Skip to content

Commit b5a3fab

Browse files
authored
Merge pull request #99985 from memildin/melvyn-asc-alerts_ref
Alerts table with intent
2 parents 3fd7927 + a557b27 commit b5a3fab

12 files changed

+243
-215
lines changed

articles/security-center/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,8 @@
5252
items:
5353
- name: Security alerts overview
5454
href: security-center-alerts-overview.md
55+
- name: Reference list of alerts
56+
href: alerts-reference.md
5557
- name: Manage security alerts
5658
href: security-center-managing-and-responding-alerts.md
5759
- name: Manage security incidents
@@ -64,7 +66,7 @@
6466
href: security-center-alerts-data-services.md
6567
- name: Threat detection for Azure service layers
6668
href: security-center-alerts-service-layer.md
67-
- name: Integration with Azure Security Products
69+
- name: Threat detection for Azure WAF and Azure DDoS Protection
6870
href: security-center-alerts-integration.md
6971
- name: Cloud Smart Alert correlation (incidents)
7072
href: security-center-alerts-cloud-smart.md

articles/security-center/alerts-reference.md

Lines changed: 164 additions & 0 deletions
Large diffs are not rendered by default.

articles/security-center/index.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,8 +58,6 @@ landingContent:
5858
url: security-center-secure-score.md
5959
- text: Upgrade to advanced security
6060
url: security-center-onboarding.md
61-
- text: Integrate with other Azure security products
62-
url: security-center-alerts-integration.md
6361

6462
# Card
6563
- title: Improve your secure score

articles/security-center/security-center-alerts-compute.md

Lines changed: 7 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.devlang: na
1111
ms.topic: conceptual
1212
ms.tgt_pltfrm: na
1313
ms.workload: na
14-
ms.date: 11/05/2019
14+
ms.date: 01/05/2020
1515
ms.author: memildin
1616
---
1717
# Threat detection for cloud native computing in Azure Security Center
@@ -32,20 +32,7 @@ By using the visibility that Azure has as a cloud provider, Security Center anal
3232

3333
Security Center also has access to the underlying sandboxes and VMs. Together with memory forensics, the infrastructure can tell the story, from a new attack circulating in the wild to compromises in customer machines. Therefore, even if Security Center is deployed after a web app has been exploited, it may be able to detect ongoing attacks.
3434

35-
> [!div class="mx-tableFixed"]
36-
37-
|Alert|Description|
38-
|---|---|
39-
|**Suspicious WordPress theme invocation detected**|The App Service activity log indicates a possible code injection activity on your App Service resource.<br/> This suspicious activity resembles activity that manipulates a WordPress theme to support server-side execution of code, followed by a direct web request to invoke the manipulated theme file. This type of activity can be part of an attack campaign over WordPress.|
40-
|**Connection to web page from anomalous IP address detected**|The App Service activity log indicates a connection to a sensitive web page from a source address that never connected to it before. This connection might indicate that someone is attempting a brute force attack into your web app administration pages. It might also be the result of a legitimate user using a new IP address.|
41-
|**An IP that connected to your Azure App Service FTP Interface was found in Threat Intelligence**|App Service FTP logs analysis has detected a connection from a source address that was found in the threat intelligence feed. During this connection, a user accessed the pages listed.|
42-
|**Web fingerprinting detected**|The App Service activity log indicates a possible web fingerprinting activity on your App Service resource. <br/>This suspicious activity is associated with a tool called Blind Elephant. The tool fingerprints web servers and tries to detect the installed applications and their versions. Attackers often use this tool for probing the web applications to find vulnerabilities.|
43-
|**Suspicious access to possibly vulnerable web page detected**|The App Service activity log indicates that a web page that seems to be sensitive was accessed. <br/>This suspicious activity originated from a source address whose access pattern resembles that of a web scanner. This kind of activity is often associated with an attempt by an attacker to scan your network to try to gain access to sensitive or vulnerable web pages.|
44-
|**PHP file in upload folder**|The App Service activity log indicates something has accessed a suspicious PHP page located in the upload folder. <br/>This type of folder doesn't usually contain PHP files. The existence of this type of file might indicate an exploitation taking advantage of arbitrary file upload vulnerabilities.|
45-
|**An attempt to run Linux commands on a Windows App Service**|Analysis of App Service processes detected an attempt to run a Linux command on a Windows App Service. This action was running by the web application. This behavior is often seen during campaigns that exploit a vulnerability in a common web application.|
46-
|**Suspicious PHP execution detected**|Machine logs indicate that a suspicious PHP process is running. The action included an attempt to run operating system commands or PHP code from the command line, by using the PHP process. While this behavior can be legitimate, in web applications this behavior might indicate malicious activities, such as attempts to infect websites with web shells.|
47-
|**Process execution from temporary folder**|App Service processes analysis has detected an execution of a process from the app's temporary folder. While this behavior can be legitimate, in web applications this behavior might indicate malicious activities.|
48-
|**Attempt to run high privilege command detected**|Analysis of App Service processes has detected an attempt to run a command that requires high privileges. The command ran in the web application context. While this behavior can be legitimate, in web applications this behavior might indicate malicious activities.|
35+
For a list of the Azure App Service alerts, see the [Reference table of alerts](alerts-reference.md#alerts-azureappserv).
4936

5037
## Azure Containers <a name="azure-containers"></a>
5138

@@ -60,40 +47,14 @@ We detect threats at different levels:
6047
>[!NOTE]
6148
> If you choose not to install the agents on your hosts, you will only receive a subset of the threat detection benefits and alerts. You'll still receive alerts related to network analysis and communications with malicious servers.
6249
50+
For a list of the host level alerts, see the [Reference table of alerts](alerts-reference.md#alerts-containerhost).
51+
52+
6353
* For **AKS cluster level**, there's threat detection monitoring based on Kubernetes audit logs analysis. To enable this **agentless** monitoring, add the Kubernetes option to your subscription from the **Pricing & settings** page (see [pricing](security-center-pricing.md)). To generate alerts at this level, Security Center monitors your AKS-managed services using the logs retrieved by AKS. Examples of events at this level include exposed Kubernetes dashboards, creation of high privileged roles, and creation of sensitive mounts.
6454

6555
>[!NOTE]
6656
> Security Center generates detection alerts for Azure Kubernetes Service actions and deployments occurring after the Kubernetes option is enabled on the subscription settings.
6757
68-
Also, our global team of security researchers constantly monitor the threat landscape. They add container-specific alerts and vulnerabilities as they're discovered.
69-
70-
71-
### AKS cluster level alerts
72-
73-
> [!div class="mx-tableFixed"]
74-
75-
|Alert|Description|
76-
|---|---|
77-
|**PREVIEW - Role binding to the cluster-admin role detected**|Kubernetes audit log analysis detected a new binding to the cluster-admin role resulting in administrator privileges. Unnecessarily providing administrator privileges might result in privilege escalation issues in the cluster.|
78-
|**PREVIEW - Exposed Kubernetes dashboard detected**|Kubernetes audit log analysis detected exposure of the Kubernetes Dashboard by a LoadBalancer service. Exposed dashboards allow unauthenticated access to the cluster management and pose a security threat.|
79-
|**PREVIEW - New high privileges role detected**|Kubernetes audit log analysis detected a new role with high privileges. A binding to a role with high privileges gives the user/group elevated privileges in the cluster. Unnecessarily providing elevated privileges might result in privilege escalation issues in the cluster.|
80-
|**PREVIEW - New container in the kube-system namespace detected**|Kubernetes audit log analysis detected a new container in the kube-system namespace that isn’t among the containers that normally run in this namespace. The kube-system namespaces shouldn't contain user resources. Attackers can use this namespace to hide malicious components.|
81-
|**PREVIEW - Digital currency mining container detected**|Kubernetes audit log analysis detected a container that has an image associated with a digital currency mining tool.|
82-
|**PREVIEW - Privileged container detected**|Kubernetes audit log analysis detected a new privileged container. A privileged container has access to the node’s resources and breaks the isolation between containers. If compromised, an attacker can use the privileged container to gain access to the node.|
83-
|**PREVIEW - Container with a sensitive volume mount detected**|Kubernetes audit log analysis detected a new container with a sensitive volume mount. The volume that was detected is a hostPath type that mounts a sensitive file or folder from the node to the container. If the container gets compromised, the attacker can use this mount to gain access to the node.|
84-
85-
86-
87-
### Host level alerts
88-
89-
> [!div class="mx-tableFixed"]
58+
For a list of the AKS cluster level alerts, see the [Reference table of alerts](alerts-reference.md#alerts-akscluster).
9059

91-
|Alert|Description|
92-
|---|---|
93-
|**Privileged Container Detected**|Machine logs indicate that a privileged Docker container is running. A privileged container has full access to the host's resources. If compromised, an attacker can use the privileged container to gain access to the host machine.|
94-
|**Privileged command run in container**|Machine logs indicate that a privileged command was run in a Docker container. A privileged command has extended privileges on the host machine.|
95-
|**Exposed Docker daemon detected**|Machine logs indicate that your Docker daemon (dockerd) exposes a TCP socket. By default, Docker configuration doesn't use encryption or authentication when a TCP socket is enabled. Anyone with access to the relevant port can then get full access to the Docker daemon.|
96-
|**SSH server is running inside a container**|Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached.|
97-
|**Container with a miner image detected**|Machine logs indicate execution of a Docker container running an image associated with digital currency mining. This behavior can possibly indicate that your resources are being abused.|
98-
|**Suspicious request to Kubernetes API**|Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container.|
99-
|**Suspicious request to the Kubernetes Dashboard**|Machine logs indicate that a suspicious request was made to the Kubernetes Dashboard. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container.|
60+
Also, our global team of security researchers constantly monitor the threat landscape. They add container-specific alerts and vulnerabilities as they're discovered.

0 commit comments

Comments
 (0)