diff --git a/windows/keep-secure/configure-arcsight-windows-defender-advanced-threat-protection.md b/windows/keep-secure/configure-arcsight-windows-defender-advanced-threat-protection.md
index d31f8fadf5..c7917720cf 100644
--- a/windows/keep-secure/configure-arcsight-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/configure-arcsight-windows-defender-advanced-threat-protection.md
@@ -47,13 +47,30 @@ The following steps assume that you have completed all the required steps in [Be
5. In the form fill in the following required fields with these values:
-Field | Value
-:---|:---
-Configuration File | Type in the name of the client property file. It must match the client property file.
-Events URL | `https://DataAccess-PRD.trafficmanager.net:444/api/alerts`
-Authentication Type | OAuth 2
-OAuth 2 Client Properties File | Select *wdatp-connector.properties*.
-Refresh Token | Paste the refresh token that your Windows Defender ATP contact provided, or you the one you get after running the `restutil` tool.
+
+
+
+ Field |
+ Value |
+
+
+ Configuration File |
+ Type in the name of the client property file. It must match the client property file. |
+
+ Events URL |
+ `https://DataAccess-PRD.trafficmanager.net:444/api/alerts` |
+
+ Authentication Type |
+ OAuth 2 |
+
+ OAuth 2 Client Properties file |
+ Select *wdatp-connector.properties*. |
+
+ Refresh Token |
+ Paste the refresh token that your Windows Defender ATP contact provided, or you the one you get after running the `restutil` tool. |
+
+
+
All other values in the form are optional and can be left blank.
6. Select **Next**, then **Save**.
diff --git a/windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md b/windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md
index ace379187c..f7fafa0e76 100644
--- a/windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md
@@ -44,20 +44,58 @@ You'll need to configure Splunk so that it can consume Windows Defender ATP aler
> [!NOTE]
>All other values in the form are optional and can be left blank.
-
- Field | Value
- :---|:---
- Endpoint URL | `https://DataAccess-PRD.trafficmanager.net:444/api/alerts`
- HTTP Method | GET
- Authentication Type | oauth2
- OAuth 2 Token Refresh URL | Value taken from AAD application
- OAuth 2 Client ID | Value taken from AAD application
- OAuth 2 Client Secret | Value taken from AAD application
- Response type | json
- Response Handler | JSONArrayHandler
- Polling Interval | Number of seconds that Splunk will ping the Windows Defender ATP endpoint. Accepted values are in seconds.
- Set sourcetype | From list
- Source type | \_json
+
+
+
+ Field |
+ Value |
+
+
+ Endpoint URL |
+ https://DataAccess-PRD.trafficmanager.net:444/api/alerts |
+
+ Events URL |
+ `https://DataAccess-PRD.trafficmanager.net:444/api/alerts` |
+
+ HTTP Method |
+ GET |
+
+ Authentication Type |
+ oauth2 |
+
+ OAuth 2 Token Refresh URL |
+ Value taken from AAD application |
+
+
+ OAuth 2 Client ID |
+ Value taken from AAD application |
+
+
+ OAuth 2 Client Secret |
+ Value taken from AAD application |
+
+
+ Response type |
+ json |
+
+
+ Response Handler |
+ JSONArrayHandler |
+
+
+ Polling Interval |
+ Number of seconds that Splunk will ping the Windows Defender ATP endpoint. Accepted values are in seconds. |
+
+
+ Set sourcetype |
+ From list |
+
+
+ Source type |
+ \_json |
+
+
+
After completing these configuration steps, you can go to the Splunk dashboard and run queries.