Skip to content

Commit ae9360e

Browse files
Fix Apostrophe
Replaced stylized apostrophe with standard one.
1 parent 539c627 commit ae9360e

File tree

15 files changed

+50
-38
lines changed

15 files changed

+50
-38
lines changed

docs/Data-Gateway/Reference/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ All requests must include a valid **OAuth 2.0 access token** in the `Authorizati
2727

2828
### Steps
2929

30-
1. Sign in with your organizations Entra ID account to obtain an access token for the Data Gateway application.
30+
1. Sign in with your organization's Entra ID account to obtain an access token for the Data Gateway application.
3131
2. Include the token in each API request:
3232

3333
```bash

docs/Data-Gateway/index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# SHI - Data Gateway
22

3-
Data Gateway is SHIs secure data layer that unifies access to product and tenant information across SHI solutions.
3+
Data Gateway is SHI's secure data layer that unifies access to product and tenant information across SHI solutions.
44
It provides a single, trusted path for ingesting, storing, and retrieving the data that powers SHIELD and related services.
55

66
!!! tip "Who should read this?"
@@ -13,8 +13,8 @@ It provides a single, trusted path for ingesting, storing, and retrieving the da
1313
Data Gateway helps you:
1414

1515
- **Use the web UI** to explore tenant data and SHI experiences such as **Tenant Manager** and **LicenseGPT**.
16-
- **Integrate via API** with SHIs services using the public OpenAPI/Swagger specification.
17-
- **Authenticate securely** with your organizations Entra ID account to protect data access.
16+
- **Integrate via API** with SHI's services using the public OpenAPI/Swagger specification.
17+
- **Authenticate securely** with your organization's Entra ID account to protect data access.
1818
- **Ingest and retrieve reports** including license reports, entitlement data, and telemetry.
1919
- **Manage updates** such as update packages and configuration channels stored in Azure Blob Storage.
2020
- **Access processed relational data** in Azure SQL for compliance and reporting scenarios.

docs/SHIELD/Defend/Deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Deployment
22

3-
The Defend module is deployed automatically as part of the SHIELD platforms **Core Infrastructure deployment** process. It does not require any separate deployment scripts or packages.
3+
The Defend module is deployed automatically as part of the SHIELD platform's **Core Infrastructure deployment** process. It does not require any separate deployment scripts or packages.
44

55
This page clarifies when and how Defend becomes active, and what its dependencies are.
66

@@ -56,4 +56,4 @@ To use Defend, the following must already be deployed:
5656
- [Defend Usage Guide](Usage-Guide/index.md)
5757
- [Defend Reference](Reference/index.md)
5858
- [Troubleshooting](Troubleshooting.md)
59-
- [SHIELD Platform Deployment](../Getting-Started.md)
59+
- [SHIELD Platform Deployment](../Getting-Started.md)

docs/SHIELD/Defend/Prerequisites.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ The Defend module relies on infrastructure that must be deployed via the Deploy
2121

2222
## Role-Based Permissions
2323

24-
To use Defends lifecycle functionality, the signed-in admin must have the following roles in Entra ID:
24+
To use Defend's lifecycle functionality, the signed-in admin must have the following roles in Entra ID:
2525

2626
| Role | Reason |
2727
|------|--------|
@@ -63,4 +63,3 @@ To verify:
6363
- [Defend Usage Guide](Usage-Guide/index.md)
6464
- [Hardware Requirements](Reference/index.md)
6565
- [SHIELD Prerequisites](../Prerequisites/index.md)
66-

docs/SHIELD/Defend/Reference/index.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ SHIELD enforces hardware baselines per security class, especially for **Privileg
2525
| Graphics Support | NVIDIA recommended (avoid AMD graphics) |
2626

2727
!!! info "Device Security Considerations"
28-
In ESM/SSM, hardware risks are lower, but its still important to avoid unsupported OEMs and poor firmware hygiene. These devices typically handle non-elevated tasks.
28+
In ESM/SSM, hardware risks are lower, but it's still important to avoid unsupported OEMs and poor firmware hygiene. These devices typically handle non-elevated tasks.
2929

3030
### Privileged Mode (PSM)
3131

@@ -49,25 +49,31 @@ Each SHIELD lifecycle action is mapped to a standardized backend workflow. The f
4949
### Device Workflow Diagrams
5050

5151
#### Commission Device
52+
5253
📊 [Device - Commission](./Diagrams/Device-Commission.md)
5354

5455
#### Decommission Device
56+
5557
📊 [Device - Decommission](./Diagrams/Device-Decommission.md)
5658

5759
#### Assign User to Device
60+
5861
📊 [Device - Assign](./Diagrams/Device-Assign.md)
5962

6063
#### Unassign User from Device
64+
6165
📊 [Device - Unassign](./Diagrams/Device-Unassign.md)
6266

6367
---
6468

6569
### User Workflow Diagrams
6670

6771
#### Commission User
72+
6873
📊 [User - Commission](./Diagrams/User-Commission.md)
6974

7075
#### Decommission User
76+
7177
📊 [User - Decommission](./Diagrams/User-Decommission.md)
7278

7379
---
@@ -85,4 +91,3 @@ A dedicated section for advanced Privileged workflows, including intermediary lo
8591
- [Defend Usage Guide](../Usage-Guide/index.md)
8692
- [Device Lifecycle](../Usage-Guide/Device/0-Commission.md)
8793
- [User Lifecycle](../Usage-Guide/User/Commission.md)
88-

docs/SHIELD/Defend/Troubleshooting.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,18 @@
11
# Troubleshooting
22

3-
This section addresses common issues encountered when using the Defend modules lifecycle management features. It also offers clarification on edge cases, expected behaviors, and safe recovery actions.
3+
This section addresses common issues encountered when using the Defend module's lifecycle management features. It also offers clarification on edge cases, expected behaviors, and safe recovery actions.
44

55
---
66

77
## Issue: Devices not appearing in SHIELD UI
88

99
**Cause:**
10+
1011
- Devices are not hybrid-joined or cloud-joined to Entra ID
1112
- Devices are not enrolled or synced into Intune
1213

1314
**Resolution:**
15+
1416
- Confirm the device is joined to Entra ID
1517
- Ensure it is visible in the Intune portal ([https://intune.microsoft.com](https://intune.microsoft.com))
1618
- Ensure it is not already managed by another tenant or stale registration
@@ -20,11 +22,13 @@ This section addresses common issues encountered when using the Defend module’
2022
## Issue: Users not showing up when trying to commission
2123

2224
**Cause:**
25+
2326
- The user has already been onboarded
2427
- The user is filtered out by Entra ID query
2528
- Admin does not have required permissions
2629

2730
**Resolution:**
31+
2832
- Verify the user exists in Entra ID
2933
- Confirm you're operating with Global Reader or User Administrator role
3034
- Switch to a different security class to check other eligible users
@@ -34,11 +38,13 @@ This section addresses common issues encountered when using the Defend module’
3438
## Issue: Lifecycle actions failing silently or UI not responding
3539

3640
**Cause:**
41+
3742
- Required Defender for Endpoint workspace is not initialized
3843
- Scoped Intune tags are missing
3944
- Conditional Access policies are not yet deployed
4045

4146
**Resolution:**
47+
4248
- Follow workspace setup verification steps in the [Usage Guide](Usage-Guide/index.md), under **Defender for Endpoint Workspace Creation**
4349
- Check that SHIELD infrastructure was successfully deployed from the Deploy module
4450
- Review prerequisites in [Defend Prerequisites](Prerequisites.md)
@@ -48,10 +54,12 @@ This section addresses common issues encountered when using the Defend module’
4854
## Issue: Privileged device wipe triggered unexpectedly
4955

5056
**Cause:**
57+
5158
- Privileged commissioning/unassignment flow triggered without assigned users
5259
- Attempted to assign a new user without retaining previous assignment
5360

5461
**Resolution:**
62+
5563
- Always include current assigned users in the assignment flow
5664
- Ensure wipe behavior for privileged devices is clearly understood (see the [Usage Guide](Usage-Guide/index.md))
5765

@@ -60,10 +68,12 @@ This section addresses common issues encountered when using the Defend module’
6068
## Issue: Temporary credentials not saved after privileged user creation
6169

6270
**Cause:**
71+
6372
- Admin did not record credentials from the popup
6473
- UI was closed or refreshed before saving
6574

6675
**Resolution:**
76+
6777
- Re-run commissioning with a new user
6878
- Contact SHI if lifecycle audit recovery is needed
6979

@@ -72,12 +82,15 @@ This section addresses common issues encountered when using the Defend module’
7282
## FAQs
7383

7484
### Are lifecycle actions idempotent?
85+
7586
Yes. If a device or user is already managed, SHIELD will not reapply the same configuration unless it detects a mismatch.
7687

7788
### Can I reverse a decommission action?
89+
7890
No. Once a user or device is removed, it must be re-commissioned.
7991

8092
### Does the UI prevent mistakes?
93+
8194
Yes — warnings and confirmations are built into the UI. However, wipe actions for privileged devices occur automatically in certain workflows.
8295

8396
---
@@ -87,4 +100,3 @@ Yes — warnings and confirmations are built into the UI. However, wipe actions
87100
- [Defend Usage Guide](Usage-Guide/index.md)
88101
- [Defend Reference](Reference/index.md)
89102
- [Defend Prerequisites](Prerequisites.md)
90-

docs/SHIELD/Defend/Usage-Guide/index.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Lifecycle Management is triggered from within the SHIELD web interface and allow
1313
- Enforce metadata tagging and Intune integration
1414
- Apply group policies and conditional access boundaries
1515

16-
All actions are class-aware and scoped by SHIELDs infrastructure.
16+
All actions are class-aware and scoped by SHIELD's infrastructure.
1717

1818
---
1919

@@ -29,6 +29,7 @@ Commissioning a device registers it with SHIELD and assigns lifecycle metadata.
2929
📊 [Workflow Diagram](../Reference/Diagrams/Device-Commission.md)
3030

3131
#### UI Example
32+
3233
.
3334
![Select Device - Light](../../../assets/Images/Screenshots/Select-Unmanaged-Device-Light.png#only-light){ loading=lazy width="300" }
3435
![Select Device - Dark](../../../assets/Images/Screenshots/Select-Unmanaged-Device-Dark.png#only-dark){ loading=lazy width="300" }
@@ -40,7 +41,7 @@ Commissioning a device registers it with SHIELD and assigns lifecycle metadata.
4041

4142
### Decommission a Device
4243

43-
Removes a device from SHIELDs lifecycle system.
44+
Removes a device from SHIELD's lifecycle system.
4445

4546
📖 [Decommission a Device](./Device/1-Decommission.md)
4647
📊 [Workflow Diagram](../Reference/Diagrams/Device-Decommission.md)
@@ -58,7 +59,7 @@ Assigns one or more users to a privileged device (PAW). All others will be denie
5859

5960
### Unassign a User from a PAW
6061

61-
Removes a users access from a PAW. If no users remain, a wipe is issued.
62+
Removes a user's access from a PAW. If no users remain, a wipe is issued.
6263

6364
📖 [Unassign User](./Device/3-Unassign.md)
6465
📊 [Workflow Diagram](../Reference/Diagrams/Device-Unassign.md)
@@ -99,7 +100,7 @@ Privileged users are deleted from Entra ID. Non-privileged users are simply remo
99100

100101
## Security Classes
101102

102-
All operations respect SHIELDs class-based enforcement:
103+
All operations respect SHIELD's class-based enforcement:
103104

104105
- **Enterprise**: standard users/devices with baseline protections
105106
- **Specialized**: enhanced controls and policy targeting
@@ -118,4 +119,4 @@ Class is selected at the top of the UI before performing lifecycle actions.
118119
- [Device Commissioning](./Device/0-Commission.md)
119120
- [User Commissioning](./User/Commission.md)
120121
- [Reference Diagrams](../Reference/index.md)
121-
- [Hardware Requirements](../Reference/Hardware-Selection.md)
122+
- [Hardware Requirements](../Reference/Hardware-Selection.md)

docs/SHIELD/Defend/index.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,19 +13,19 @@ Whereas the Deploy module provisions the infrastructure, **Defend is responsible
1313
- Automatic Intune and Entra ID tagging
1414
- Lifecycle management rules based on selected security class
1515

16-
All these actions are exposed via the SHIELD Lifecycle UI and the platforms API endpoints.
16+
All these actions are exposed via the SHIELD Lifecycle UI and the platform's API endpoints.
1717

1818
---
1919

2020
## Security Class Enforcement
2121

22-
Defend strictly applies the lifecycle rules associated with each of SHIELDs supported security classes:
22+
Defend strictly applies the lifecycle rules associated with each of SHIELD's supported security classes:
2323

2424
- **Enterprise (ESM)** – standard business users and workstations
2525
- **Specialized (SSM)** – elevated or regulated roles and systems
2626
- **Privileged (PSM)** – most secure tier, requires clean hardware, wipes on commission/unassign, and restricted access boundaries
2727

28-
The class is selected in the UI prior to performing any lifecycle action.
28+
The class is selected in the UI prior to performing any lifecycle action.
2929

3030
---
3131

@@ -47,4 +47,3 @@ The lifecycle engine handles all object mapping, Intune tagging, group membershi
4747
- [Usage Guide](Usage-Guide/index.md)
4848
- [Reference](Reference/index.md)
4949
- [Troubleshooting](Troubleshooting.md)
50-

docs/SHIELD/Deploy/Deployment/index.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Deployment
22

3-
The Deploy module is provisioned automatically as part of the SHIELD platforms Core Infrastructure deployment. This page provides clarity on how the Deploy module fits into the broader deployment flow and what is delivered specifically by this module.
3+
The Deploy module is provisioned automatically as part of the SHIELD platform's Core Infrastructure deployment. This page provides clarity on how the Deploy module fits into the broader deployment flow and what is delivered specifically by this module.
44

55
---
66

@@ -14,7 +14,7 @@ There is no separate installation or deployment process specific to the Deploy m
1414

1515
## What Is Deployed?
1616

17-
The Deploy module provisions all foundational objects required for SHIELDs lifecycle and security logic:
17+
The Deploy module provisions all foundational objects required for SHIELD's lifecycle and security logic:
1818

1919
- Security groups for each SPA tier (Enterprise, Specialized, Privileged)
2020
- Intune Scope Tags for device policy enforcement
@@ -40,7 +40,7 @@ From the home screen:
4040
3. Check the agreement box
4141
4. Click **Deploy Infrastructure**
4242

43-
Youll then see:
43+
You'll then see:
4444

4545
- A progress spinner
4646
- Automatic status updates
@@ -75,4 +75,3 @@ These cannot be renamed or deleted through the SHIELD UI.
7575
- [Reference Docs](../Reference/index.md)
7676
- [Troubleshooting](../Troubleshooting.md)
7777
- [Full SHIELD Deployment](../../Getting-Started.md)
78-

docs/SHIELD/Deploy/Reference/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Reference
22

3-
This reference section provides technical specifications and supporting details for SHIELDs Deploy module, including identity protection policies and configuration recommendations that align with the SPA architecture.
3+
This reference section provides technical specifications and supporting details for SHIELD's Deploy module, including identity protection policies and configuration recommendations that align with the SPA architecture.
44

55
---
66

@@ -14,7 +14,7 @@ These policies are designed to:
1414
- Block access to privileged resources if risk conditions are met
1515
- Route access through compliant devices and monitored interfaces
1616

17-
This aligns with Microsofts Zero Trust security model and helps enforce separation between administrative and user environments.
17+
This aligns with Microsoft's Zero Trust security model and helps enforce separation between administrative and user environments.
1818

1919
---
2020

0 commit comments

Comments
 (0)