diff --git a/policy/modules/services/ajaxterm.if b/policy/modules/services/ajaxterm.if
index 2eee297..8e6e2c3 100644
--- a/policy/modules/services/ajaxterm.if
+++ b/policy/modules/services/ajaxterm.if
@@ -24,7 +24,7 @@ interface(`ajaxterm_domtrans',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	The type of the process performing this action.
+##	Domain allowed to transition.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if
index 854d78d..9668cde 100644
--- a/policy/modules/services/apache.if
+++ b/policy/modules/services/apache.if
@@ -1046,7 +1046,7 @@ interface(`apache_domtrans_all_scripts',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	Role allowed access..
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -1224,7 +1224,7 @@ interface(`apache_read_tmp_files',`
 ## </summary>
 ## <param name="domain">
 ##  <summary>
-##  Domain allowed access.
+##  Domain to not audit.
 ##  </summary>
 ## </param>
 #
@@ -1375,7 +1375,7 @@ ifdef(`TODO',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain allowed access.
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/automount.if b/policy/modules/services/automount.if
index f384848..617eead 100644
--- a/policy/modules/services/automount.if
+++ b/policy/modules/services/automount.if
@@ -29,7 +29,6 @@ interface(`automount_domtrans',`
 ##	</summary>
 ## </param>
 #
-#
 interface(`automount_signal',`
 	gen_require(`
 		type automount_t;
diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if
index 7c5d8c9..a01ce9f 100644
--- a/policy/modules/services/bluetooth.if
+++ b/policy/modules/services/bluetooth.if
@@ -179,7 +179,7 @@ interface(`bluetooth_run_helper',`
 
 ########################################
 ## <summary>
-##	Read bluetooth helper state files.
+##	Do not audit attempts to read bluetooth helper state files.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
diff --git a/policy/modules/services/certmaster.if b/policy/modules/services/certmaster.if
index 2704e81..ffd0da5 100644
--- a/policy/modules/services/certmaster.if
+++ b/policy/modules/services/certmaster.if
@@ -108,7 +108,7 @@ interface(`certmaster_manage_log',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed to manage the syslog domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/services/chronyd.if b/policy/modules/services/chronyd.if
index 49b5829..9811f7f 100644
--- a/policy/modules/services/chronyd.if
+++ b/policy/modules/services/chronyd.if
@@ -25,7 +25,7 @@ interface(`chronyd_domtrans',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain allowed access.
+##	Domain allowed to transition.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/cobbler.if b/policy/modules/services/cobbler.if
index 7fcf2fb..a4c26ff 100644
--- a/policy/modules/services/cobbler.if
+++ b/policy/modules/services/cobbler.if
@@ -153,7 +153,7 @@ interface(`cobbler_manage_lib_files',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain allowed access.
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/corosync.if b/policy/modules/services/corosync.if
index 7614a00..a2e6830 100644
--- a/policy/modules/services/corosync.if
+++ b/policy/modules/services/corosync.if
@@ -24,7 +24,7 @@ interface(`corosync_domtrans',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain allowed to transition.
+##	Domain allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/cron.if b/policy/modules/services/cron.if
index 3089b83..ffd5436 100644
--- a/policy/modules/services/cron.if
+++ b/policy/modules/services/cron.if
@@ -311,7 +311,7 @@ interface(`cron_exec',`
 
 ########################################
 ## <summary>
-##	Execute crond server in the nscd domain.
+##	Execute crond server in the crond domain.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
diff --git a/policy/modules/services/devicekit.if b/policy/modules/services/devicekit.if
index 70cf018..e20390f 100644
--- a/policy/modules/services/devicekit.if
+++ b/policy/modules/services/devicekit.if
@@ -147,16 +147,6 @@ interface(`devicekit_read_pid_files',`
 ##	Domain allowed access.
 ##	</summary>
 ## </param>
-## <param name="role">
-##	<summary>
-##	The role to be allowed to manage the devicekit domain.
-##	</summary>
-## </param>
-## <param name="terminal">
-##	<summary>
-##	The type of the user terminal.
-##	</summary>
-## </param>
 ## <rolecap/>
 #
 interface(`devicekit_admin',`
diff --git a/policy/modules/services/dnsmasq.if b/policy/modules/services/dnsmasq.if
index 42cc08f..f5149c8 100644
--- a/policy/modules/services/dnsmasq.if
+++ b/policy/modules/services/dnsmasq.if
@@ -144,7 +144,6 @@ interface(`dnsmasq_write_config',`
 ##	</summary>
 ## </param>
 #
-#
 interface(`dnsmasq_delete_pid_files',`
 	gen_require(`
 		type dnsmasq_var_run_t;
diff --git a/policy/modules/services/exim.if b/policy/modules/services/exim.if
index 1685c5d..91f751d 100644
--- a/policy/modules/services/exim.if
+++ b/policy/modules/services/exim.if
@@ -24,7 +24,7 @@ interface(`exim_domtrans',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain allowed access.
+##	Domain allowed to transition.
 ##	</summary>
 ## </param>
 #