Skip to content

Commit 855a287

Browse files
Merge pull request #270743 from ElazarK/WI232963-Azurehound-alert
wi232963azurehound
2 parents baf28b3 + 3b6a25a commit 855a287

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

articles/defender-for-cloud/alerts-reference.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -833,6 +833,16 @@ While this action might be legitimate, attackers can try utilizing VM Access ext
833833

834834
**Severity**: Low
835835

836+
### **AzureHound tool invocation detected**
837+
838+
(ARM_AzureHound)
839+
840+
**Description**: AzureHound was run in your subscription and performed information gathering operations to enumerate resources. Threat actors use automated tools, like AzureHound, to enumerate resources and use them to access sensitive data or perform lateral movement. This was detected by analyzing Azure Resource Manager operations in your subscription. This operation might indicate that an identity in your organization was breached, and that the threat actor is trying to compromise your environment.
841+
842+
**[MITRE tactics](#mitre-attck-tactics)**: Discovery
843+
844+
**Severity**: Medium
845+
836846
## Alerts for Linux machines
837847

838848
Microsoft Defender for Servers Plan 2 provides unique detections and alerts, in addition to the ones provided by Microsoft Defender for Endpoint. The alerts provided for Linux machines are:

0 commit comments

Comments
 (0)