Skip to content

Commit 4ebe98e

Browse files
Merge pull request #222113 from miashapan/new-alerts
added alerts
2 parents 36203a9 + 3f0a0ea commit 4ebe98e

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

articles/defender-for-iot/device-builders/concept-agent-based-security-alerts.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,6 @@ In addition, you can create custom alerts based on your knowledge of expected de
1212
An alert acts as an indicator of potential compromise, and should be investigated and remediated.
1313

1414
In this article, you'll find a list of built-in alerts, which can be triggered on your IoT devices.
15-
In addition to built-in alerts, Defender for IoT allows you to define custom alerts based on expected IoT Hub and/or device behavior.
16-
17-
For more information, see [customizable alerts](concept-customizable-security-alerts.md).
1815

1916
## Security alerts
2017

@@ -31,6 +28,13 @@ For more information, see [customizable alerts](concept-customizable-security-al
3128
| Web shell | High | Defender-IoT-micro-agent | Possible web shell detected. Malicious actors commonly upload a web shell to a compromised machine to gain persistence or for further exploitation. | Review with the user that ran the command if this was legitimate activity that you expect to see on the device. If not, escalate the alert to the information security team. | IoT_WebShell |
3229
| Behavior similar to ransomware detected | High | Defender-IoT-micro-agent | Execution of files similar to known ransomware that may prevent users from accessing their system, or personal files, and may demand ransom payment to regain access. | Review with the user that ran the command if this was legitimate activity that you expect to see on the device. If not, escalate the alert to the information security team. | IoT_Ransomware |
3330
| Crypto coin miner image | High | Defender-IoT-micro-agent | Execution of a process normally associated with digital currency mining detected. | Verify with the user that ran the command if this was legitimate activity on the device. If not, escalate the alert to the information security team. | IoT_CryptoMiner |
31+
| New USB Connection | High | Defender-IoT-micro-agent | A USB device connection was detected. This may indicate malicious activity. | Confirm this is a legitimate expected activity on the host. If not, escalate the alert to your information security team. | IoT_USBConnection |
32+
| USB Disconnection | High | Defender-IoT-micro-agent | A USB device disconnection was detected. This may indicate malicious activity | Confirm this is a legitimate expected activity on the host. If not, escalate the alert to your information security team. | IoT_UsbDisconnection |
33+
| New Ethernet Connection | High | Defender-IoT-micro-agent | A new Ethernet connection was detected. This may indicate malicious activity. | Confirm this is a legitimate expected activity on the host. If not, escalate the alert to your information security team. | IoT_EthernetConnection |
34+
| Ethernet Disconnection | High | Defender-IoT-micro-agent | A new Ethernet disconnection was detected. This may indicate malicious activity | Confirm this is a legitimate expected activity on the host. If not, escalate the alert to your information security team. | IoT_EthernetDisconnection |
35+
| New File Created | High | Defender-IoT-micro-agent | A new file was detected. This may indicate malicious activity | Confirm this is a legitimate expected activity on the host. If not, escalate the alert to your information security team. | IoT_FileCreated |
36+
| File Modified | High | Defender-IoT-micro-agent | File modification was detected. This may indicate malicious activity | Confirm this is a legitimate expected activity on the host. If not, escalate the alert to your information security team. | IoT_FileModified |
37+
| File Deleted | High | Defender-IoT-micro-agent | File deletion was detected. This may indicate malicious activity. | Confirm this is a legitimate expected activity on the host. If not, escalate the alert to your information security team. | IoT_FileDeleted |
3438

3539
### Medium severity
3640

0 commit comments

Comments
 (0)