You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/managing-and-responding-alerts.md
+6-10Lines changed: 6 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,10 +12,10 @@ Defender for Cloud collects, analyzes, and integrates log data from your Azure,
12
12
13
13
This article shows you how to view and process Defender for Cloud's alerts and protect your resources.
14
14
15
-
When triaging security alerts, you should prioritize alerts based on their alert severity, addressing higher severity alerts first. Learn more about alerts severity in [How are alerts classified?](alerts-overview.md#how-are-alerts-classified).
15
+
When triaging security alerts, you should prioritize alerts based on their alert severity, addressing higher severity alerts first. Learn more about [how alerts are classified](alerts-overview.md#how-are-alerts-classified).
16
16
17
17
> [!TIP]
18
-
> You can connect Microsoft Defender for Cloud to most popular SIEM solutions including Microsoft Sentinel and consume the alerts from your tool of choice. Learn more in [Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
18
+
> You can connect Microsoft Defender for Cloud to SIEM solutions including Microsoft Sentinel and consume the alerts from your tool of choice. Learn more how to [stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
19
19
20
20
## Manage your security alerts
21
21
@@ -25,25 +25,24 @@ When triaging security alerts, you should prioritize alerts based on their alert
25
25
26
26
:::image type="content" source="media/managing-and-responding-alerts/overview-page-alerts-links.png" alt-text="Screenshot that shows how the security alerts page from Microsoft Defender for Cloud's overview page looks.":::
27
27
28
-
1. (Optional) Filter the alerts list with any of the relevant filters. You can add additional filters with the **Add filter** option.
28
+
1. (Optional) Filter the alerts list with any of the relevant filters. You can add extra filters with the **Add filter** option.
29
29
30
30
:::image type="content" source="./media/managing-and-responding-alerts/alerts-adding-filters-small.png" alt-text="Screenshot that shows you how to add filters to the alerts view." lightbox="./media/managing-and-responding-alerts/alerts-adding-filters-large.png":::
31
31
32
32
The list updates according to the filters selected. For example, you might you want to address security alerts that occurred in the last 24 hours because you're investigating a potential breach in the system.
33
33
34
34
## Investigate a security alert
35
35
36
-
Various options are available for each alert in order to assist you in your investigation.
36
+
Each alert contains information regarding the alert that assists you in your investigation.
37
37
38
38
**To investigate a security alert**:
39
39
40
40
1. Select an alert. A side pane opens and shows a description of the alert and all the affected resources.
41
41
42
-
:::image type="content" source="./media/managing-and-responding-alerts/alerts-details-pane.png" alt-text="Screenshot of the high-level details view of a security alert.":::.
42
+
:::image type="content" source="./media/managing-and-responding-alerts/alerts-details-pane.png" alt-text="Screenshot of the high-level details view of a security alert.":::
43
43
44
44
1. Review the high-level information about the security alert.
45
45
46
-
This pane shows:
47
46
- Alert severity, status, and activity time
48
47
- Description that explains the precise activity that was detected
49
48
- Affected resources
@@ -64,10 +63,7 @@ Various options are available for each alert in order to assist you in your inve
- Contact the resource owner to verify whether the detected activity is a false positive.
70
-
- Investigate the raw logs generated by the attacked resource
66
+
For further details contact the resource owner to verify whether the detected activity is a false positive. You can also, investigate the raw logs generated by the attacked resource.
71
67
72
68
## Change the status of multiple security alerts at once
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes-archive.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2984,8 +2984,6 @@ Azure Security Center's security alerts page was redesigned to provide:
2984
2984
-**Alerts from Azure Resource Graph** - you can query alerts in Azure Resource Graph, the Kusto-like API for all of your resources. This is also useful if you're building your own alerts dashboards. [Learn more about Azure Resource Graph](../governance/resource-graph/index.yml).
2985
2985
-**Create sample alerts feature** - To create sample alerts from the new alerts experience, see [Generate sample Azure Defender alerts](alert-validation.md#generate-sample-security-alerts).
0 commit comments