Skip to content

Commit 3f2a646

Browse files
authored
Merge pull request #100463 from memildin/melvyn-asc-alerts_ref
Added two DDoS alerts
2 parents 4f0dea6 + 81bf21d commit 3f2a646

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

articles/security-center/alerts-reference.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -123,6 +123,8 @@ Below the alerts table is a table describing the Azure Security Center kill chai
123123
|**High volume of operations in a Key Vault**|A larger volume of Key Vault operations has been performed compared with historical data. Key Vault activity is typically the same over time. This may be a legitimate change in activity. Alternatively, your infrastructure might be compromised and further investigations are necessary.|-|
124124
|**User accessed high volume of Key Vaults**|The number of vaults that a user or application accesses has changed compared with historical data. Key Vault activity is typically the same over time. This may be a legitimate change in activity. Alternatively, your infrastructure might be compromised and further investigations are necessary.|-|
125125
||<a name="alerts-azureddos"></a><h3>Azure DDoS Protection</h3> [Further details and notes](security-center-alerts-integration.md#azure-ddos)||
126+
|**DDoS Attack detected for Public IP**|DDoS Attack detected for Public IP (IP address) and being mitigated|Probing|
127+
|**DDoS Attack mitigated for Public IP**|DDoS Attack mitigated for Public IP (IP address)|Probing|
126128
|**Volumetric attack detected**|This attack's goal is to flood the network layer with a substantial amount of seemingly legitimate traffic. It includes UDP floods, amplification floods, and other spoofed-packet floods. DDoS Protection Standard mitigates these potential multi-gigabyte attacks by absorbing and scrubbing them, with global network scale, automatically.|-|
127129
|**Protocol attack detected**|These attacks render a target inaccessible, by exploiting a weakness in the layer 3 and layer 4 protocol stacks. It includes SYN flood attacks, reflection attacks, and other protocol attacks. DDoS Protection Standard mitigates these attacks, differentiating between malicious and legitimate traffic, by interacting with the client, and blocking malicious traffic.|-|
128130
|**Resource (application) layer attack detected**|These attacks target web application packets, to disrupt the transmission of data between hosts. The attacks include HTTP protocol violations, SQL injection, cross-site scripting, and other layer 7 attacks. Use the Azure Application Gateway WAF, with DDoS Protection Standard, to defend against these attacks. There are also third-party WAF offerings available in Azure Marketplace.|-|

0 commit comments

Comments
 (0)