diff --git a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2023-04-01-preview/ThreatIntelligence.json b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2023-04-01-preview/ThreatIntelligence.json index 98de914f76c4..b4b35de0e5e3 100644 --- a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2023-04-01-preview/ThreatIntelligence.json +++ b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2023-04-01-preview/ThreatIntelligence.json @@ -591,7 +591,7 @@ "type": "string", "x-ms-enum": { "modelAsString": true, - "name": "ThreatIntelligenceResourceKindEnum", + "name": "ThreatIntelligenceResourceInnerKind", "values": [ { "description": "Entity represents threat intelligence indicator in the system.", @@ -985,7 +985,7 @@ "type": "string", "x-ms-enum": { "modelAsString": true, - "name": "ThreatIntelligenceSortingCriteriaEnum", + "name": "ThreatIntelligenceSortingOrder", "values": [ { "value": "unsorted" diff --git a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2023-04-01-preview/common/EntityTypes.json b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2023-04-01-preview/common/EntityTypes.json index e2f1cb415e51..c3987834dcdc 100644 --- a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2023-04-01-preview/common/EntityTypes.json +++ b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2023-04-01-preview/common/EntityTypes.json @@ -2183,7 +2183,7 @@ "value": "CredentialAccess" }, { - "description": "Discovery consists of techniques that allow the adversary to gain knowledge about the system and internal network. When adversaries gain access to a new system, they must orient themselves to what they now have control of and what benefits operating from that system give to their current objective or overall goals during the intrusion. The operating system provides many native tools that aid in this post-compromise information-gathering phase.", + "description": "Discovery consists of techniques that allow the adversary to gain knowledge about the system and internal network. When adversaries gain access to a new system, they must navigate themselves to what they now have control of and what benefits operating from that system give to their current objective or overall goals during the intrusion. The operating system provides many native tools that aid in this post-compromise information-gathering phase.", "value": "Discovery" }, {