You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Azure Event Hubs](https://docs.microsoft.com/azure/event-hubs/) using Security Center's [continuous export feature](continuous-export.md)
28
+
-[Azure Event Hubs](https://docs.microsoft.com/azure/event-hubs/) using Security Center's [continuous export feature](continuous-export.md) for integrations with third-party SIEMs
29
29
30
30
-[The REST API](https://docs.microsoft.com/rest/api/securitycenter/) - If you're using the REST API to access alerts, see the [online Alerts API documentation](https://docs.microsoft.com/rest/api/securitycenter/alerts)
31
31
@@ -42,7 +42,7 @@ If you're using any programmatic methods to consume the alerts, you'll need the
### Sample JSON for alerts sent to Workflow automation or a 3rd-party SIEM
45
+
### Sample JSON for alerts sent to workflow automation
46
46
47
47
This is the schema of the alert events passed to Logic App instances that were configured in Security Center's workflow automation. For more information about the workflow automation feature see [Automate responses to alerts and recommendations](workflow-automation.md).
48
48
@@ -51,10 +51,9 @@ This is the schema of the alert events passed to Logic App instances that were c
51
51
52
52
53
53
54
-
55
54
### [Continuous export to Event Hub](#tab/schema-continuousexport)
56
55
57
-
### Sample JSON for alerts sent with continuous export to Event Hub
56
+
### Sample JSON for alerts sent with continuous export to Event Hub and third-party SIEMs
58
57
59
58
This is the schema of the alert events passed to an Event Hub using the Security Center's continuous export feature. For more information about continuous export, see [Export alerts and recommendations](continuous-export.md).
60
59
@@ -63,19 +62,23 @@ This is the schema of the alert events passed to an Event Hub using the Security
63
62
64
63
65
64
65
+
### [Azure Sentinel](#tab/schema-sentinel)
66
66
67
+
The Sentinel Connector gets alerts from Azure Security Center and sends them to the Log Analytics Workspace for Azure Sentinel.
67
68
69
+
To create a Sentinel case or incident using Security Center alerts, you'll need the schema for those alerts shown below.
68
70
71
+
> [!TIP]
72
+
> For more information about Azure Sentinel, see [the documentation](https://docs.microsoft.com/azure/sentinel/).
69
73
70
-
### [Azure Sentinel](#tab/schema-sentinel)
74
+
[!INCLUDE [Sentinel and workspace schema](../../includes/security-center-alerts-schema-loganalyticsworkspace.md)]
71
75
72
-
This is the schema for alerts sent to Azure Sentinel.
73
76
74
-
For more information about Azure Sentinel, see [the documentation](https://docs.microsoft.com/azure/sentinel/).
75
77
76
-
### Sample JSON for alerts sent to Workflow Automation, Event Hub, Azure Sentinel or other SIEMs
|**ConfidenceLevel**|(Optional) The confidence level of this alert (High/Low)|
192
-
|**ConfidenceScore**|(Optional) Numeric confidence indicator of the security alert|
193
-
|**Description**|Description text for the alert|
194
-
|**DisplayName**|The alert's display name|
195
-
|**EndTime**|The impact end time of the alert (the time of the last event contributing to the alert)|
196
-
|**Entities**|A list of entities related to the alert. This list can hold a mixture of entities of diverse types|
197
-
|**ExtendedLinks**|(Optional) A bag for all links related to the alert. This bag can hold a mixture of links for diverse types|
198
-
|**ExtendedProperties**|A bag of additional fields which are relevant to the alert|
199
-
|**IsIncident**|Determines if the alert is an incident or a regular alert. An incident is a security alert that aggregates multiple alerts into one security incident|
200
-
|**ProcessingEndTime**|UTC timestamp in which the alert was created|
201
-
|**ProductComponentName**|(Optional) The name of a component inside the product which generated the alert.|
|**RemediationSteps**|Manual action items to take to remediate the security threat|
205
-
|**ResourceId**|Full identifier of the affected resource|
206
-
|**SourceComputerId**|a unique GUID for the affected server (if the alert is generated on the server)|
207
-
|**SourceSystem**|unused|
208
-
|**StartTime**|The impact start time of the alert (the time of the first event contributing to the alert)|
209
-
|**SystemAlertId**|Unique identifier of this security alert instance|
210
-
|**TenantId**|the identifier of the parent Azure Active directory tenant of the subscription under which the scanned resource resides|
211
-
|**TimeGenerated**|UTC timestamp on which the assessment took place (Security Center's scan time) (identical to DiscoveredTimeUTC)|
212
-
|**Type**|constant ('SecurityAlert')|
213
-
|**VendorName**|The name of the vendor that provided the alert (e.g. 'Microsoft')|
214
-
|**VendorOriginalId**|unused|
215
-
|**WorkspaceResourceGroup**|in case the alert is generated on a VM, Server, Virtual Machine Scale Set or App Service instance that reports to a workspace, contains that workspace resource group name|
216
-
|**WorkspaceSubscriptionId**|in case the alert is generated on a VM, Server, Virtual Machine Scale Set or App Service instance that reports to a workspace, contains that workspace subscriptionId|
217
-
|||
218
-
219
-
220
185
221
186
222
187
### [MS Graph API](#tab/schema-graphapi)
@@ -225,4 +190,4 @@ Microsoft Graph is the gateway to data and intelligence in Microsoft 365. It pro
225
190
226
191
The schema and a JSON representation for security alerts sent to MS Graph, are available in [the Microsoft Graph documentation](https://docs.microsoft.com/graph/api/resources/alert?view=graph-rest-1.0).
|**ConfidenceLevel**|(Optional) The confidence level of this alert (High/Low)|
20
+
|**ConfidenceScore**|(Optional) Numeric confidence indicator of the security alert|
21
+
|**Description**|Description text for the alert|
22
+
|**DisplayName**|The alert's display name|
23
+
|**EndTime**|The impact end time of the alert (the time of the last event contributing to the alert)|
24
+
|**Entities**|A list of entities related to the alert. This list can hold a mixture of entities of diverse types|
25
+
|**ExtendedLinks**|(Optional) A bag for all links related to the alert. This bag can hold a mixture of links for diverse types|
26
+
|**ExtendedProperties**|A bag of additional fields which are relevant to the alert|
27
+
|**IsIncident**|Determines if the alert is an incident or a regular alert. An incident is a security alert that aggregates multiple alerts into one security incident|
28
+
|**ProcessingEndTime**|UTC timestamp in which the alert was created|
29
+
|**ProductComponentName**|(Optional) The name of a component inside the product which generated the alert.|
|**RemediationSteps**|Manual action items to take to remediate the security threat|
33
+
|**ResourceId**|Full identifier of the affected resource|
34
+
|**SourceComputerId**|a unique GUID for the affected server (if the alert is generated on the server)|
35
+
|**SourceSystem**|unused|
36
+
|**StartTime**|The impact start time of the alert (the time of the first event contributing to the alert)|
37
+
|**SystemAlertId**|Unique identifier of this security alert instance|
38
+
|**TenantId**|the identifier of the parent Azure Active directory tenant of the subscription under which the scanned resource resides|
39
+
|**TimeGenerated**|UTC timestamp on which the assessment took place (Security Center's scan time) (identical to DiscoveredTimeUTC)|
40
+
|**Type**|constant ('SecurityAlert')|
41
+
|**VendorName**|The name of the vendor that provided the alert (e.g. 'Microsoft')|
42
+
|**VendorOriginalId**|unused|
43
+
|**WorkspaceResourceGroup**|in case the alert is generated on a VM, Server, Virtual Machine Scale Set or App Service instance that reports to a workspace, contains that workspace resource group name|
44
+
|**WorkspaceSubscriptionId**|in case the alert is generated on a VM, Server, Virtual Machine Scale Set or App Service instance that reports to a workspace, contains that workspace subscriptionId|
0 commit comments