You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/alerts-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,5 +115,5 @@ In this article, you learned about the different types of alerts available in De
115
115
116
116
-[Security alerts in Azure Activity log](https://go.microsoft.com/fwlink/?linkid=2114113) - In addition to being available in the Azure portal or programmatically, Security alerts and incidents are audited as events in Azure Activity Log
117
117
-[Reference table of Defender for Cloud alerts](alerts-reference.md)
118
-
-[Respond to security alerts](managing-and-responding-alerts.md#respond-to-security-alerts)
118
+
-[Respond to security alerts](managing-and-responding-alerts.md#respond-to-a-security-alert)
119
119
- Learn how to [manage security incidents in Defender for Cloud](incidents.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/alerts-schemas.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,26 +9,26 @@ ms.date: 11/09/2021
9
9
10
10
# Security alerts schemas
11
11
12
-
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled, you'll receive security alerts when Defender for Cloud detects threats to their resources.
12
+
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled, you receive security alerts when Defender for Cloud detects threats to their resources.
13
13
14
-
You can view these security alerts in Microsoft Defender for Cloud's pages - [overview dashboard](overview-page.md), [alerts](tutorial-security-incident.md), [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md) - and through external tools such as:
14
+
You can view these security alerts in Microsoft Defender for Cloud's pages - [overview dashboard](overview-page.md), [alerts](managing-and-responding-alerts.md), [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md) - and through external tools such as:
15
15
16
16
-[Microsoft Sentinel](../sentinel/index.yml) - Microsoft's cloud-native SIEM. The Sentinel Connector gets alerts from Microsoft Defender for Cloud and sends them to the [Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md) for Microsoft Sentinel.
17
-
- Third-party SIEMs - Send data to [Azure Event Hubs](../event-hubs/index.yml). Then integrate your Event Hub data with a third-party SIEM. Learn more in [Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
17
+
- Third-party SIEMs - Send data to [Azure Event Hubs](../event-hubs/index.yml). Then integrate your Event Hubs data with a third-party SIEM. Learn more in [Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
18
18
-[The REST API](/rest/api/defenderforcloud/) - If you're using the REST API to access alerts, see the [online Alerts API documentation](/rest/api/defenderforcloud/alerts).
19
19
20
-
If you're using any programmatic methods to consume the alerts, you'll need the correct schema to find the fields that are relevant to you. Also, if you're exporting to an Event Hub or trying to trigger Workflow Automation with generic HTTP connectors, use the schemas to properly parse the JSON objects.
20
+
If you're using any programmatic methods to consume the alerts, you need the correct schema to find the fields that are relevant to you. Also, if you're exporting to an Event Hubs or trying to trigger Workflow Automation with generic HTTP connectors, use the schemas to properly parse the JSON objects.
21
21
22
22
>[!IMPORTANT]
23
-
> The schema is slightly different for each of these scenarios, so make sure you select the relevant tab below.
23
+
> The schema is slightly different for each of these scenarios, so make sure you select the relevant tab.
24
24
25
25
## The schemas
26
26
27
27
### [Microsoft Sentinel](#tab/schema-sentinel)
28
28
29
29
The Sentinel Connector gets alerts from Microsoft Defender for Cloud and sends them to the Log Analytics Workspace for Microsoft Sentinel.
30
30
31
-
To create a Microsoft Sentinel case or incident using Defender for Cloud alerts, you'll need the schema for those alerts shown below.
31
+
To create a Microsoft Sentinel case or incident using Defender for Cloud alerts, you need the schema for those alerts shown.
32
32
33
33
Learn more in the [Microsoft Sentinel documentation](../sentinel/index.yml).
34
34
@@ -117,16 +117,16 @@ You can view the security alerts events in Activity Log by searching for the Act
117
117
|**id**|The fully qualified alert ID|
118
118
|**level**|Constant, "Informational"|
119
119
|**operationId**|See correlationId|
120
-
|**operationName**|The value field is constant - "Microsoft.Security/locations/alerts/activate/action", and the localized value will be "Activate Alert" (can potentially be localized par the user locale)|
121
-
|**resourceGroupName**|Will include the resource group name|
120
+
|**operationName**|The value field is constant - `Microsoft.Security/locations/alerts/activate/action`, and the localized value is `Activate Alert` (can potentially be localized par the user locale)|
121
+
|**resourceGroupName**| Includes the resource group name|
122
122
|**resourceProviderName**|The value and localizedValue subfields are constant - "Microsoft.Security"|
123
123
|**resourceType**|The value and localizedValue subfields are constant - "Microsoft.Security/locations/alerts"|
|**status**|The value and localizedValue subfields are constant - "Active"|
126
126
|**subStatus**|The value and localizedValue subfields are empty|
127
127
|**submissionTimestamp**|The UTC timestamp of event submission to Activity Log|
128
128
|**subscriptionId**|The subscription ID of the compromised resource|
129
-
|**properties**|A JSON bag of additional properties pertaining to the alert. These can change from one alert to the other, however, the following fields will appear in all alerts:<br>- severity: The severity of the attack<br>- compromisedEntity: The name of the compromised resource<br>- remediationSteps: Array of remediation steps to be taken<br>- intent: The kill-chain intent of the alert. Possible intents are documented in the [Intentions table](alerts-reference.md#intentions)|
129
+
|**properties**|A JSON bag of other properties pertaining to the alert. Properties can change from one alert to the other, however, the following fields appear in all alerts:<br>- severity: The severity of the attack<br>- compromisedEntity: The name of the compromised resource<br>- remediationSteps: Array of remediation steps to be taken<br>- intent: The kill-chain intent of the alert. Possible intents are documented in the [Intentions table](alerts-reference.md#intentions)|
130
130
|**relatedEvents**|Constant - empty array|
131
131
132
132
@@ -138,8 +138,8 @@ For the alerts schema when using workflow automation, see the [connectors docume
138
138
139
139
Defender for Cloud's continuous export feature passes alert data to:
140
140
141
-
- Azure Event Hub using the same schema as [the alerts API](/rest/api/defenderforcloud/alerts).
142
-
- Log Analytics workspaces according to the [SecurityAlert schema](/azure/azure-monitor/reference/tables/SecurityAlert) in the Azure Monitor data reference documentation.
141
+
- Azure Event Hubs using the same schema as [the alerts API](/rest/api/defenderforcloud/alerts).
142
+
- Log Analytics workspaces according to the [SecurityAlert schema](/azure/azure-monitor/reference/tables/SecurityAlert) in the Azure Monitor data documentation.
143
143
144
144
### [MS Graph API](#tab/schema-graphapi)
145
145
@@ -151,7 +151,7 @@ The schema and a JSON representation for security alerts sent to MS Graph, are a
151
151
152
152
## Next steps
153
153
154
-
This article described the schemas that Microsoft Defender for Cloud's threat protection tools use when sending security alert information.
154
+
This article described the schemas that Microsoft Defenders for Cloud's threat protection tools use when sending security alert information.
155
155
156
156
For more information on the ways to access security alerts from outside Defender for Cloud, see:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-apis-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Defender for APIs currently provides security for APIs published in Azure API Ma
24
24
-**Threat detection**: Ingest API traffic and monitor it with runtime anomaly detection, using machine-learning and rule-based analytics, to detect API security threats, including the [OWASP API Top 10](https://owasp.org/www-project-api-security/) critical threats.
25
25
-**Defender CSPM integration**: Integrate with Cloud Security Graph in [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) for API visibility and risk assessment across your organization.
26
26
-**Azure API Management integration**: With the Defender for APIs plan enabled, you can receive API security recommendations and alerts in the Azure API Management portal.
27
-
-**SIEM integration**: Integrate with security information and event management (SIEM) systems, making it easier for security teams to investigate with existing threat response workflows. [Learn more](tutorial-security-incident.md).
27
+
-**SIEM integration**: Integrate with security information and event management (SIEM) systems, making it easier for security teams to investigate with existing threat response workflows. [Learn more](managing-and-responding-alerts.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-databases-usage.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ When Microsoft Defender for Cloud is enabled on your database, it detects anomal
43
43
> [!TIP]
44
44
> A live tile on [Microsoft Defender for Cloud's overview dashboard](overview-page.md) tracks the status of active threats to all your resources including databases. Select the security alerts tile to go to the Defender for Cloud security alerts page and get an overview of active threats detected on your databases.
45
45
>
46
-
> For detailed steps and the recommended method to respond to security alerts, see [Respond to a security alert](tutorial-security-incident.md#respond-to-a-security-alert).
46
+
> For detailed steps and the recommended method to respond to security alerts, see [Respond to a security alert](managing-and-responding-alerts.md#respond-to-a-security-alert).
47
47
48
48
### Respond to email notifications of security alerts
49
49
@@ -62,7 +62,7 @@ Defender for Cloud sends email notifications when it detects anomalous database
62
62
:::image type="content" source="media/defender-for-databases-usage/specific-alert-details.png" alt-text="Details of a specific alert." lightbox="media/defender-for-databases-usage/specific-alert-details.png":::
63
63
64
64
> [!TIP]
65
-
> For a detailed tutorial on how to handle your alerts, see [Tutorial: Triage, investigate, and respond to security alerts](tutorial-security-incident.md).
65
+
> For a detailed tutorial on how to handle your alerts, see [Manage and respond to alerts](tutorial-security-incident.md).
0 commit comments