Skip to content

Commit 77ac379

Browse files
authored
Merge pull request #153540 from memildin/asc-melvyn-jitWork
Small tweaks
2 parents 69474de + a747472 commit 77ac379

File tree

2 files changed

+6
-4
lines changed

2 files changed

+6
-4
lines changed

articles/security-center/security-center-alerts-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: memildin
55
manager: rkarlin
66
ms.service: security-center
77
ms.topic: conceptual
8-
ms.date: 02/25/2021
8+
ms.date: 04/07/2021
99
ms.author: memildin
1010
---
1111
# Security alerts and incidents in Azure Security Center
@@ -73,7 +73,7 @@ The severity is based on how confident Security Center is in the finding or the
7373
| **High** | There is a high probability that your resource is compromised. You should look into it right away. Security Center has high confidence in both the malicious intent and in the findings used to issue the alert. For example, an alert that detects the execution of a known malicious tool such as Mimikatz, a common tool used for credential theft. |
7474
| **Medium** | This is probably a suspicious activity might indicate that a resource is compromised. Security Center's confidence in the analytic or finding is medium and the confidence of the malicious intent is medium to high. These would usually be machine learning or anomaly-based detections. For example, a sign-in attempt from an anomalous location. |
7575
| **Low** | This might be a benign positive or a blocked attack. Security Center isn't confident enough that the intent is malicious and the activity might be innocent. For example, log clear is an action that might happen when an attacker tries to hide their tracks, but in many cases is a routine operation performed by admins. Security Center doesn't usually tell you when attacks were blocked, unless it's an interesting case that we suggest you look into. |
76-
| **Informational** | You will only see informational alerts when you drill down into a security incident, or if you use the REST API with a specific alert ID. An incident is typically made up of a number of alerts, some of which might appear on their own to be only informational, but in the context of the other alerts might be worthy of a closer look. |
76+
| **Informational** | An incident is typically made up of a number of alerts, some of which might appear on their own to be only informational, but in the context of the other alerts might be worthy of a closer look. |
7777

7878
## Export alerts
7979

articles/security-center/security-center-provide-security-contact-details.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: memildin
55
manager: rkarlin
66
ms.service: security-center
77
ms.topic: quickstart
8-
ms.date: 02/09/2021
8+
ms.date: 04/07/2021
99
ms.author: memildin
1010

1111
---
@@ -54,6 +54,8 @@ You can also manage your email notifications through the supplied REST API. For
5454

5555
This is an example request body for the PUT request when creating a security contact configuration:
5656

57+
URI: https://management.azure.com/subscriptions/<SubscriptionId>/providers/Microsoft.Security/securityContacts/default?api-version=2020-01-01-preview
58+
5759
```json
5860
{
5961
"properties": {
@@ -64,7 +66,7 @@ This is an example request body for the PUT request when creating a security con
6466
},
6567
"alertNotifications": {
6668
"state": "On",
67-
"minimalSeverity": "High"
69+
"minimalSeverity": "Medium"
6870
},
6971
"phone": ""
7072
}

0 commit comments

Comments
 (0)