diff --git a/policy/modules/services/ajaxterm.if b/policy/modules/services/ajaxterm.if
index 2eee297..8e6e2c3 100644
--- a/policy/modules/services/ajaxterm.if
+++ b/policy/modules/services/ajaxterm.if
@@ -24,7 +24,7 @@ interface(`ajaxterm_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if
index 854d78d..9668cde 100644
--- a/policy/modules/services/apache.if
+++ b/policy/modules/services/apache.if
@@ -1046,7 +1046,7 @@ interface(`apache_domtrans_all_scripts',`
##
##
##
-## Role allowed access..
+## Role allowed access.
##
##
##
@@ -1224,7 +1224,7 @@ interface(`apache_read_tmp_files',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -1375,7 +1375,7 @@ ifdef(`TODO',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/automount.if b/policy/modules/services/automount.if
index f384848..617eead 100644
--- a/policy/modules/services/automount.if
+++ b/policy/modules/services/automount.if
@@ -29,7 +29,6 @@ interface(`automount_domtrans',`
##
##
#
-#
interface(`automount_signal',`
gen_require(`
type automount_t;
diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if
index 7c5d8c9..a01ce9f 100644
--- a/policy/modules/services/bluetooth.if
+++ b/policy/modules/services/bluetooth.if
@@ -179,7 +179,7 @@ interface(`bluetooth_run_helper',`
########################################
##
-## Read bluetooth helper state files.
+## Do not audit attempts to read bluetooth helper state files.
##
##
##
diff --git a/policy/modules/services/certmaster.if b/policy/modules/services/certmaster.if
index 2704e81..ffd0da5 100644
--- a/policy/modules/services/certmaster.if
+++ b/policy/modules/services/certmaster.if
@@ -108,7 +108,7 @@ interface(`certmaster_manage_log',`
##
##
##
-## The role to be allowed to manage the syslog domain.
+## Role allowed access.
##
##
##
diff --git a/policy/modules/services/chronyd.if b/policy/modules/services/chronyd.if
index 49b5829..9811f7f 100644
--- a/policy/modules/services/chronyd.if
+++ b/policy/modules/services/chronyd.if
@@ -25,7 +25,7 @@ interface(`chronyd_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/services/cobbler.if b/policy/modules/services/cobbler.if
index 7fcf2fb..a4c26ff 100644
--- a/policy/modules/services/cobbler.if
+++ b/policy/modules/services/cobbler.if
@@ -153,7 +153,7 @@ interface(`cobbler_manage_lib_files',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/services/corosync.if b/policy/modules/services/corosync.if
index 7614a00..a2e6830 100644
--- a/policy/modules/services/corosync.if
+++ b/policy/modules/services/corosync.if
@@ -24,7 +24,7 @@ interface(`corosync_domtrans',`
##
##
##
-## Domain allowed to transition.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/cron.if b/policy/modules/services/cron.if
index 3089b83..ffd5436 100644
--- a/policy/modules/services/cron.if
+++ b/policy/modules/services/cron.if
@@ -311,7 +311,7 @@ interface(`cron_exec',`
########################################
##
-## Execute crond server in the nscd domain.
+## Execute crond server in the crond domain.
##
##
##
diff --git a/policy/modules/services/devicekit.if b/policy/modules/services/devicekit.if
index 70cf018..e20390f 100644
--- a/policy/modules/services/devicekit.if
+++ b/policy/modules/services/devicekit.if
@@ -147,16 +147,6 @@ interface(`devicekit_read_pid_files',`
## Domain allowed access.
##
##
-##
-##
-## The role to be allowed to manage the devicekit domain.
-##
-##
-##
-##
-## The type of the user terminal.
-##
-##
##
#
interface(`devicekit_admin',`
diff --git a/policy/modules/services/dnsmasq.if b/policy/modules/services/dnsmasq.if
index 42cc08f..f5149c8 100644
--- a/policy/modules/services/dnsmasq.if
+++ b/policy/modules/services/dnsmasq.if
@@ -144,7 +144,6 @@ interface(`dnsmasq_write_config',`
##
##
#
-#
interface(`dnsmasq_delete_pid_files',`
gen_require(`
type dnsmasq_var_run_t;
diff --git a/policy/modules/services/exim.if b/policy/modules/services/exim.if
index 1685c5d..91f751d 100644
--- a/policy/modules/services/exim.if
+++ b/policy/modules/services/exim.if
@@ -24,7 +24,7 @@ interface(`exim_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#