You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### Sample JSON for alerts sent to workflow automation
46
-
47
-
This is the schema of the alert events passed to Logic App instances that were configured in Security Center's workflow automation. For more information about the workflow automation feature see [Automate responses to alerts and recommendations](workflow-automation.md).
### [Workflow automation and continuous export to Event Hub](#tab/schema-continuousexport)
50
44
45
+
### Sample JSON for alerts sent to Logic Apps, Event Hub, and third-party SIEMs
51
46
47
+
This is the schema of the alert events passed to:
52
48
49
+
- Azure Logic App instances that were configured in Security Center's workflow automation
50
+
- Azure Event Hub using Security Center's continuous export feature
53
51
54
-
### [Continuous export to Event Hub](#tab/schema-continuousexport)
55
-
56
-
### Sample JSON for alerts sent with continuous export to Event Hub and third-party SIEMs
57
-
58
-
This is the schema of the alert events passed to an Event Hub using the Security Center's continuous export feature. For more information about continuous export, see [Export alerts and recommendations](continuous-export.md).
52
+
For more information about the workflow automation feature see [Automate responses to alerts and recommendations](workflow-automation.md).
53
+
For more information about continuous export, see [Export alerts and recommendations](continuous-export.md).
For more information about Azure Sentinel, see [the documentation](https://docs.microsoft.com/azure/sentinel/).
80
67
81
68
[!INCLUDE [Sentinel and workspace schema](../../includes/security-center-alerts-schema-loganalyticsworkspace.md)]
82
69
@@ -87,12 +74,12 @@ To create a Sentinel case or incident using Security Center alerts, you'll need
87
74
88
75
Azure Security Center audits generated Security alerts as events in Azure Activity Log.
89
76
90
-
You can easily view the security alerts events in Activity log by searching for the Activate Alert event:
77
+
You can view the security alerts events in Activity Log by searching for the Activate Alert event as shown:
91
78
92
79
[](media/alerts-schemas/SampleActivityLogAlert.png#lightbox)
93
80
94
-
### Sample JSON for alerts sent to Azure Activity Log
95
81
82
+
### Sample JSON for alerts sent to Azure Activity Log
Copy file name to clipboardExpand all lines: articles/security-center/threat-protection.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,11 +18,11 @@ When Security Center detects a threat in any area of your environment, it genera
18
18
19
19
Azure Security Center's threat protection provides comprehensive defenses for your environment:
20
20
21
-
***Threat protection for compute resources**: Windows machines, Linux machines, Azure App Service, and Azure containers
21
+
***Threat protection for Azure compute resources**: Windows machines, Linux machines, Azure App Service, and Azure containers
22
22
23
-
***Threat protection for data resources**: SQL Database and SQL Data Warehouse, Azure Storage, and Azure Cosmos DB
23
+
***Threat protection for Azure data resources**: SQL Database and SQL Data Warehouse, Azure Storage, and Azure Cosmos DB
24
24
25
-
***Threat protection for the service layer**: Azure network layer, Azure management layer (Azure Resource Manager) (Preview), and Azure Key Vault (Preview)
25
+
***Threat protection for Azure service layers**: Azure network layer, Azure management layer (Azure Resource Manager) (Preview), and Azure Key Vault (Preview)
26
26
27
27
Whether an alert is generated by Security Center, or received by Security Center from a different security product, you can export it. To export your alerts to Azure Sentinel (or a third-party SIEM) or any other external tool, follow the instructions in [Exporting alerts to a SIEM](continuous-export.md).
Copy file name to clipboardExpand all lines: includes/security-center-alerts-schema-workflowautomation.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,23 +55,23 @@ ms.custom: include file
55
55
56
56
|Field|Data type|Description|
57
57
|----|----|----|
58
-
|**VendorName**|String|The name of the vendor that raises the alert.|
58
+
|**AlertDisplayName**|String|The display name of the alert.|
59
59
|**AlertType**|String|The type of alert. Alerts of the same type should have the same value. This field is a keyed string representing the type of alert and not of an alert instance. All alert instances from the same detection logic/analytic should have the same value for alert type.|
60
-
|**StartTimeUtc**|DateTime|The time of the first event or activity included in the alert. The field should be a string that conforms to the ISO8601 format, including UTC timezone information.|
60
+
|**CompromisedEntity**|String|The display name of the resource most related to this alert.|
61
+
|**Description**|String|Description of the alert.|
61
62
|**EndTimeUtc**|DateTime|The time of the last event or activity included in the alert. The field should be a string that conforms to the ISO8601 format, including UTC timezone information.|
62
-
|**ProcessingEndTime**|DateTime|The time the alert was accessible to the end user in the original product holding the alert.|
63
-
|**TimeGenerated**|DateTime|The time the alert was generated by the alert provider. If not reported by internal alert providers, a product can choose to assign the time it was received for processing by the product. The field should be a string that conforms to the ISO8601 format, including UTC timezone information.|
63
+
|**Entities**|IEnumerable (IEntity)|A list of entities related to the alert. This list can hold a mixture of entities of diverse types. The entities type can be any of the types defined in the Entities section. Entities that are not in the list below can also be sent, however it is not guaranteed that they will be processed (the alert will not fail validation with new types of entities).|
64
+
|**ExtendedProperties**|Dictionary (String,String)|Providers might (optionally) include custom fields here.|
65
+
|**Intent**|Enum|The kill chain related intent behind the alert. For list of supported values, and explanations of Azure Security Center's supported kill chain intents, see [Intentions](/articles/security-center/alerts-reference.md#intentions).<br/>This field might have multiple values (separated by comma).|
64
66
|**IsIncident**|Bool|This field determines whether the alert is an incident (a compound grouping of several alerts) or a single alert. Default value for the field is 'false' (meaning it's a single alert).|
65
-
|**Severity**|Enum|The severity of the alert as reported by the provider. Possible Values: Informational, Low, Medium, and High.|
66
-
|**Status**|Enum|The life-cycle status of the alert.<br/>Supported statuses are: New, Resolved, Dismissed, Unknown.<br/>An alert that specifies a value other than the supported options is assigned the status 'Unknown'.<br/>An alert that doesn't specify a value is assigned the status 'New'.|
67
+
|**ProcessingEndTime**|DateTime|The time the alert was accessible to the end user in the original product holding the alert.|
67
68
|**ProductName**|String|The name of the product that published this alert (Azure Security Center, Azure ATP, Microsoft Defender ATP, O365 ATP, MCAS, and so on).|
68
-
|**SystemAlertId**|String|The alert identifier.|
69
-
|**CompromisedEntity**|String|The display name of the resource most related to this alert.|
70
-
|**Intent**|Enum|The kill chain related intent behind the alert. For list of supported values, and explanations of Azure Security Center's supported kill chain intents, see [Intentions](/articles/security-center/alerts-reference.md#intentions).<br/>This field might have multiple values (separated by comma).|
71
-
|**AlertDisplayName**|String|The display name of the alert.|
72
-
|**Description**|String|Description of the alert.|
73
69
|**RemediationSteps**|List<String>|Manual action items to take to remediate the alert.|
74
-
|**ExtendedProperties**|Dictionary (String,String)|Providers might (optionally) include custom fields here.|
75
-
|**Entities**|IEnumerable (IEntity)|A list of entities related to the alert. This list can hold a mixture of entities of diverse types. The entities type can be any of the types defined in the Entities section. Entities that are not in the list below can also be sent, however it is not guaranteed that they will be processed (the alert will not fail validation with new types of entities).|
76
70
|**ResourceIdentifiers**|List (Resource Identifiers)|The resource identifiers for this alert that can be used to direct the alert to the right product exposure group (tenant, workspace, subscription etc.). There can be multiple identifiers of different type per alert.|
71
+
|**Severity**|Enum|The severity of the alert as reported by the provider. Possible Values: Informational, Low, Medium, and High.|
72
+
|**StartTimeUtc**|DateTime|The time of the first event or activity included in the alert. The field should be a string that conforms to the ISO8601 format, including UTC timezone information.|
73
+
|**Status**|Enum|The life-cycle status of the alert.<br/>Supported statuses are: New, Resolved, Dismissed, Unknown.<br/>An alert that specifies a value other than the supported options is assigned the status 'Unknown'.<br/>An alert that doesn't specify a value is assigned the status 'New'.|
74
+
|**SystemAlertId**|String|The alert identifier.|
75
+
|**TimeGenerated**|DateTime|The time the alert was generated by the alert provider. If not reported by internal alert providers, a product can choose to assign the time it was received for processing by the product. The field should be a string that conforms to the ISO8601 format, including UTC timezone information.|
76
+
|**VendorName**|String|The name of the vendor that raises the alert.|
0 commit comments