Skip to content

Commit 5880157

Browse files
Merge pull request #107763 from memildin/asc-melvyn-threatprotection
Reorged the threat protection info
2 parents e338397 + dfd08c6 commit 5880157

File tree

5 files changed

+81
-159
lines changed

5 files changed

+81
-159
lines changed

articles/security-center/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,8 @@
6060
href: azure-kubernetes-service-integration.md
6161
- name: Threat protection and security alerts
6262
items:
63+
- name: Threat protection in Azure Security Center
64+
href: threat-protection.md
6365
- name: Security alerts overview
6466
href: security-center-alerts-overview.md
6567
- name: Reference list of alerts
@@ -68,8 +70,6 @@
6870
href: security-center-managing-and-responding-alerts.md
6971
- name: Manage security incidents
7072
href: security-center-incident.md
71-
- name: Threat protection in Azure Security Center
72-
href: threat-protection.md
7373
- name: Cloud Smart Alert correlation (incidents)
7474
href: security-center-alerts-cloud-smart.md
7575
- name: Security alerts map and threat intelligence

articles/security-center/security-center-alerts-overview.md

Lines changed: 21 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: rkarlin
88
ms.assetid: 1b71e8ad-3bd8-4475-b735-79ca9963b823
99
ms.service: security-center
1010
ms.topic: conceptual
11-
ms.date: 11/04/2019
11+
ms.date: 03/15/2020
1212
ms.author: memildin
1313
---
1414
# Security alerts in Azure Security Center
@@ -17,49 +17,41 @@ In Azure Security Center, there are a variety of alerts for many different resou
1717

1818
Security alerts are triggered by advanced detections and are available only in the Standard Tier of Azure Security Center. A free trial is available. You can upgrade from the Pricing Tier selection in the [Security Policy](security-center-pricing.md). Visit [Security Center page](https://azure.microsoft.com/pricing/details/security-center/) to learn more about pricing.
1919

20-
## Responding to todays threats <a name="respond-threats"> </a>
20+
## Responding to today's threats <a name="respond-threats"> </a>
2121

22-
There have been significant changes in the threat landscape over the last 20 years. In the past, companies typically only had to worry about web site defacement by individual attackers who were mostly interested in seeing what they could do". Todays attackers are much more sophisticated and organized. They often have specific financial and strategic goals. They also have more resources available to them, as they may be funded by nation states or organized crime.
22+
There have been significant changes in the threat landscape over the last 20 years. In the past, companies typically only had to worry about web site defacement by individual attackers who were mostly interested in seeing "what they could do". Today's attackers are much more sophisticated and organized. They often have specific financial and strategic goals. They also have more resources available to them, as they may be funded by nation states or organized crime.
2323

2424
These changing realities have led to an unprecedented level of professionalism in the attacker ranks. No longer are they interested in web defacement. They are now interested in stealing information, financial accounts, and private data – all of which they can use to generate cash on the open market or to leverage a particular business, political, or military position. Even more concerning than those attackers with a financial objective are the attackers who breach networks to do harm to infrastructure and people.
2525

2626
In response, organizations often deploy various point solutions, which focus on defending either the enterprise perimeter or endpoints by looking for known attack signatures. These solutions tend to generate a high volume of low fidelity alerts, which require a security analyst to triage and investigate. Most organizations lack the time and expertise required to respond to these alerts – so many go unaddressed.
2727

2828
In addition, attackers have evolved their methods to subvert many signature-based defenses and [adapt to cloud environments](https://azure.microsoft.com/blog/detecting-threats-with-azure-security-center/). New approaches are required to more quickly identify emerging threats and expedite detection and response.
2929

30-
## What are security alerts?
30+
## What are security alerts and security incidents?
3131

32-
Alerts are the notifications that Security Center generates when it detects threats on your resources. Security Center prioritizes and lists the alerts, along with the information needed for you to quickly investigate the problem. Security Center also provides recommendations for how you can remediate an attack.
32+
**Alerts** are the notifications that Security Center generates when it detects threats on your resources. Security Center prioritizes and lists the alerts, along with the information needed for you to quickly investigate the problem. Security Center also provides recommendations for how you can remediate an attack.
3333

34-
## How does Security Center detect threats? <a name="detect-threats"> </a>
35-
36-
Microsoft security researchers are constantly on the lookout for threats. Because of Microsoft’s global presence in the cloud and on-premises, they have access to an expansive set of telemetry. The wide-reaching and diverse collection of datasets enables the discovering of new attack patterns and trends across its on-premises consumer and enterprise products, as well as its online services. As a result, Security Center can rapidly update its detection algorithms as attackers release new and increasingly sophisticated exploits. This approach helps you keep pace with a fast moving threat environment.
34+
**A security incident** is a collection of related alerts, instead of listing each alert individually. Security Center uses [Cloud Smart Alert Correlation](security-center-alerts-cloud-smart.md) to correlate different alerts and low fidelity signals into security incidents.
3735

38-
To detect real threats and reduce false positives, Security Center collects, analyzes, and integrates log data from your Azure resources and the network. It also works with connected partner solutions, like firewall and endpoint protection solutions. Security Center analyzes this information, often correlating information from multiple sources, to identify threats.
36+
Using incidents, Security Center provides you with a single view of an attack campaign and all of the related alerts. This view enables you to quickly understand what actions the attacker took, and what resources were affected. For more information, see [Cloud smart alert correlation](security-center-alerts-cloud-smart.md).
3937

40-
![Security Center Data collection and presentation](./media/security-center-alerts-overview/security-center-detection-capabilities.png)
4138

42-
Security Center employs advanced security analytics, which go far beyond signature-based approaches. Breakthroughs in big data and [machine learning](https://azure.microsoft.com/blog/machine-learning-in-azure-security-center/) technologies are leveraged to evaluate events across the entire cloud fabric – detecting threats that would be impossible to identify using manual approaches and predicting the evolution of attacks. These security analytics include:
4339

44-
* **Integrated threat intelligence**: Looks for known bad actors by leveraging global threat intelligence from Microsoft products and services, the Microsoft Digital Crimes Unit (DCU), the Microsoft Security Response Center (MSRC), and external feeds.
45-
* **Behavioral analytics**: Applies known patterns to discover malicious behavior.
46-
* **Anomaly detection**: Uses statistical profiling to build a historical baseline. It alerts on deviations from established baselines that conform to a potential attack vector.
47-
48-
The sections below discuss each of these analytics in further detail.
40+
## How does Security Center detect threats? <a name="detect-threats"> </a>
4941

50-
### Integrated threat intelligence
42+
Microsoft security researchers are constantly on the lookout for threats. Because of Microsoft's global presence in the cloud and on-premises, they have access to an expansive set of telemetry. The wide-reaching and diverse collection of datasets enables the discovering of new attack patterns and trends across its on-premises consumer and enterprise products, as well as its online services. As a result, Security Center can rapidly update its detection algorithms as attackers release new and increasingly sophisticated exploits. This approach helps you keep pace with a fast moving threat environment.
5143

52-
Microsoft has an immense amount of global threat intelligence. Telemetry flows in from multiple sources, such as Azure, Office 365, Microsoft CRM online, Microsoft Dynamics AX, outlook.com, MSN.com, the Microsoft Digital Crimes Unit (DCU), and Microsoft Security Response Center (MSRC). Researchers also receive threat intelligence information that is shared among major cloud service providers and feeds from other third parties. Azure Security Center can use this information to alert you to threats from known bad actors.
44+
To detect real threats and reduce false positives, Security Center collects, analyzes, and integrates log data from your Azure resources and the network. It also works with connected partner solutions, like firewall and endpoint protection solutions. Security Center analyzes this information, often correlating information from multiple sources, to identify threats.
5345

54-
### Behavioral analytics
46+
![Security Center Data collection and presentation](./media/security-center-alerts-overview/security-center-detection-capabilities.png)
5547

56-
Behavioral analytics is a technique that analyzes and compares data to a collection of known patterns. However, these patterns are not simple signatures. They are determined through complex machine learning algorithms that are applied to massive datasets. They are also determined through careful analysis of malicious behaviors by expert analysts. Azure Security Center can use behavioral analytics to identify compromised resources based on analysis of virtual machine logs, virtual network device logs, fabric logs, crash dumps, and other sources.
48+
Security Center employs advanced security analytics, which go far beyond signature-based approaches. Breakthroughs in big data and [machine learning](https://azure.microsoft.com/blog/machine-learning-in-azure-security-center/) technologies are leveraged to evaluate events across the entire cloud fabric – detecting threats that would be impossible to identify using manual approaches and predicting the evolution of attacks. These security analytics include:
5749

58-
In addition, there's correlation with other signals to check for supporting evidence of a widespread campaign. This correlation helps to identify events that are consistent with established indicators of compromise.
50+
* **Integrated threat intelligence**: Microsoft has an immense amount of global threat intelligence. Telemetry flows in from multiple sources, such as Azure, Office 365, Microsoft CRM online, Microsoft Dynamics AX, outlook.com, MSN.com, the Microsoft Digital Crimes Unit (DCU), and Microsoft Security Response Center (MSRC). Researchers also receive threat intelligence information that is shared among major cloud service providers and feeds from other third parties. Azure Security Center can use this information to alert you to threats from known bad actors.
5951

60-
### Anomaly detection
52+
* **Behavioral analytics**: Behavioral analytics is a technique that analyzes and compares data to a collection of known patterns. However, these patterns are not simple signatures. They are determined through complex machine learning algorithms that are applied to massive datasets. They are also determined through careful analysis of malicious behaviors by expert analysts. Azure Security Center can use behavioral analytics to identify compromised resources based on analysis of virtual machine logs, virtual network device logs, fabric logs, crash dumps, and other sources.
6153

62-
Azure Security Center also uses anomaly detection to identify threats. In contrast to behavioral analytics (which depends on known patterns derived from large data sets), anomaly detection is more personalized and focuses on baselines that are specific to your deployments. Machine learning is applied to determine normal activity for your deployments and then rules are generated to define outlier conditions that could represent a security event.
54+
* **Anomaly detection**: Azure Security Center also uses anomaly detection to identify threats. In contrast to behavioral analytics (which depends on known patterns derived from large data sets), anomaly detection is more "personalized" and focuses on baselines that are specific to your deployments. Machine learning is applied to determine normal activity for your deployments and then rules are generated to define outlier conditions that could represent a security event.
6355

6456
## How are alerts classified?
6557

@@ -72,57 +64,28 @@ The severity is based on how confident Security Center is in the finding or the
7264
- **High:** There is a high probability that your resource is compromised.
7365
You should look into it right away. Security Center has high confidence in both the malicious intent and in the findings used to issue the alert. For example, an alert that detects the execution of a known malicious tool such as Mimikatz, a common tool used for credential theft.
7466
- **Medium:** This is probably a suspicious activity may indicate that a resource is compromised.
75-
Security Centers confidence in the analytic or finding is medium and the confidence of the malicious intent is medium to high. These would usually be machine learning or anomaly-based detections. For example, a sign-in attempt from an anomalous location.
67+
Security Center's confidence in the analytic or finding is medium and the confidence of the malicious intent is medium to high. These would usually be machine learning or anomaly-based detections. For example, a sign-in attempt from an anomalous location.
7668
- **Low:** This might be a benign positive or a blocked attack.
7769
* Security Center is not confident enough that the intent is malicious and the activity may be innocent. For example, log clear is an action that may happen when an attacker tries to hide their tracks, but in many cases is a routine operation performed by admins.
78-
* Security Center doesnt usually tell you when attacks were blocked, unless its an interesting case that we suggest you look into.
70+
* Security Center doesn't usually tell you when attacks were blocked, unless it's an interesting case that we suggest you look into.
7971
- **Informational:** You will only see informational alerts when you drill down into a security incident, or if you use the REST API with a specific alert ID. An incident is typically made up of a number of alerts, some of which may appear on their own to be only informational, but in the context of the other alerts may be worthy of a closer look.
80-
8172

8273
## Continuous monitoring and assessments
8374

8475
Azure Security Center benefits from having security research and data science teams throughout Microsoft who continuously monitor for changes in the threat landscape. This includes the following initiatives:
8576

8677
* **Threat intelligence monitoring**: Threat intelligence includes mechanisms, indicators, implications, and actionable advice about existing or emerging threats. This information is shared in the security community and Microsoft continuously monitors threat intelligence feeds from internal and external sources.
87-
* **Signal sharing**: Insights from security teams across Microsofts broad portfolio of cloud and on-premises services, servers, and client endpoint devices are shared and analyzed.
78+
* **Signal sharing**: Insights from security teams across Microsoft's broad portfolio of cloud and on-premises services, servers, and client endpoint devices are shared and analyzed.
8879
* **Microsoft security specialists**: Ongoing engagement with teams across Microsoft that work in specialized security fields, like forensics and web attack detection.
8980
* **Detection tuning**: Algorithms are run against real customer data sets and security researchers work with customers to validate the results. True and false positives are used to refine machine learning algorithms.
9081

91-
These combined efforts culminate in new and improved detections, which you can benefit from instantly – there’s no action for you to take.
92-
93-
## Security alert types <a name="security-alert-types"> </a>
94-
95-
The following topics guide you through the different alerts, according to resource types:
96-
97-
* [Alerts for IaaS Windows machines](threat-protection.md#windows-machines)
98-
* [Alerts for IaaS Linux machines](threat-protection.md#linux-machines)
99-
* [Alerts for Azure App Service](threat-protection.md#app-services)
100-
* [Alerts for Azure containers](threat-protection.md#azure-containers)
101-
* [Alerts for SQL Database and SQL Data Warehouse](threat-protection.md#data-sql)
102-
* [Alerts for Azure Storage](threat-protection.md#azure-storage)
103-
* [Alerts for Cosmos DB](threat-protection.md#cosmos-db)
104-
105-
The following topics explain how Security Center uses the different telemetry that it collects from integrating with the Azure infrastructure, in order to apply additional protection layers for resources deployed on Azure:
106-
107-
* [Alerts for Azure management layer (Azure Resource Manager) (Preview)](threat-protection.md#management-layer)
108-
* [Alerts for Azure Key Vault (Preview)](threat-protection.md#azure-keyvault)
109-
* [Alerts for Azure network layer](threat-protection.md#network-layer)
110-
* [Alerts from other services](threat-protection.md#alerts-other)
111-
112-
## What are security incidents?
113-
114-
A security incident is a collection of related alerts, instead of listing each alert individually. Security Center uses [Cloud Smart Alert Correlation](security-center-alerts-cloud-smart.md) to correlate different alerts and low fidelity signals into security incidents.
115-
116-
Using incidents, Security Center provides you with a single view of an attack campaign and all of the related alerts. This view enables you to quickly understand what actions the attacker took, and what resources were affected. For more information, see [Cloud smart alert correlation](security-center-alerts-cloud-smart.md).
117-
118-
## Security alerts in Azure Activity Log
82+
These combined efforts culminate in new and improved detections, which you can benefit from instantly – there's no action for you to take.
11983

120-
In addition to being available in the Azure portal or programmatically, Security alerts and incidents are audited as events in [Azure Activity Log](https://docs.microsoft.com/azure/azure-monitor/platform/activity-log-view). For more information on the event schema, see [Security Alerts in Azure Activity log](https://go.microsoft.com/fwlink/?linkid=2114113).
12184

12285
## Next steps
12386

12487
In this article, you learned about the different types of alerts available in Security Center. For more information, see:
12588

126-
* [Azure Security Center planning and operations guide](https://docs.microsoft.com/azure/security-center/security-center-planning-and-operations-guide)
127-
* [Azure Security Center FAQ](https://docs.microsoft.com/azure/security-center/security-center-faq)
89+
* [Threat protection in Azure Security Center](threat-protection.md) - For a brief description of the sources of the security alerts displayed by Azure Security Center
90+
* **Security alerts in Azure Activity Log** - In addition to being available in the Azure portal or programmatically, Security alerts and incidents are audited as events in [Azure Activity Log](https://docs.microsoft.com/azure/azure-monitor/platform/activity-log-view). For more information on the event schema, see [Security Alerts in Azure Activity log](https://go.microsoft.com/fwlink/?linkid=2114113)
12891

0 commit comments

Comments
 (0)