Skip to content

Commit 6268a11

Browse files
authored
Merge pull request #107466 from memildin/melvyn-asc-alerts_ref
Added some new links
2 parents 4b13cc8 + 5b4c7d6 commit 6268a11

File tree

1 file changed

+9
-2
lines changed

1 file changed

+9
-2
lines changed

articles/security-center/threat-protection.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Security Center uses the scale of the cloud to identify attacks targeting applic
8484

8585
By using the visibility that Azure has as a cloud provider, Security Center analyzes App Service internal logs to identify attack methodology on multiple targets. For example, methodology includes widespread scanning and distributed attacks. This type of attack typically comes from a small subset of IPs, and shows patterns of crawling to similar endpoints on multiple hosts. The attacks are searching for a vulnerable page or plugin, and can't be identified from the standpoint of a single host.
8686

87-
If youre running a Windows-based App Service plan, Security Center also has access to the underlying sandboxes and VMs. Together with the log data mentioned above, the infrastructure can tell the story, from a new attack circulating in the wild to compromises in customer machines. Therefore, even if Security Center is deployed after a web app has been exploited, it may be able to detect ongoing attacks.
87+
If you're running a Windows-based App Service plan, Security Center also has access to the underlying sandboxes and VMs. Together with the log data mentioned above, the infrastructure can tell the story, from a new attack circulating in the wild to compromises in customer machines. Therefore, even if Security Center is deployed after a web app has been exploited, it may be able to detect ongoing attacks.
8888

8989
For a list of the Azure App Service alerts, see the [Reference table of alerts](alerts-reference.md#alerts-azureappserv).
9090

@@ -122,6 +122,10 @@ Security Center provides threat protection at different levels:
122122

123123
Also, our global team of security researchers constantly monitor the threat landscape. They add container-specific alerts and vulnerabilities as they're discovered.
124124

125+
> [!TIP]
126+
> You can simulate container alerts by following the instructions in [this blog post](https://techcommunity.microsoft.com/t5/azure-security-center/how-to-demonstrate-the-new-containers-features-in-azure-security/ba-p/1011270).
127+
128+
125129

126130

127131

@@ -204,6 +208,9 @@ For more information, see:
204208
* [The list of threat protection alerts for Azure Storage](alerts-reference.md#alerts-azurestorage)
205209

206210

211+
> [!TIP]
212+
> You can simulate Azure Storage alerts by following the instructions in [this blog post](https://techcommunity.microsoft.com/t5/azure-security-center/validating-atp-for-azure-storage-detections-in-azure-security/ba-p/1068131).
213+
207214

208215

209216

@@ -261,7 +268,7 @@ If you have a license for Azure WAF, your WAF alerts are streamed to Security Ce
261268

262269
Distributed denial of service (DDoS) attacks are known to be easy to execute. They've become a great security concern, particularly if you're moving your applications to the cloud.
263270

264-
A DDoS attack attempts to exhaust an applications resources, making the application unavailable to legitimate users. DDoS attacks can target any endpoint that can be reached through the internet.
271+
A DDoS attack attempts to exhaust an application's resources, making the application unavailable to legitimate users. DDoS attacks can target any endpoint that can be reached through the internet.
265272

266273
To defend against DDoS attacks, purchase a license for Azure DDoS Protection and ensure you're following application design best practices. DDoS Protection provides different service tiers. For more information, see [Azure DDoS Protection overview](https://docs.microsoft.com/azure/virtual-network/ddos-protection-overview).
267274

0 commit comments

Comments
 (0)