Skip to content

Commit 3acc055

Browse files
committed
wi232963
1 parent d6f1326 commit 3acc055

File tree

1 file changed

+11
-1
lines changed

1 file changed

+11
-1
lines changed

articles/defender-for-cloud/alerts-reference.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Reference table for all security alerts
33
description: This article lists the security alerts visible in Microsoft Defender for Cloud.
44
ms.topic: reference
55
ms.custom: linux-related-content
6-
ms.date: 03/17/2024
6+
ms.date: 03/31/2024
77
ai-usage: ai-assisted
88
---
99

@@ -833,6 +833,16 @@ While this action might be legitimate, attackers can try utilizing VM Access ext
833833

834834
**Severity**: Low
835835

836+
### **AzureHound tool invocation detected**
837+
838+
(ARM_AzureHound)
839+
840+
**Description**: AzureHound was run in your subscription and performed information gathering operations to enumerate resources. Threat actors use automated tools, like AzureHound, to enumerate resources and use them to access sensitive data or perform lateral movement. This was detected by analyzing Azure Resource Manager operations in your subscription. This operation might indicate that an identity in your organization was breached, and that the threat actor is trying to compromise your environment.
841+
842+
**[MITRE tactics](#mitre-attck-tactics)**: Discovery
843+
844+
**Severity**: Medium
845+
836846
## Alerts for Linux machines
837847

838848
Microsoft Defender for Servers Plan 2 provides unique detections and alerts, in addition to the ones provided by Microsoft Defender for Endpoint. The alerts provided for Linux machines are:

0 commit comments

Comments
 (0)