Skip to content

Commit 36d62b7

Browse files
author
David Curwin
committed
work on alerts page and delete includes
1 parent 6a0236f commit 36d62b7

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+487
-4096
lines changed

articles/defender-for-cloud/alerts-reference.md

Lines changed: 397 additions & 400 deletions
Large diffs are not rendered by default.

articles/defender-for-cloud/alerts-schemas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ You can view the security alerts events in Activity Log by searching for the Act
126126
|**subStatus**|The value and localizedValue subfields are empty|
127127
|**submissionTimestamp**|The UTC timestamp of event submission to Activity Log|
128128
|**subscriptionId**|The subscription ID of the compromised resource|
129-
|**properties**|A JSON bag of other properties pertaining to the alert. Properties can change from one alert to the other, however, the following fields appear in all alerts:<br>- severity: The severity of the attack<br>- compromisedEntity: The name of the compromised resource<br>- remediationSteps: Array of remediation steps to be taken<br>- intent: The kill-chain intent of the alert. Possible intents are documented in the [Intentions table](alerts-reference.md#intentions)|
129+
|**properties**|A JSON bag of other properties pertaining to the alert. Properties can change from one alert to the other, however, the following fields appear in all alerts:<br>- severity: The severity of the attack<br>- compromisedEntity: The name of the compromised resource<br>- remediationSteps: Array of remediation steps to be taken<br>- intent: The kill-chain intent of the alert. Possible intents are documented in the [Intentions table](alerts-reference.md#mitre-attck-tactics)|
130130
|**relatedEvents**|Constant - empty array|
131131

132132
### [Workflow automation](#tab/schema-workflow-automation)

articles/defender-for-cloud/concept-defender-for-cosmos.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ You can use this information to quickly remediate security issues and improve th
3737
Alerts include details of the incident that triggered them, and recommendations on how to investigate and remediate threats. Alerts can be exported to Microsoft Sentinel or any other third-party SIEM or any other external tool. To learn how to stream alerts, see [Stream alerts to a SIEM, SOAR, or IT classic deployment model solution](export-to-siem.md).
3838

3939
> [!TIP]
40-
> For a comprehensive list of all Defender for Azure Cosmos DB alerts, see the [alerts reference page](alerts-reference.md#alerts-azurecosmos). This is useful for workload owners who want to know what threats can be detected and help SOC teams gain familiarity with detections before investigating them. Learn more about what's in a Defender for Cloud security alert, and how to manage your alerts in [Manage and respond to security alerts in Microsoft Defender for Cloud](managing-and-responding-alerts.md).
40+
> For a comprehensive list of all Defender for Azure Cosmos DB alerts, see the [alerts reference page](alerts-reference.md#alerts-for-azure-cosmos-db). This is useful for workload owners who want to know what threats can be detected and help SOC teams gain familiarity with detections before investigating them. Learn more about what's in a Defender for Cloud security alert, and how to manage your alerts in [Manage and respond to security alerts in Microsoft Defender for Cloud](managing-and-responding-alerts.md).
4141
4242
## Alert types
4343

articles/defender-for-cloud/defender-for-app-service-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Dangling DNS protection is available whether your domains are managed with Azure
7575

7676
Learn more about dangling DNS and the threat of subdomain takeover, in [Prevent dangling DNS entries and avoid subdomain takeover](../security/fundamentals/subdomain-takeover.md).
7777

78-
For a full list of the App Service alerts, see the [Reference table of alerts](alerts-reference.md#alerts-azureappserv).
78+
For a full list of the App Service alerts, see the [Reference table of alerts](alerts-reference.md#alerts-for-azure-app-service).
7979

8080
> [!NOTE]
8181
> Defender for Cloud might not trigger dangling DNS alerts if your custom domain doesn't point directly to an App Service resource, or if Defender for Cloud hasn't monitored traffic to your website since the dangling DNS protection was enabled (because there won't be logs to help identify the custom domain).
@@ -90,5 +90,5 @@ In this article, you learned about Microsoft Defender for App Service.
9090
For related material, see the following articles:
9191

9292
- To export your alerts to Microsoft Sentinel, any third-party SIEM, or any other external tool, follow the instructions in [Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
93-
- For a list of the Microsoft Defender for App Service alerts, see the [Reference table of alerts](alerts-reference.md#alerts-azureappserv).
93+
- For a list of the Microsoft Defender for App Service alerts, see the [Reference table of alerts](alerts-reference.md#alerts-for-azure-app-service).
9494
- For more information on App Service plans, see [App Service plans](https://azure.microsoft.com/pricing/details/app-service/plans/).

articles/defender-for-cloud/defender-for-containers-enable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ You can also learn more by watching these videos from the Defender for Cloud in
7272

7373
## Simulate security alerts from Microsoft Defender for Containers
7474

75-
A full list of supported alerts is available in the [reference table of all Defender for Cloud security alerts](alerts-reference.md#alerts-k8scluster).
75+
A full list of supported alerts is available in the [reference table of all Defender for Cloud security alerts](alerts-reference.md#alerts-for-containers-kubernetes-clusters).
7676

7777
1. To simulate a security alert, run the following command from the cluster:
7878

articles/defender-for-cloud/defender-for-containers-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ The security alerts page opens:
9999

100100
:::image type="content" source="media/defender-for-containers/view-containers-alerts.png" alt-text="Screenshot showing you where to view the list of alerts." lightbox="media/defender-for-containers/view-containers-alerts.png":::
101101

102-
Security alerts for runtime workload in the clusters can be recognized by the `K8S.NODE_` prefix of the alert type. For a full list of the cluster level alerts, see the [reference table of alerts](alerts-reference.md#alerts-k8scluster).
102+
Security alerts for runtime workload in the clusters can be recognized by the `K8S.NODE_` prefix of the alert type. For a full list of the cluster level alerts, see the [reference table of alerts](alerts-reference.md#alerts-for-containers-kubernetes-clusters).
103103

104104
Defender for Containers also includes host-level threat detection with over 60 Kubernetes-aware analytics, AI, and anomaly detections based on your runtime workload.
105105

articles/defender-for-cloud/defender-for-databases-enable-cosmos-protections.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ Use an Azure Policy to enable Microsoft Defender for Cloud across storage accoun
131131

132132
## Simulate security alerts from Microsoft Defender for Azure Cosmos DB
133133

134-
A full list of [supported alerts](alerts-reference.md#alerts-azurecosmos) is available in the reference table of all Defender for Cloud security alerts.
134+
A full list of [supported alerts](alerts-reference.md#alerts-for-azure-cosmos-db) is available in the reference table of all Defender for Cloud security alerts.
135135

136136
You can use sample Microsoft Defender for Azure Cosmos DB alerts to evaluate their value, and capabilities. Sample alerts will also validate any configurations you've made for your security alerts (such as SIEM integrations, workflow automation, and email notifications).
137137

articles/defender-for-cloud/defender-for-databases-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Threat intelligence enriched security alerts are triggered when there are:
5353
- **Brute-force attacks** – With the ability to separate simple brute force from brute force on a valid user or a successful brute force
5454

5555
> [!TIP]
56-
> View the full list of security alerts for database servers [in the alerts reference page](alerts-reference.md#alerts-osrdb).
56+
> View the full list of security alerts for database servers [in the alerts reference page](alerts-reference.md#alerts-for-open-source-relational-databases).
5757
5858
## Next steps
5959

articles/defender-for-cloud/defender-for-dns-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Microsoft Defender for DNS detects suspicious and anomalous activities such as:
3232
- **DNS attacks** - communication with malicious DNS resolvers
3333
- **Communication with domains used for malicious activities** such as phishing and crypto mining
3434

35-
A full list of the alerts provided by Microsoft Defender for DNS is on the [alerts reference page](alerts-reference.md#alerts-dns).
35+
A full list of the alerts provided by Microsoft Defender for DNS is on the [alerts reference page](alerts-reference.md#alerts-for-dns).
3636

3737
## Dependencies
3838

articles/defender-for-cloud/defender-for-key-vault-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,6 @@ In this article, you learned about Microsoft Defender for Key Vault.
101101

102102
For related material, see the following articles:
103103

104-
- [Key Vault security alerts](alerts-reference.md#alerts-azurekv)--The Key Vault section of the reference table for all Microsoft Defender for Cloud alerts
104+
- [Key Vault security alerts](alerts-reference.md#alerts-for-azure-key-vault)--The Key Vault section of the reference table for all Microsoft Defender for Cloud alerts
105105
- [Continuously export Defender for Cloud data](continuous-export.md)
106106
- [Suppress security alerts](alerts-suppression-rules.md)

0 commit comments

Comments
 (0)