Skip to content

Commit 8846225

Browse files
authored
Merge pull request #164527 from dotanpatrich/patch-3
add AppServices_DataEgressArtifacts and AppServices_SuspectDownloadAr…
2 parents bdbaba5 + c3aa661 commit 8846225

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

articles/security-center/alerts-reference.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -241,8 +241,9 @@ At the bottom of this page, there's a table describing the Azure Security Center
241241
| **Vulnerability scanner detected**<br>(AppServices_WpScanner) | Azure App Service activity log indicates that a possible vulnerability scanner was used on your App Service resource.<br>The suspicious activity detected resembles that of tools targeting WordPress applications.<br>If your App Service resource isn’t hosting a WordPress site, it isn’t vulnerable to this specific code injection exploit and you can safely suppress this alert for the resource. To learn how to suppress Azure Defender alerts, see https://docs.microsoft.com/azure/security-center/alerts-suppression-rules.<br>(Applies to: App Service on Windows and App Service on Linux) | PreAttack | Medium |
242242
| **Web fingerprinting detected**<br>(AppServices_WebFingerprinting) | Azure App Service activity log indicates a possible web fingerprinting activity on your App Service resource.<br>The suspicious activity detected is associated with a tool called Blind Elephant. The tool fingerprint web servers and tries to detect the installed applications and version.<br>Attackers often use this tool for probing the web application to find vulnerabilities.<br>(Applies to: App Service on Windows and App Service on Linux) | PreAttack | Medium |
243243
| **Website is tagged as malicious in threat intelligence feed**<br>(AppServices_SmartScreen) | Your website as described below is marked as a malicious site by Windows SmartScreen. If you think this is a false positive, contact Windows SmartScreen via report feedback link provided.<br>(Applies to: App Service on Windows and App Service on Linux) | Collection | Medium |
244-
| | |
245-
244+
| **Possible loss of data detected**<br>(AppServices_DataEgressArtifacts)| Analysis of host/device data detected a possible data egress condition. Attackers will often egress data from machines they have compromised.<br>(Applies to: App Service on Linux)|Collection, Exfiltration|Medium||
245+
| **Detected suspicious file download**<br>(AppServices_SuspectDownloadArtifacts)|Analysis of host data has detected suspicious download of remote file.<br>(Applies to: App Service on Linux)|Persistence|Medium|
246+
|||||
246247

247248

248249
## <a name="alerts-k8scluster"></a>Alerts for containers - Kubernetes clusters

0 commit comments

Comments
 (0)