You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/alerts-reference.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Reference table for all security alerts in Microsoft Defender for Cloud
3
3
description: This article lists the security alerts visible in Microsoft Defender for Cloud
4
4
ms.topic: reference
5
-
ms.date: 04/20/2023
5
+
ms.date: 05/08/2023
6
6
---
7
7
8
8
# Security alerts - a reference guide
@@ -531,6 +531,7 @@ Microsoft Defender for Containers provides security alerts on the cluster level
531
531
|**Unusual user-application pair accessed a key vault**<br>(KV_UserAppAnomaly) | A key vault has been accessed by a user-service principal pair that doesn't normally access it. This anomalous access pattern may be legitimate activity, but it could be an indication that a threat actor has gained access to the key vault in an attempt to access the secrets contained within it. We recommend further investigations. | Credential Access | Medium |
532
532
|**User accessed high volume of key vaults**<br>(KV_AccountVolumeAnomaly) | A user or service principal has accessed an anomalously high volume of key vaults. This anomalous access pattern may be legitimate activity, but it could be an indication that a threat actor has gained access to multiple key vaults in an attempt to access the secrets contained within them. We recommend further investigations. | Credential Access | Medium |
533
533
|**Denied access from a suspicious IP to a key vault**<br>(KV_SuspiciousIPAccessDenied) | An unsuccessful key vault access has been attempted by an IP that has been identified by Microsoft Threat Intelligence as a suspicious IP address. Though this attempt was unsuccessful, it indicates that your infrastructure might have been compromised. We recommend further investigations. | Credential Access | Low |
534
+
|**Unusual access to the key vault from a suspicious IP (Non-Microsoft or External)**<br>(KV_UnusualAccessSuspiciousIP) | A user or service principal has attempted anomalous access to key vaults from a non-Microsoft IP in the last 24 hours. This anomalous access pattern may be legitimate activity. It could be an indication of a possible attempt to gain access of the key vault and the secrets contained within it. We recommend further investigations. | Credential Access | Medium |
534
535
535
536
536
537
## <aname="alerts-azureddos"></a>Alerts for Azure DDoS Protection
@@ -581,7 +582,7 @@ Defender for Cloud's supported kill chain intents are based on [version 9 of the
581
582
|**Command and Control**| V7, V9 | The command and control tactic represents how adversaries communicate with systems under their control within a target network. |
582
583
|**Exfiltration**| V7, V9 | Exfiltration refers to techniques and attributes that result or aid in the adversary removing files and information from a target network. This category also covers locations on a system or network where the adversary may look for information to exfiltrate. |
583
584
| **Impact** | V7, V9 | Impact events primarily try to directly reduce the availability or integrity of a system, service, or network; including manipulation of data to impact a business or operational process. This would often refer to techniques such as ransomware, defacement, data manipulation, and others.
584
-
585
+
585
586
> [!NOTE]
586
587
> For alerts that are in preview: [!INCLUDE [Legalese](../../includes/defender-for-cloud-preview-legal-text.md)]
-[Two Defender for DevOps recommendations now include Azure DevOps scan findings](#two-defender-for-devops-recommendations-now-include-azure-devops-scan-findings)
29
30
-[New default setting for Defender for Servers vulnerability assessment solution](#new-default-setting-for-defender-for-servers-vulnerability-assessment-solution)
30
31
32
+
### New alert in Defender for Key Vault
33
+
34
+
Defender for Key Vault has the following new alert:
|**Unusual access to the key vault from a suspicious IP (Non-Microsoft or External)**<br>(KV_UnusualAccessSuspiciousIP) | A user or service principal has attempted anomalous access to key vaults from a non-Microsoft IP in the last 24 hours. This anomalous access pattern may be legitimate activity. It could be an indication of a possible attempt to gain access of the key vault and the secrets contained within it. We recommend further investigations. | Credential Access | Medium |
39
+
40
+
For all of the available alerts, see [Alerts for Azure Key Vault](alerts-reference.md#alerts-azurekv).
41
+
31
42
### Agentless scanning now supports encrypted disks in AWS
32
43
33
44
Agentless scanning for VMs now supports processing of instances with encrypted disks in AWS, using both CMK and PMK.
@@ -112,8 +123,8 @@ We recommend updating your custom scripts, workflows, and governance rules to co
112
123
113
124
### Deprecation of legacy standards in compliance dashboard
114
125
115
-
Legacy PCI DSS v3.2.1 and legacy SOC TSP have been fully deprecated in the Defender for Cloud compliance dashboard, and replaced by [SOC 2 Type 2](https://learn.microsoft.com/azure/compliance/offerings/offering-soc-2) initiative and [PCI DSS v4](https://learn.microsoft.com/azure/compliance/offerings/offering-pci-dss) initiative-based compliance standards.
116
-
We have fully deprecated support of [PCI DSS](https://learn.microsoft.com/azure/compliance/offerings/offering-pci-dss) standard/initiative in Azure China 21Vianet.
126
+
Legacy PCI DSS v3.2.1 and legacy SOC TSP have been fully deprecated in the Defender for Cloud compliance dashboard, and replaced by [SOC 2 Type 2](/azure/compliance/offerings/offering-soc-2) initiative and [PCI DSS v4](/azure/compliance/offerings/offering-pci-dss) initiative-based compliance standards.
127
+
We have fully deprecated support of [PCI DSS](/azure/compliance/offerings/offering-pci-dss) standard/initiative in Azure China 21Vianet.
117
128
118
129
Learn how to [customize the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
119
130
@@ -140,7 +151,6 @@ If a subscription has a VA solution enabled on any of it's VMs, no changes will
140
151
Learn how to [Find vulnerabilities and collect software inventory with agentless scanning (Preview)](enable-vulnerability-assessment-agentless.md).
141
152
142
153
## April 2023
143
-
144
154
Updates in April include:
145
155
146
156
-[Agentless Container Posture in Defender CSPM (Preview)](#agentless-container-posture-in-defender-cspm-preview)
0 commit comments