|
2 | 2 | title: Reference table for all security alerts
|
3 | 3 | description: This article lists the security alerts visible in Microsoft Defender for Cloud.
|
4 | 4 | ms.topic: reference
|
5 |
| -ms.date: 05/31/2023 |
| 5 | +ms.date: 03/17/2024 |
6 | 6 | ai-usage: ai-assisted
|
7 | 7 | ---
|
8 | 8 |
|
@@ -2370,16 +2370,6 @@ Microsoft Defender for Containers provides security alerts on the cluster level
|
2370 | 2370 |
|
2371 | 2371 | **Severity**: Low
|
2372 | 2372 |
|
2373 |
| -### **Manipulation of host firewall detected** |
2374 |
| - |
2375 |
| -(K8S.NODE_FirewallDisabled) <sup>[1](#footnote1)</sup> |
2376 |
| - |
2377 |
| -**Description**: Analysis of processes running within a container or directly on a Kubernetes node, has detected a possible manipulation of the on-host firewall. Attackers will often disable this to exfiltrate data. |
2378 |
| - |
2379 |
| -**[MITRE tactics](#mitre-attck-tactics)**: DefenseEvasion, Exfiltration |
2380 |
| - |
2381 |
| -**Severity**: Medium |
2382 |
| - |
2383 | 2373 | ### **Microsoft Defender for Cloud test alert (not a threat).**
|
2384 | 2374 |
|
2385 | 2375 | (K8S.NODE_EICAR) <sup>[1](#footnote1)</sup>
|
@@ -2610,26 +2600,6 @@ Microsoft Defender for Containers provides security alerts on the cluster level
|
2610 | 2600 |
|
2611 | 2601 | **Severity**: Informational
|
2612 | 2602 |
|
2613 |
| -### **Suspicious use of DNS over HTTPS** |
2614 |
| - |
2615 |
| -(K8S.NODE_SuspiciousDNSOverHttps) <sup>[1](#footnote1)</sup> |
2616 |
| - |
2617 |
| -**Description**: Analysis of processes running within a container or directly on a Kubernetes node, has detected the use of a DNS call over HTTPS in an uncommon fashion. This technique is used by attackers to hide calls out to suspect or malicious sites. |
2618 |
| - |
2619 |
| -**[MITRE tactics](#mitre-attck-tactics)**: DefenseEvasion, Exfiltration |
2620 |
| - |
2621 |
| -**Severity**: Medium |
2622 |
| - |
2623 |
| -### **A possible connection to malicious location has been detected.** |
2624 |
| - |
2625 |
| -(K8S.NODE_ThreatIntelCommandLineSuspectDomain) <sup>[1](#footnote1)</sup> |
2626 |
| - |
2627 |
| -**Description**: Analysis of processes running within a container or directly on a Kubernetes node, has detected a connection to a location that has been reported to be malicious or unusual. This is an indicator that a compromise might have occurred. |
2628 |
| - |
2629 |
| -**[MITRE tactics](#mitre-attck-tactics)**: InitialAccess |
2630 |
| - |
2631 |
| -**Severity**: Medium |
2632 |
| - |
2633 | 2603 | ### **Possible malicious web shell detected.**
|
2634 | 2604 |
|
2635 | 2605 | (K8S.NODE_Webshell) <sup>[1](#footnote1)</sup>
|
@@ -2660,16 +2630,6 @@ Microsoft Defender for Containers provides security alerts on the cluster level
|
2660 | 2630 |
|
2661 | 2631 | **Severity**: Medium
|
2662 | 2632 |
|
2663 |
| -### **Digital currency mining activity** |
2664 |
| - |
2665 |
| -(K8S.NODE_CurrencyMining) <sup>[1](#footnote1)</sup> |
2666 |
| - |
2667 |
| -**Description**: Analysis of DNS transactions detected digital currency mining activity. Such activity, while possibly legitimate user behavior, is frequently performed by attackers following compromise of resources. Typical related attacker activity is likely to include the download and execution of common mining tools. |
2668 |
| - |
2669 |
| -**[MITRE tactics](#mitre-attck-tactics)**: Exfiltration |
2670 |
| - |
2671 |
| -**Severity**: Low |
2672 |
| - |
2673 | 2633 | ### **Access to kubelet kubeconfig file detected**
|
2674 | 2634 |
|
2675 | 2635 | (K8S.NODE_KubeConfigAccess) <sup>[1](#footnote1)</sup>
|
@@ -4406,11 +4366,51 @@ Applies to: Azure Blob (Standard general-purpose v2, Azure Data Lake Storage Gen
|
4406 | 4366 |
|
4407 | 4367 | **Severity**: Medium
|
4408 | 4368 |
|
4409 |
| -## Deprecated Defender for Servers alerts |
| 4369 | +## Deprecated Defender for Containers alerts |
4410 | 4370 |
|
4411 |
| -The following lists include the Defender for Servers security alerts [which were deprecated in April 2023 due to an improvement process](release-notes-archive.md#deprecation-and-improvement-of-selected-alerts-for-windows-and-linux-servers). |
| 4371 | +The following lists include the Defender for Containers security alerts which were deprecated. |
| 4372 | + |
| 4373 | +### **Manipulation of host firewall detected** |
| 4374 | + |
| 4375 | +(K8S.NODE_FirewallDisabled) |
| 4376 | + |
| 4377 | +**Description**: Analysis of processes running within a container or directly on a Kubernetes node, has detected a possible manipulation of the on-host firewall. Attackers will often disable this to exfiltrate data. |
| 4378 | + |
| 4379 | +**[MITRE tactics](#mitre-attck-tactics)**: DefenseEvasion, Exfiltration |
| 4380 | + |
| 4381 | +**Severity**: Medium |
| 4382 | + |
| 4383 | +### **Suspicious use of DNS over HTTPS** |
| 4384 | + |
| 4385 | +(K8S.NODE_SuspiciousDNSOverHttps) |
| 4386 | + |
| 4387 | +**Description**: Analysis of processes running within a container or directly on a Kubernetes node, has detected the use of a DNS call over HTTPS in an uncommon fashion. This technique is used by attackers to hide calls out to suspect or malicious sites. |
| 4388 | + |
| 4389 | +**[MITRE tactics](#mitre-attck-tactics)**: DefenseEvasion, Exfiltration |
| 4390 | + |
| 4391 | +**Severity**: Medium |
| 4392 | + |
| 4393 | +### **A possible connection to malicious location has been detected.** |
| 4394 | + |
| 4395 | +(K8S.NODE_ThreatIntelCommandLineSuspectDomain) |
| 4396 | + |
| 4397 | +**Description**: Analysis of processes running within a container or directly on a Kubernetes node, has detected a connection to a location that has been reported to be malicious or unusual. This is an indicator that a compromise might have occurred. |
| 4398 | + |
| 4399 | +**[MITRE tactics](#mitre-attck-tactics)**: InitialAccess |
| 4400 | + |
| 4401 | +**Severity**: Medium |
| 4402 | + |
| 4403 | +### **Digital currency mining activity** |
| 4404 | + |
| 4405 | +(K8S.NODE_CurrencyMining) |
| 4406 | + |
| 4407 | +**Description**: Analysis of DNS transactions detected digital currency mining activity. Such activity, while possibly legitimate user behavior, is frequently performed by attackers following compromise of resources. Typical related attacker activity is likely to include the download and execution of common mining tools. |
| 4408 | + |
| 4409 | +**[MITRE tactics](#mitre-attck-tactics)**: Exfiltration |
| 4410 | + |
| 4411 | +**Severity**: Low |
4412 | 4412 |
|
4413 |
| -### Deprecated Linux alerts |
| 4413 | +## Deprecated Defender for Servers Linux alerts |
4414 | 4414 |
|
4415 | 4415 | ### VM_AbnormalDaemonTermination
|
4416 | 4416 |
|
@@ -4796,7 +4796,7 @@ The following lists include the Defender for Servers security alerts [which were
|
4796 | 4796 |
|
4797 | 4797 | **Severity**: Medium
|
4798 | 4798 |
|
4799 |
| -### Deprecated Windows alerts |
| 4799 | +## Deprecated Defender for Servers Windows alerts |
4800 | 4800 |
|
4801 | 4801 | ### SCUBA_MULTIPLEACCOUNTCREATE
|
4802 | 4802 |
|
|
0 commit comments