From d9ce43d0027049774bbacc03a8e1bdffb33dd9df Mon Sep 17 00:00:00 2001 From: jcaparas Date: Mon, 13 Feb 2017 15:17:33 -0800 Subject: [PATCH] format edit --- ...stom-ti-api-windows-defender-advanced-threat-protection.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md b/windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md index 9826990ee6..13e033eb03 100644 --- a/windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md @@ -72,7 +72,7 @@ The following sections show a few basic programming pattern calls to the custom ## Create new resource Typically, you should create an alert definition to start creating custom threat intelligence. -An ID is created for that alert definition. Then, create an Indicator Of Compromise and associate it to the ID of the alert definition. +An ID is created for that alert definition. Then, create an indicator of compromise and associate it to the ID of the alert definition. ### Create a new alert definition @@ -125,7 +125,7 @@ If successful, you should get a 201 CREATED response containing the representati ``` -### Create a new Indicator of Compromise +### Create a new indicator of compromise ```json POST https://TI.SecurityCenter.Windows.com/v1.0/IndicatorsOfCompromise HTTP/1.1