rule with rull type "SomeRuleType" and status set to desable
42+
Create new deny list custom alert rule with rule type "SomeRuleType" and status set to disable
4343

4444
## PARAMETERS
4545

azps-12.5.0/Az.Security/New-AzSecurityConnector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ $dcspmOffering = New-AzSecurityDefenderCspmAwsOfferingObject `
4545
-MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SCloudRoleArn "$arnPrefix/MDCContainersAgentlessDiscoveryK8sRole"
4646
4747
$defenderForContainersOffering = New-AzSecurityDefenderForContainersAwsOfferingObject `
48-
-AutoProvisioning $true -KuberneteServiceCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s" -KuberneteScubaReaderCloudRoleArn "$arnPrefix/DefenderForCloud-DataCollection" `
48+
-AutoProvisioning $true -KubernetesServiceCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s" -KubernetesScubaReaderCloudRoleArn "$arnPrefix/DefenderForCloud-DataCollection" `
4949
-KinesiToS3CloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s-kinesis-to-s3" -CloudWatchToKinesiCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s-cloudwatch-to-kinesis" `
5050
-KubeAuditRetentionTime 30 -ScubaExternalId "a47ae0a2-7bf7-482a-897a-7a139d30736c" `
5151
-MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SCloudRoleArn "$arnPrefix/MDCContainersAgentlessDiscoveryK8sRole" `

azps-12.5.0/Az.Security/New-AzSecurityDefenderForContainersAwsOfferingObject.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ New-AzSecurityDefenderForContainersAwsOfferingObject [-AutoProvisioning <Boolean
1919
[-CloudWatchToKinesiCloudRoleArn <String>] [-ContainerVulnerabilityAssessmentCloudRoleArn <String>]
2020
[-ContainerVulnerabilityAssessmentTaskCloudRoleArn <String>]
2121
[-EnableContainerVulnerabilityAssessment <Boolean>] [-KinesiToS3CloudRoleArn <String>]
22-
[-KubeAuditRetentionTime <Int64>] [-KuberneteScubaReaderCloudRoleArn <String>]
23-
[-KuberneteServiceCloudRoleArn <String>] [-MdcContainerAgentlessDiscoveryK8SCloudRoleArn <String>]
22+
[-KubeAuditRetentionTime <Int64>] [-KubernetesScubaReaderCloudRoleArn <String>]
23+
[-KubernetesServiceCloudRoleArn <String>] [-MdcContainerAgentlessDiscoveryK8SCloudRoleArn <String>]
2424
[-MdcContainerAgentlessDiscoveryK8SEnabled <Boolean>] [-MdcContainerImageAssessmentCloudRoleArn <String>]
2525
[-MdcContainerImageAssessmentEnabled <Boolean>] [-ScubaExternalId <String>]
2626
[<CommonParameters>]
@@ -35,7 +35,7 @@ Create an in-memory object for DefenderForContainersAwsOffering.
3535
```powershell
3636
$arnPrefix = "arn:aws:iam::123456789012:role"
3737
New-AzSecurityDefenderForContainersAwsOfferingObject `
38-
-AutoProvisioning $true -KuberneteServiceCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s" -KuberneteScubaReaderCloudRoleArn "$arnPrefix/DefenderForCloud-DataCollection" `
38+
-AutoProvisioning $true -KubernetesServiceCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s" -KubernetesScubaReaderCloudRoleArn "$arnPrefix/DefenderForCloud-DataCollection" `
3939
-KinesiToS3CloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s-kinesis-to-s3" -CloudWatchToKinesiCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s-cloudwatch-to-kinesis" `
4040
-KubeAuditRetentionTime 30 -ScubaExternalId "a47ae0a2-7bf7-482a-897a-7a139d30736c" `
4141
-MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SCloudRoleArn "$arnPrefix/MDCContainersAgentlessDiscoveryK8sRole" `
@@ -169,7 +169,7 @@ Accept pipeline input: False
169169
Accept wildcard characters: False
170170
```
171171
172-
### -KuberneteScubaReaderCloudRoleArn
172+
### -KubernetesScubaReaderCloudRoleArn
173173
The cloud role ARN in AWS for this feature used for reading data.
174174
175175
```yaml
@@ -184,7 +184,7 @@ Accept pipeline input: False
184184
Accept wildcard characters: False
185185
```
186186
187-
### -KuberneteServiceCloudRoleArn
187+
### -KubernetesServiceCloudRoleArn
188188
The cloud role ARN in AWS for this feature used for provisioning resources.
189189
190190
```yaml

azps-12.5.0/Az.Security/Remove-AzSecurityAssessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Remove-AzSecurityAssessment -InputObject <PSSecurityAssessment> [-PassThru]
4141
```
4242

4343
## DESCRIPTION
44-
Deletes a security assessment result from a subscription, usually used when a resoruce is deleted or when the assessment is not relevant for a specific resource anymore
44+
Deletes a security assessment result from a subscription, usually used when a resource is deleted or when the assessment is not relevant for a specific resource anymore
4545

4646
## EXAMPLES
4747

azps-12.5.0/Az.Security/Remove-AzSecuritySqlVulnerabilityAssessmentBaseline.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,14 +70,14 @@ Are you sure you want to proceed with removing baseline for rule VA2108
7070
[Y] Yes [N] No [S] Suspend [?] Help (default is "Y"): y
7171
```
7272

73-
Example of using on premise parametes.
73+
Example of using on premise parameters.
7474

7575
### Example 3: Remove all baselines on SQL Database using pipe
7676
```powershell
7777
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master | Remove-AzSecuritySqlVulnerabilityAssessmentBaseline -Force
7878
```
7979

80-
Example for force removing all the baslines for all rules on a specific database.
80+
Example for force removing all the baselines for all rules on a specific database.
8181

8282
## PARAMETERS
8383

azps-12.5.0/Az.Security/Set-AzSecurityAssessment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Accept wildcard characters: False
108108
```
109109
110110
### -StatusCause
111-
Progremmatic code for the cause of the assessment's result.
111+
Programmatic code for the cause of the assessment's result.
112112
113113
```yaml
114114
Type: System.String
@@ -123,7 +123,7 @@ Accept wildcard characters: False
123123
```
124124
125125
### -StatusCode
126-
Progremmatic code for the result of the assessment.
126+
Programmatic code for the result of the assessment.
127127
can be "Healthy", "Unhealthy" or "NotApplicable"
128128
129129
```yaml

azps-12.5.0/Az.Security/Set-AzSecuritySqlVulnerabilityAssessmentBaseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Supported resources are:
7474
- VM: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/Microsoft.Compute/virtualMachines/{machineName}
7575
- On-Premise: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/microsoft.operationalinsights/workspaces/{workspaceName}/onPremiseMachines/{machineName}
7676

77-
For on premise resources, the patameter machineName is composed as follows:
77+
For on premise resources, the parameter machineName is composed as follows:
7878
{ComputerName}_{AgentId}_{VmUuid}
7979

8080
### Example 2: Set results as baseline using on premise parameters.

azps-12.5.0/Az.Security/Update-AzIotSecuritySolution.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Update-AzIotSecuritySolution -InputObject <PSIotSecuritySolution> [-Tag <Hashtab
3939
```
4040

4141
## DESCRIPTION
42-
The Update-AzIotSecuritySolution cmdlet updayes one or more of the following properties in a specific IoT security solution: tags, recommendation configuration, user defined resources.
42+
The Update-AzIotSecuritySolution cmdlet updates one or more of the following properties in a specific IoT security solution: tags, recommendation configuration, user defined resources.
4343
Only the specified properties will be updated inside the iot security solution.
4444
The IoT security solution collects security data and events from iot devices and iot hub to help prevent and detect threats.
4545

azps-12.5.0/Az.SecurityInsights/Get-AzSentinelEntity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,8 +69,8 @@ This command gets an Entity.
6969

7070
### Example 3: Get a Entity by object Id
7171
```powershell
72-
$Entitys = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName"
73-
$Entitys[0] | Get-AzSentinelEntity
72+
$Entities = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName"
73+
$Entities[0] | Get-AzSentinelEntity
7474
```
7575

7676
```output

azps-12.5.0/Az.SecurityInsights/Get-AzSentinelEntityActivity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ $Entity = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspa
5252
$Entity | Get-AzSentinelEntityActivity
5353
```
5454

55-
This command gets insights and activies for an Entity by object
55+
This command gets insights and activities for an Entity by object
5656

5757
## PARAMETERS
5858

0 commit comments

Comments
 (0)