Skip to content

Commit 070fe8e

Browse files
committed
Draft release note
1 parent e713b87 commit 070fe8e

File tree

1 file changed

+19
-0
lines changed

1 file changed

+19
-0
lines changed

articles/security-center/release-notes.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,25 @@ This page is updated regularly, so revisit it often. If you're looking for items
2929
## May 2020
3030

3131

32+
33+
## Crash dump analysis capabilities migrating to fileless attack detection
34+
35+
We are integrating the crash dump analysis (CDA) detection capabilities into the [fileless attack detection](https://docs.microsoft.com/azure/security-center/threat-protection#windows-fileless) feature.
36+
37+
Some of the benefits of this transition:
38+
39+
- **Proactive and timely malware detection** - The CDA approach involved waiting for a crash to occur and then running analysis to find active malware. Using fileless attack detection brings proactive identification of in-memory threats while they are running.
40+
41+
- **Enriched alerts** - The security alerts from fileless attack detection include enrichments that aren't available from CDA, such as the active network connections information.
42+
43+
- **Alert aggregation** - All the attack patterns detected within the memory of an infected process are now aggregated into a single alert. This means that analysts no longer need to correlate multiple alerts for the same infection.
44+
45+
- **Reduces requirements on your Log Analytics workspace** - Crash dumps and associated potentially sensitive data will no longer be uploaded to your log analytics workspace.
46+
47+
Fileless attack detection analytics brings improved versions of the following security alerts: Code injection discovered, Masquerading Windows Module Detected, Shellcode discovered, and Suspicious code segment detected.
48+
49+
50+
3251
### Alert suppression rules (preview)
3352

3453
This new feature (currently in preview) helps reduce alert fatigue. Use rules to automatically hide alerts that are known to be innocuous or related to normal activities in your organization. This lets you focus on the most relevant threats.

0 commit comments

Comments
 (0)