Skip to content

Commit 7a69c08

Browse files
Merge pull request #269065 from ElazarK/wi229444-old-container-alerts
removed containers alerts
2 parents 996bf6e + 4ab7c57 commit 7a69c08

File tree

2 files changed

+46
-46
lines changed

2 files changed

+46
-46
lines changed

articles/defender-for-cloud/alerts-reference.md

Lines changed: 45 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Reference table for all security alerts
33
description: This article lists the security alerts visible in Microsoft Defender for Cloud.
44
ms.topic: reference
5-
ms.date: 05/31/2023
5+
ms.date: 03/17/2024
66
ai-usage: ai-assisted
77
---
88

@@ -2370,16 +2370,6 @@ Microsoft Defender for Containers provides security alerts on the cluster level
23702370

23712371
**Severity**: Low
23722372

2373-
### **Manipulation of host firewall detected**
2374-
2375-
(K8S.NODE_FirewallDisabled) <sup>[1](#footnote1)</sup>
2376-
2377-
**Description**: Analysis of processes running within a container or directly on a Kubernetes node, has detected a possible manipulation of the on-host firewall. Attackers will often disable this to exfiltrate data.
2378-
2379-
**[MITRE tactics](#mitre-attck-tactics)**: DefenseEvasion, Exfiltration
2380-
2381-
**Severity**: Medium
2382-
23832373
### **Microsoft Defender for Cloud test alert (not a threat).**
23842374

23852375
(K8S.NODE_EICAR) <sup>[1](#footnote1)</sup>
@@ -2610,26 +2600,6 @@ Microsoft Defender for Containers provides security alerts on the cluster level
26102600

26112601
**Severity**: Informational
26122602

2613-
### **Suspicious use of DNS over HTTPS**
2614-
2615-
(K8S.NODE_SuspiciousDNSOverHttps) <sup>[1](#footnote1)</sup>
2616-
2617-
**Description**: Analysis of processes running within a container or directly on a Kubernetes node, has detected the use of a DNS call over HTTPS in an uncommon fashion. This technique is used by attackers to hide calls out to suspect or malicious sites.
2618-
2619-
**[MITRE tactics](#mitre-attck-tactics)**: DefenseEvasion, Exfiltration
2620-
2621-
**Severity**: Medium
2622-
2623-
### **A possible connection to malicious location has been detected.**
2624-
2625-
(K8S.NODE_ThreatIntelCommandLineSuspectDomain) <sup>[1](#footnote1)</sup>
2626-
2627-
**Description**: Analysis of processes running within a container or directly on a Kubernetes node, has detected a connection to a location that has been reported to be malicious or unusual. This is an indicator that a compromise might have occurred.
2628-
2629-
**[MITRE tactics](#mitre-attck-tactics)**: InitialAccess
2630-
2631-
**Severity**: Medium
2632-
26332603
### **Possible malicious web shell detected.**
26342604

26352605
(K8S.NODE_Webshell) <sup>[1](#footnote1)</sup>
@@ -2660,16 +2630,6 @@ Microsoft Defender for Containers provides security alerts on the cluster level
26602630

26612631
**Severity**: Medium
26622632

2663-
### **Digital currency mining activity**
2664-
2665-
(K8S.NODE_CurrencyMining) <sup>[1](#footnote1)</sup>
2666-
2667-
**Description**: Analysis of DNS transactions detected digital currency mining activity. Such activity, while possibly legitimate user behavior, is frequently performed by attackers following compromise of resources. Typical related attacker activity is likely to include the download and execution of common mining tools.
2668-
2669-
**[MITRE tactics](#mitre-attck-tactics)**: Exfiltration
2670-
2671-
**Severity**: Low
2672-
26732633
### **Access to kubelet kubeconfig file detected**
26742634

26752635
(K8S.NODE_KubeConfigAccess) <sup>[1](#footnote1)</sup>
@@ -4406,11 +4366,51 @@ Applies to: Azure Blob (Standard general-purpose v2, Azure Data Lake Storage Gen
44064366

44074367
**Severity**: Medium
44084368

4409-
## Deprecated Defender for Servers alerts
4369+
## Deprecated Defender for Containers alerts
44104370

4411-
The following lists include the Defender for Servers security alerts [which were deprecated in April 2023 due to an improvement process](release-notes-archive.md#deprecation-and-improvement-of-selected-alerts-for-windows-and-linux-servers).
4371+
The following lists include the Defender for Containers security alerts which were deprecated.
4372+
4373+
### **Manipulation of host firewall detected**
4374+
4375+
(K8S.NODE_FirewallDisabled)
4376+
4377+
**Description**: Analysis of processes running within a container or directly on a Kubernetes node, has detected a possible manipulation of the on-host firewall. Attackers will often disable this to exfiltrate data.
4378+
4379+
**[MITRE tactics](#mitre-attck-tactics)**: DefenseEvasion, Exfiltration
4380+
4381+
**Severity**: Medium
4382+
4383+
### **Suspicious use of DNS over HTTPS**
4384+
4385+
(K8S.NODE_SuspiciousDNSOverHttps)
4386+
4387+
**Description**: Analysis of processes running within a container or directly on a Kubernetes node, has detected the use of a DNS call over HTTPS in an uncommon fashion. This technique is used by attackers to hide calls out to suspect or malicious sites.
4388+
4389+
**[MITRE tactics](#mitre-attck-tactics)**: DefenseEvasion, Exfiltration
4390+
4391+
**Severity**: Medium
4392+
4393+
### **A possible connection to malicious location has been detected.**
4394+
4395+
(K8S.NODE_ThreatIntelCommandLineSuspectDomain)
4396+
4397+
**Description**: Analysis of processes running within a container or directly on a Kubernetes node, has detected a connection to a location that has been reported to be malicious or unusual. This is an indicator that a compromise might have occurred.
4398+
4399+
**[MITRE tactics](#mitre-attck-tactics)**: InitialAccess
4400+
4401+
**Severity**: Medium
4402+
4403+
### **Digital currency mining activity**
4404+
4405+
(K8S.NODE_CurrencyMining)
4406+
4407+
**Description**: Analysis of DNS transactions detected digital currency mining activity. Such activity, while possibly legitimate user behavior, is frequently performed by attackers following compromise of resources. Typical related attacker activity is likely to include the download and execution of common mining tools.
4408+
4409+
**[MITRE tactics](#mitre-attck-tactics)**: Exfiltration
4410+
4411+
**Severity**: Low
44124412

4413-
### Deprecated Linux alerts
4413+
## Deprecated Defender for Servers Linux alerts
44144414

44154415
### VM_AbnormalDaemonTermination
44164416

@@ -4796,7 +4796,7 @@ The following lists include the Defender for Servers security alerts [which were
47964796

47974797
**Severity**: Medium
47984798

4799-
### Deprecated Windows alerts
4799+
## Deprecated Defender for Servers Windows alerts
48004800

48014801
### SCUBA_MULTIPLEACCOUNTCREATE
48024802

articles/defender-for-cloud/release-notes-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -515,7 +515,7 @@ All Defender for Servers customers, have full access to the Defender for Endpoin
515515

516516
You can learn more about [Microsoft Defender for Endpoint onboarding options](enable-defender-for-endpoint.md#enable-the-microsoft-defender-for-endpoint-integration).
517517

518-
You can also view the [full list of alerts](alerts-reference.md#deprecated-defender-for-servers-alerts) that are set to be deprecated.
518+
You can also view the [full list of alerts](alerts-reference.md) that are set to be deprecated.
519519

520520
Read the [Microsoft Defender for Cloud blog](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-servers-security-alerts-improvements/ba-p/3714175).
521521

0 commit comments

Comments
 (0)