Skip to content

Commit 6b85498

Browse files
committed
Tweaking away
1 parent 192761c commit 6b85498

File tree

4 files changed

+28
-41
lines changed

4 files changed

+28
-41
lines changed

articles/security-center/alerts-schemas.md

Lines changed: 11 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -40,43 +40,30 @@ If you're using any programmatic methods to consume the alerts, you'll need the
4040
## The schemas
4141

4242

43-
### [Workflow automation](#tab/schema-workflowautomation)
44-
45-
### Sample JSON for alerts sent to workflow automation
46-
47-
This is the schema of the alert events passed to Logic App instances that were configured in Security Center's workflow automation. For more information about the workflow automation feature see [Automate responses to alerts and recommendations](workflow-automation.md).
48-
49-
[!INCLUDE [Workflow schema](../../includes/security-center-alerts-schema-workflowautomation.md)]
43+
### [Workflow automation and continuous export to Event Hub](#tab/schema-continuousexport)
5044

45+
### Sample JSON for alerts sent to Logic Apps, Event Hub, and third-party SIEMs
5146

47+
This is the schema of the alert events passed to:
5248

49+
- Azure Logic App instances that were configured in Security Center's workflow automation
50+
- Azure Event Hub using Security Center's continuous export feature
5351

54-
### [Continuous export to Event Hub](#tab/schema-continuousexport)
55-
56-
### Sample JSON for alerts sent with continuous export to Event Hub and third-party SIEMs
57-
58-
This is the schema of the alert events passed to an Event Hub using the Security Center's continuous export feature. For more information about continuous export, see [Export alerts and recommendations](continuous-export.md).
52+
For more information about the workflow automation feature see [Automate responses to alerts and recommendations](workflow-automation.md).
53+
For more information about continuous export, see [Export alerts and recommendations](continuous-export.md).
5954

6055
[!INCLUDE [Workflow schema](../../includes/security-center-alerts-schema-workflowautomation.md)]
6156

6257

6358

6459

65-
### [Azure Sentinel](#tab/schema-sentinel)
60+
### [Azure Sentinel and Log Analytics workspaces](#tab/schema-sentinel)
6661

6762
The Sentinel Connector gets alerts from Azure Security Center and sends them to the Log Analytics Workspace for Azure Sentinel.
6863

6964
To create a Sentinel case or incident using Security Center alerts, you'll need the schema for those alerts shown below.
7065

71-
> [!TIP]
72-
> For more information about Azure Sentinel, see [the documentation](https://docs.microsoft.com/azure/sentinel/).
73-
74-
[!INCLUDE [Sentinel and workspace schema](../../includes/security-center-alerts-schema-loganalyticsworkspace.md)]
75-
76-
77-
78-
79-
### [Log Analytics workspace](#tab/schema-workspace)
66+
For more information about Azure Sentinel, see [the documentation](https://docs.microsoft.com/azure/sentinel/).
8067

8168
[!INCLUDE [Sentinel and workspace schema](../../includes/security-center-alerts-schema-loganalyticsworkspace.md)]
8269

@@ -87,12 +74,12 @@ To create a Sentinel case or incident using Security Center alerts, you'll need
8774

8875
Azure Security Center audits generated Security alerts as events in Azure Activity Log.
8976

90-
You can easily view the security alerts events in Activity log by searching for the Activate Alert event:
77+
You can view the security alerts events in Activity Log by searching for the Activate Alert event as shown:
9178

9279
[![Searching the Activity log for the Activate Alert event](media/alerts-schemas/SampleActivityLogAlert.png)](media/alerts-schemas/SampleActivityLogAlert.png#lightbox)
9380

94-
### Sample JSON for alerts sent to Azure Activity Log
9581

82+
### Sample JSON for alerts sent to Azure Activity Log
9683

9784
```json
9885
{

articles/security-center/threat-protection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,11 @@ When Security Center detects a threat in any area of your environment, it genera
1818

1919
Azure Security Center's threat protection provides comprehensive defenses for your environment:
2020

21-
* **Threat protection for compute resources**: Windows machines, Linux machines, Azure App Service, and Azure containers
21+
* **Threat protection for Azure compute resources**: Windows machines, Linux machines, Azure App Service, and Azure containers
2222

23-
* **Threat protection for data resources**: SQL Database and SQL Data Warehouse, Azure Storage, and Azure Cosmos DB
23+
* **Threat protection for Azure data resources**: SQL Database and SQL Data Warehouse, Azure Storage, and Azure Cosmos DB
2424

25-
* **Threat protection for the service layer**: Azure network layer, Azure management layer (Azure Resource Manager) (Preview), and Azure Key Vault (Preview)
25+
* **Threat protection for Azure service layers**: Azure network layer, Azure management layer (Azure Resource Manager) (Preview), and Azure Key Vault (Preview)
2626

2727
Whether an alert is generated by Security Center, or received by Security Center from a different security product, you can export it. To export your alerts to Azure Sentinel (or a third-party SIEM) or any other external tool, follow the instructions in [Exporting alerts to a SIEM](continuous-export.md).
2828

includes/security-center-alerts-schema-loganalyticsworkspace.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,6 @@ ms.custom: include file
1414
|Field|Description|
1515
|----|----|
1616
|**AlertName**|Alert display name|
17-
|**Severity**|The alert severity (High/Medium/Low/Informational)|
1817
|**AlertType**|unique alert identifier|
1918
|**ConfidenceLevel**|(Optional) The confidence level of this alert (High/Low)|
2019
|**ConfidenceScore**|(Optional) Numeric confidence indicator of the security alert|
@@ -31,6 +30,7 @@ ms.custom: include file
3130
|**ProviderName**|unused|
3231
|**RemediationSteps**|Manual action items to take to remediate the security threat|
3332
|**ResourceId**|Full identifier of the affected resource|
33+
|**Severity**|The alert severity (High/Medium/Low/Informational)|
3434
|**SourceComputerId**|a unique GUID for the affected server (if the alert is generated on the server)|
3535
|**SourceSystem**|unused|
3636
|**StartTime**|The impact start time of the alert (the time of the first event contributing to the alert)|

includes/security-center-alerts-schema-workflowautomation.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -55,23 +55,23 @@ ms.custom: include file
5555

5656
|Field|Data type|Description|
5757
|----|----|----|
58-
|**VendorName**|String|The name of the vendor that raises the alert.|
58+
|**AlertDisplayName**|String|The display name of the alert.|
5959
|**AlertType**|String|The type of alert. Alerts of the same type should have the same value. This field is a keyed string representing the type of alert and not of an alert instance. All alert instances from the same detection logic/analytic should have the same value for alert type.|
60-
|**StartTimeUtc**|DateTime|The time of the first event or activity included in the alert. The field should be a string that conforms to the ISO8601 format, including UTC timezone information.|
60+
|**CompromisedEntity**|String|The display name of the resource most related to this alert.|
61+
|**Description**|String|Description of the alert.|
6162
|**EndTimeUtc**|DateTime|The time of the last event or activity included in the alert. The field should be a string that conforms to the ISO8601 format, including UTC timezone information.|
62-
|**ProcessingEndTime**|DateTime|The time the alert was accessible to the end user in the original product holding the alert.|
63-
|**TimeGenerated**|DateTime|The time the alert was generated by the alert provider. If not reported by internal alert providers, a product can choose to assign the time it was received for processing by the product. The field should be a string that conforms to the ISO8601 format, including UTC timezone information.|
63+
|**Entities**|IEnumerable (IEntity)|A list of entities related to the alert. This list can hold a mixture of entities of diverse types. The entities type can be any of the types defined in the Entities section. Entities that are not in the list below can also be sent, however it is not guaranteed that they will be processed (the alert will not fail validation with new types of entities).|
64+
|**ExtendedProperties**|Dictionary (String,String)|Providers might (optionally) include custom fields here.|
65+
|**Intent**|Enum|The kill chain related intent behind the alert. For list of supported values, and explanations of Azure Security Center's supported kill chain intents, see [Intentions](/articles/security-center/alerts-reference.md#intentions).<br/>This field might have multiple values (separated by comma).|
6466
|**IsIncident**|Bool|This field determines whether the alert is an incident (a compound grouping of several alerts) or a single alert. Default value for the field is 'false' (meaning it's a single alert).|
65-
|**Severity**|Enum|The severity of the alert as reported by the provider. Possible Values: Informational, Low, Medium, and High.|
66-
|**Status**|Enum|The life-cycle status of the alert.<br/>Supported statuses are: New, Resolved, Dismissed, Unknown.<br/>An alert that specifies a value other than the supported options is assigned the status 'Unknown'.<br/>An alert that doesn't specify a value is assigned the status 'New'.|
67+
|**ProcessingEndTime**|DateTime|The time the alert was accessible to the end user in the original product holding the alert.|
6768
|**ProductName**|String|The name of the product that published this alert (Azure Security Center, Azure ATP, Microsoft Defender ATP, O365 ATP, MCAS, and so on).|
68-
|**SystemAlertId**|String|The alert identifier.|
69-
|**CompromisedEntity**|String|The display name of the resource most related to this alert.|
70-
|**Intent**|Enum|The kill chain related intent behind the alert. For list of supported values, and explanations of Azure Security Center's supported kill chain intents, see [Intentions](/articles/security-center/alerts-reference.md#intentions).<br/>This field might have multiple values (separated by comma).|
71-
|**AlertDisplayName**|String|The display name of the alert.|
72-
|**Description**|String|Description of the alert.|
7369
|**RemediationSteps**|List<String>|Manual action items to take to remediate the alert.|
74-
|**ExtendedProperties**|Dictionary (String,String)|Providers might (optionally) include custom fields here.|
75-
|**Entities**|IEnumerable (IEntity)|A list of entities related to the alert. This list can hold a mixture of entities of diverse types. The entities type can be any of the types defined in the Entities section. Entities that are not in the list below can also be sent, however it is not guaranteed that they will be processed (the alert will not fail validation with new types of entities).|
7670
|**ResourceIdentifiers**|List (Resource Identifiers)|The resource identifiers for this alert that can be used to direct the alert to the right product exposure group (tenant, workspace, subscription etc.). There can be multiple identifiers of different type per alert.|
71+
|**Severity**|Enum|The severity of the alert as reported by the provider. Possible Values: Informational, Low, Medium, and High.|
72+
|**StartTimeUtc**|DateTime|The time of the first event or activity included in the alert. The field should be a string that conforms to the ISO8601 format, including UTC timezone information.|
73+
|**Status**|Enum|The life-cycle status of the alert.<br/>Supported statuses are: New, Resolved, Dismissed, Unknown.<br/>An alert that specifies a value other than the supported options is assigned the status 'Unknown'.<br/>An alert that doesn't specify a value is assigned the status 'New'.|
74+
|**SystemAlertId**|String|The alert identifier.|
75+
|**TimeGenerated**|DateTime|The time the alert was generated by the alert provider. If not reported by internal alert providers, a product can choose to assign the time it was received for processing by the product. The field should be a string that conforms to the ISO8601 format, including UTC timezone information.|
76+
|**VendorName**|String|The name of the vendor that raises the alert.|
7777
|||

0 commit comments

Comments
 (0)