Skip to content

Commit 4b45941

Browse files
Merge pull request #217719 from bmansheim/sample-alerts-containers
RN for containers sample alerts
2 parents 2b03a3c + 0ec233c commit 4b45941

9 files changed

+22
-15
lines changed

articles/defender-for-cloud/adaptive-application-controls.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -181,12 +181,12 @@ To remediate the issues:
181181

182182
1. For further details, and the list of affected machines, select an alert.
183183

184-
The alerts page shows the more details of the alerts and provides a **Take action** link with recommendations of how to mitigate the threat.
184+
The security alerts page shows more details of the alerts and provides a **Take action** link with recommendations of how to mitigate the threat.
185185

186186
:::image type="content" source="media/adaptive-application/adaptive-application-alerts-start-time.png" alt-text="The start time of adaptive application controls alerts is the time that adaptive application controls created the alert.":::
187187

188188
> [!NOTE]
189-
> Adaptive application controls calculates events once every twelve hours. The "activity start time" shown in the alerts page is the time that adaptive application controls created the alert, **not** the time that the suspicious process was active.
189+
> Adaptive application controls calculates events once every twelve hours. The "activity start time" shown in the security alerts page is the time that adaptive application controls created the alert, **not** the time that the suspicious process was active.
190190
191191

192192
## Move a machine from one group to another

articles/defender-for-cloud/alert-validation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Use sample alerts to:
3030

3131
To create sample alerts:
3232

33-
1. As a user with the role **Subscription Contributor**, from the toolbar on the alerts page, select **Create sample alerts**.
33+
1. As a user with the role **Subscription Contributor**, from the toolbar on the security alerts page, select **Sample alerts**.
3434
1. Select the subscription.
3535
1. Select the relevant Microsoft Defender plan/s for which you want to see alerts.
3636
1. Select **Create sample alerts**.
@@ -103,7 +103,7 @@ You can simulate alerts for both of the control plane, and workload alerts with
103103
104104
1. Wait 30 minutes.
105105
106-
1. In the Azure portal, navigate to the Defender for Cloud's alerts page.
106+
1. In the Azure portal, navigate to the Defender for Cloud's security alerts page.
107107

108108
1. On the relevant Kubernetes cluster, locate the following alert `Microsoft Defender for Cloud test alert for K8S (not a threat)`
109109

@@ -149,7 +149,7 @@ You can simulate alerts for both of the control plane, and workload alerts with
149149

150150
1. Wait 10 minutes.
151151

152-
1. In the Azure portal, navigate to the Defender for Cloud's alerts page.
152+
1. In the Azure portal, navigate to the Defender for Cloud's security alerts page.
153153
154154
1. On the relevant AKS cluster, locate the following alert `Microsoft Defender for Cloud test alert (not a threat)`.
155155

articles/defender-for-cloud/defender-for-databases-enable-cosmos-protections.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,9 +101,9 @@ You can use sample Microsoft Defender for Azure Cosmos DB alerts to evaluate the
101101
102102
1. Sign in to the [Azure portal](https://portal.azure.com/) as a Subscription Contributor user.
103103
104-
1. Navigate to the Alerts page.
104+
1. Navigate to the security alerts page.
105105
106-
1. Select **Create sample alerts**.
106+
1. Select **Sample alerts**.
107107
108108
1. Select the subscription.
109109

articles/defender-for-cloud/defender-for-databases-usage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,15 +41,15 @@ When Microsoft Defender for Cloud is enabled on your database, it detects anomal
4141
- In the inbox of whoever in your organization has been [designated to receive email alerts](configure-email-notifications.md).
4242

4343
> [!TIP]
44-
> A live tile on [Microsoft Defender for Cloud's overview dashboard](overview-page.md) tracks the status of active threats to all your resources including databases. Select the tile to launch the Defender for Cloud alerts page and get an overview of active threats detected on your databases.
44+
> A live tile on [Microsoft Defender for Cloud's overview dashboard](overview-page.md) tracks the status of active threats to all your resources including databases. Select the security alerts tile to go to the Defender for Cloud security alerts page and get an overview of active threats detected on your databases.
4545
>
4646
> For detailed steps and the recommended method to respond to security alerts, see [Respond to a security alert](tutorial-security-incident.md#respond-to-a-security-alert).
4747
4848
### Respond to email notifications of security alerts
4949

5050
Defender for Cloud sends email notifications when it detects anomalous database activities. The email includes details of the suspicious security event such as the nature of the anomalous activities, database name, server name, application name, and event time. The email also provides information on possible causes and recommended actions to investigate and mitigate any potential threats to the database.
5151

52-
1. From the email, select the **View the full alert** link to launch the Azure portal and show the alerts page, which provides an overview of active threats detected on the database.
52+
1. From the email, select the **View the full alert** link to launch the Azure portal and show the security alerts page, which provides an overview of active threats detected on the database.
5353

5454
:::image type="content" source="media/defender-for-databases-usage/suspected-brute-force-attack-notification-email.png" alt-text="Defender for Cloud's email notification about a suspected brute force attack.":::
5555

articles/defender-for-cloud/defender-for-key-vault-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ When anomalous activities occur, Defender for Key Vault shows alerts and optiona
3232
## Microsoft Defender for Key Vault alerts
3333
When you get an alert from Microsoft Defender for Key Vault, we recommend you investigate and respond to the alert as described in [Respond to Microsoft Defender for Key Vault](defender-for-key-vault-usage.md). Microsoft Defender for Key Vault protects applications and credentials, so even if you're familiar with the application or user that triggered the alert, it's important to check the situation surrounding every alert.
3434

35-
The alerts appear in Key Vault's **Security** page, the Workload protections, and Defender for Cloud's alerts page.
35+
The alerts appear in Key Vault's **Security** page, the Workload protections, and Defender for Cloud's security alerts page.
3636

3737
:::image type="content" source="./media/defender-for-key-vault-intro/key-vault-security-page.png" alt-text="Azure Key Vault's security page":::
3838

articles/defender-for-cloud/defender-for-sql-usage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Alerts are generated by unusual and potentially harmful attempts to access or ex
108108

109109
Microsoft Defender for SQL alerts are available in:
110110

111-
- The Defender for Cloud's alerts page
111+
- The Defender for Cloud's security alerts page
112112
- The machine's security page
113113
- The [workload protections dashboard](workload-protections-dashboard.md)
114114
- Through the direct link in the alert emails

articles/defender-for-cloud/incidents.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,13 @@ In Defender for Cloud, a security incident is an aggregation of all alerts for a
2020

2121
## Managing security incidents
2222

23-
1. On Defender for Cloud's alerts page, use the **Add filter** button to filter by alert name to the alert name **Security incident detected on multiple resources**.
23+
1. On Defender for Cloud's security alerts page, use the **Add filter** button to filter by alert name to the alert name **Security incident detected on multiple resources**.
2424

25-
:::image type="content" source="media/incidents/locating-incidents.png" alt-text="Locating the incidents on the alerts page in Microsoft Defender for Cloud.":::
25+
:::image type="content" source="media/incidents/locating-incidents.png" alt-text="Locating the incidents on the security alerts page in Microsoft Defender for Cloud.":::
2626

2727
The list is now filtered to show only incidents. Notice that security incidents have a different icon to security alerts.
2828

29-
:::image type="content" source="media/incidents/incidents-list.png" alt-text="List of incidents on the alerts page in Microsoft Defender for Cloud.":::
29+
:::image type="content" source="media/incidents/incidents-list.png" alt-text="List of incidents on the security alerts page in Microsoft Defender for Cloud.":::
3030

3131
1. To view details of an incident, select one from the list. A side pane appears with more details about the incident.
3232

articles/defender-for-cloud/includes/defender-for-containers-enable-plan-eks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,4 +62,4 @@ To protect your EKS clusters, enable the Containers plan on the relevant account
6262
6363
To view the alerts and recommendations for your EKS clusters, use the filters on the alerts, recommendations, and inventory pages to filter by resource type **AWS EKS cluster**.
6464

65-
:::image type="content" source="../media/defender-for-kubernetes-intro/view-alerts-for-aws-eks-clusters.png" alt-text="Screenshot of how to use filters on Microsoft Defender for Cloud's alerts page to view alerts related to AWS EKS clusters." lightbox="../media/defender-for-kubernetes-intro/view-alerts-for-aws-eks-clusters.png":::
65+
:::image type="content" source="../media/defender-for-kubernetes-intro/view-alerts-for-aws-eks-clusters.png" alt-text="Screenshot of how to use filters on Microsoft Defender for Cloud's security alerts page to view alerts related to AWS EKS clusters." lightbox="../media/defender-for-kubernetes-intro/view-alerts-for-aws-eks-clusters.png":::

articles/defender-for-cloud/release-notes.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
2121
Updates in November include:
2222

2323
- [Protect containers in your entire GKE organization with Defender for Containers](#protect-containers-in-your-entire-gke-organization-with-defender-for-containers)
24+
- [Validate Defender for Containers protections with sample alerts](#validate-defender-for-containers-protections-with-sample-alerts)
2425

2526
### Protect containers in your entire GKE organization with Defender for Containers
2627

@@ -30,6 +31,12 @@ Now you can enable Defender for Containers for your GCP organization to protect
3031

3132
Learn more about [connecting GCP projects and organizations](quickstart-onboard-gcp.md#connect-your-gcp-project) to Defender for Cloud.
3233

34+
### Validate Defender for Containers protections with sample alerts
35+
36+
You can now create sample alerts also for Defender for Containers plan. The new sample alerts are presented as being from AKS, Arc-connected clusters, EKS, and GKE resources with different severities and MITRE tactics. You can use the sample alerts to validate security alert configurations, such as SIEM integrations, workflow automation, and email notifications.
37+
38+
Learn more about [alert validation](alert-validation.md).
39+
3340
## October 2022
3441

3542
Updates in October include:

0 commit comments

Comments
 (0)