diff --git a/docs/reference/eql/detect-threats-with-eql.asciidoc b/docs/reference/eql/detect-threats-with-eql.asciidoc index 362a6b8b991af..f0d02cffaa6a4 100644 --- a/docs/reference/eql/detect-threats-with-eql.asciidoc +++ b/docs/reference/eql/detect-threats-with-eql.asciidoc @@ -5,10 +5,10 @@ beta::[] -This example tutorial shows you how you can use EQL to detect security threats -and other suspicious behavior. In the scenario, you're tasked with detecting -https://attack.mitre.org/techniques/T1218/010/[regsvr32 misuse] in Windows -event logs. +This example tutorial shows how you can use EQL to detect security threats and +other suspicious behavior. In the scenario, you're tasked with detecting +https://attack.mitre.org/techniques/T1218/010/[regsvr32 misuse] in Windows event +logs. `regsvr32.exe` is a built-in command-line utility used to register `.dll` libraries in Windows. As a native tool, `regsvr32.exe` has a trusted status in