Skip to content

Commit 74aff5e

Browse files
Merge pull request #236393 from dotanpatrich/patch-15
fix row split for API alerts in table
2 parents 8fdbcea + fb6c0f4 commit 74aff5e

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

articles/defender-for-cloud/alerts-reference.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -755,8 +755,7 @@ VM_VbScriptHttpObjectAllocation| VBScript HTTP object allocation detected | High
755755
**(Preview) Previously unseen parameter used in an API call**<br/> (API_UnseenParam) | A single IP was observed accessing one of the API endpoints using a previously unseen or out-of-bounds parameter in the request. Based on historical traffic patterns from the last 30 days, Defender for APIs learns a set of expected parameters associated with calls to an endpoint. The alert was triggered because an IP recently accessed an endpoint using a previously unseen parameter. | Impact | Medium
756756
**(Preview) Access from a Tor exit node to an API endpoint**<br/> (API_AccessFromTorExitNode) | An IP address from the Tor network accessed one of your API endpoints. Tor is a network that allows people to access the Internet while keeping their real IP hidden. Though there are legitimate uses, it is frequently used by attackers to hide their identity when they target people's systems online. | Pre-attack | Medium
757757
**(Preview) API Endpoint access from suspicious IP**<br/> (API_AccessFromSuspiciousIP) | An IP address accessing one of your API endpoints was identified by Microsoft Threat Intelligence as having a high probability of being a threat. While observing malicious Internet traffic, this IP came up as involved in attacking other online targets. | Pre-attack | High
758-
**(Preview) Suspicious User Agent detected**<br/> (API_AccessFromSuspiciousUserAgent) |
759-
The user agent of a request accessing one of your API endpoints contained anomalous values indicative of an attempt at remote code execution. This does not mean that any of your API endpoints have been breached, but it does suggest that an attempted attack is underway. | Execution | Medium
758+
**(Preview) Suspicious User Agent detected**<br/> (API_AccessFromSuspiciousUserAgent) | The user agent of a request accessing one of your API endpoints contained anomalous values indicative of an attempt at remote code execution. This does not mean that any of your API endpoints have been breached, but it does suggest that an attempted attack is underway. | Execution | Medium
760759

761760
## Next steps
762761

0 commit comments

Comments
 (0)