Skip to content

Commit 49cceaf

Browse files
authored
Merge pull request #105243 from memildin/asc-melvyn-jitWork
Fixes to the classification description
2 parents 2b366e0 + 460e355 commit 49cceaf

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/security-center/security-center-alerts-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -67,16 +67,16 @@ Security Center assigns a severity to alerts, to help you prioritize the order i
6767
The severity is based on how confident Security Center is in the finding or the analytic used to issue the alert as well as the confidence level that there was malicious intent behind the activity that led to the alert.
6868

6969
> [!NOTE]
70-
> Alert severity is displayed differently in the portal and the REST API, the differences are noted in the list below.
70+
> Alert severity is displayed differently in the portal and versions of the REST API that predate 01-01-2019. If you're using an older version of the API, upgrade for the consistent experience described below.
7171
72-
* **High:** There is a high probability that your resource is compromised.
72+
- **High:** There is a high probability that your resource is compromised.
7373
You should look into it right away. Security Center has high confidence in both the malicious intent and in the findings used to issue the alert. For example, an alert that detects the execution of a known malicious tool such as Mimikatz, a common tool used for credential theft.
74-
* **Medium (Low in the REST API)**: This is probably a suspicious activity may indicate that a resource is compromised.
74+
- **Medium:** This is probably a suspicious activity may indicate that a resource is compromised.
7575
Security Center’s confidence in the analytic or finding is medium and the confidence of the malicious intent is medium to high. These would usually be machine learning or anomaly-based detections. For example, a sign-in attempt from an anomalous location.
76-
* **Low (Information in the REST API)**: This might be a benign positive or a blocked attack.
76+
- **Low:** This might be a benign positive or a blocked attack.
7777
* Security Center is not confident enough that the intent is malicious and the activity may be innocent. For example, log clear is an action that may happen when an attacker tries to hide their tracks, but in many cases is a routine operation performed by admins.
7878
* Security Center doesn’t usually tell you when attacks were blocked, unless it’s an interesting case that we suggest you look into.
79-
* **Informational (Silent in the REST API)**: You will only see informational alerts when you drill down into a security incident, or if you use the REST API with a specific alert ID. An incident is typically made up of a number of alerts, some of which may appear on their own to be only informational, but in the context of the other alerts may be worthy of a closer look.
79+
- **Informational:** You will only see informational alerts when you drill down into a security incident, or if you use the REST API with a specific alert ID. An incident is typically made up of a number of alerts, some of which may appear on their own to be only informational, but in the context of the other alerts may be worthy of a closer look.
8080

8181

8282
## Continuous monitoring and assessments

0 commit comments

Comments
 (0)