Skip to content

Commit 44a7df7

Browse files
committed
Remove deprecating alerts for VMs
1 parent bf613f1 commit 44a7df7

File tree

1 file changed

+0
-15
lines changed

1 file changed

+0
-15
lines changed

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -18,26 +18,11 @@ If you're looking for the latest release notes, you'll find them in the [What's
1818

1919
| Planned change | Estimated date for change |
2020
|--|--|
21-
| [Deprecating three VM alerts](#deprecating-three-vm-alerts) | June 2022|
2221
| [Change in pricing of Runtime protection for Arc-enabled Kubernetes clusters](#change-in-pricing-of-runtime-protection-for-arc-enabled-kubernetes-clusters) | August 2022 |
2322
| [Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations) | September 2022 |
2423
| [Removing security alerts for machines reporting to cross tenant Log Analytics workspaces](#removing-security-alerts-for-machines-reporting-to-cross-tenant-log-analytics-workspaces) | September 2022 |
2524
| [Legacy Assessments APIs deprecation](#legacy-assessments-apis-deprecation) | September 2022 |
2625

27-
### Deprecating three VM alerts
28-
29-
**Estimated date for change:** June 2022
30-
31-
The following table lists the alerts that will be deprecated during June 2022.
32-
33-
| Alert name | Description | Tactics | Severity |
34-
|--|--|--|--|
35-
| **Docker build operation detected on a Kubernetes node** <br>(VM_ImageBuildOnNode) | Machine logs indicate a build operation of a container image on a Kubernetes node. While this behavior might be legitimate, attackers might build their malicious images locally to avoid detection. | Defense Evasion | Low |
36-
| **Suspicious request to Kubernetes API** <br>(VM_KubernetesAPI) | Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container. | LateralMovement | Medium |
37-
| **SSH server is running inside a container** <br>(VM_ContainerSSH) | Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached. | Execution | Medium |
38-
39-
These alerts are used to notify a user about suspicious activity connected to a Kubernetes cluster. The alerts will be replaced with matching alerts that are part of the Microsoft Defender for Cloud Container alerts (`K8S.NODE_ImageBuildOnNode`, `K8S.NODE_ KubernetesAPI` and `K8S.NODE_ ContainerSSH`) which will provide improved fidelity and comprehensive context to investigate and act on the alerts. Learn more about alerts for [Kubernetes Clusters](alerts-reference.md).
40-
4126
### Change in pricing of runtime protection for Arc-enabled Kubernetes clusters
4227

4328
**Estimated date for change:** August 2022

0 commit comments

Comments
 (0)