You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/alerts-schemas.md
+16-23Lines changed: 16 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,28 +10,22 @@ ms.devlang: na
10
10
ms.topic: conceptual
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: na
13
-
ms.date: 03/10/2020
13
+
ms.date: 03/19/2020
14
14
ms.author: memildin
15
15
16
16
---
17
17
18
18
# Security alerts schemas
19
19
20
-
Azure Security Center's advanced threat protection mechanisms generate security alerts when they detect threats to your resources.
20
+
Users of Azure Security Center's standard tier receive security alerts when Security Center detects threats to their resources.
21
21
22
-
These alerts are only available to users of the standard tier.
22
+
You can view these security alerts in Azure Security Center's **Threat Protection** pages, or through external tools such as:
23
23
24
-
Security alerts can be seen in Azure Security Center's Threat Protection pages. They can also be accessed from:
24
+
-[Azure Sentinel](https://docs.microsoft.com/azure/sentinel/) - Microsoft's cloud-native SIEM. The Sentinel Connector gets alerts from Azure Security Center and sends them to the [Log Analytics workspace](https://docs.microsoft.com/azure/azure-monitor/learn/quick-create-workspace) for Azure Sentinel.
25
+
- Third-party SIEMs - Use Security Center's [continuous export](continuous-export.md) tools to send data to [Azure Event Hubs](https://docs.microsoft.com/azure/event-hubs/). Then integrate your Event Hub data with a third-party SIEM.
26
+
-[The REST API](https://docs.microsoft.com/rest/api/securitycenter/) - If you're using the REST API to access alerts, see the [online Alerts API documentation](https://docs.microsoft.com/rest/api/securitycenter/alerts).
-[Azure Event Hubs](https://docs.microsoft.com/azure/event-hubs/) using Security Center's [continuous export feature](continuous-export.md) for integrations with third-party SIEMs
29
-
30
-
-[The REST API](https://docs.microsoft.com/rest/api/securitycenter/) - If you're using the REST API to access alerts, see the [online Alerts API documentation](https://docs.microsoft.com/rest/api/securitycenter/alerts)
If you're using any programmatic methods to consume the alerts, you'll need the correct schema to find the fields that are relevant to you. In addition, when exporting to an Event Hub or when triggering Workflow Automation with generic HTTP connectors, you could use the schemas to properly parse the JSON objects.
28
+
If you're using any programmatic methods to consume the alerts, you'll need the correct schema to find the fields that are relevant to you. Also, if you're exporting to an Event Hub or trying to trigger Workflow Automation with generic HTTP connectors, use the schemas to properly parse the JSON objects.
35
29
36
30
>[!IMPORTANT]
37
31
> The schema is slightly different for each of these scenarios, so make sure you select the relevant tab below.
@@ -44,12 +38,12 @@ If you're using any programmatic methods to consume the alerts, you'll need the
44
38
45
39
### Sample JSON for alerts sent to Logic Apps, Event Hub, and third-party SIEMs
46
40
47
-
This is the schema of the alert events passed to:
41
+
Below you'll find the schema of the alert events passed to:
48
42
49
43
- Azure Logic App instances that were configured in Security Center's workflow automation
50
44
- Azure Event Hub using Security Center's continuous export feature
51
45
52
-
For more information about the workflow automation feature see [Automate responses to alerts and recommendations](workflow-automation.md).
46
+
For more information about the workflow automation feature, see [Automate responses to alerts and recommendations](workflow-automation.md).
53
47
For more information about continuous export, see [Export alerts and recommendations](continuous-export.md).
@@ -148,19 +142,19 @@ You can view the security alerts events in Activity Log by searching for the Act
148
142
|**correlationId**|The Azure Security Center alert ID|
149
143
|**description**|Description of the alert|
150
144
|**eventDataId**|See correlationId|
151
-
|**eventName**|The value and localizedValue sub-fields contain the alert display name|
152
-
|**category**|The value and localizedValue sub-fields are constant - "Security"|
145
+
|**eventName**|The value and localizedValue subfields contain the alert display name|
146
+
|**category**|The value and localizedValue subfields are constant - "Security"|
153
147
|**eventTimestamp**|UTC timestamp for when the alert was generated|
154
148
|**id**|The fully qualified alert ID|
155
149
|**level**|Constant, "Informational"|
156
150
|**operationId**|See correlationId|
157
151
|**operationName**|The value field is constant - "Microsoft.Security/locations/alerts/activate/action", and the localized value will be "Activate Alert" (can potentially be localized par the user locale)|
158
152
|**resourceGroupName**|Will include the resource group name|
159
-
|**resourceProviderName**|The value and localizedValue sub-fields are constant - "Microsoft.Security"|
160
-
|**resourceType**|The value and localizedValue sub-fields are constant - "Microsoft.Security/locations/alerts"|
153
+
|**resourceProviderName**|The value and localizedValue subfields are constant - "Microsoft.Security"|
154
+
|**resourceType**|The value and localizedValue subfields are constant - "Microsoft.Security/locations/alerts"|
|**status**|The value and localizedValue sub-fields are constant - "Active"|
163
-
|**subStatus**|The value and localizedValue sub-fields are empty|
156
+
|**status**|The value and localizedValue subfields are constant - "Active"|
157
+
|**subStatus**|The value and localizedValue subfields are empty|
164
158
|**submissionTimestamp**|The UTC timestamp of event submission to Activity Log|
165
159
|**subscriptionId**|The subscription ID of the compromised resource|
166
160
|**properties**|A JSON bag of additional properties pertaining to the alert. These can change from one alert to the other, however, the following fields will appear in all alerts:<br>- severity: The severity of the attack<br>- compromisedEntity: The name of the compromised resource<br>- remediationSteps: Array of remediation steps to be taken<br>- intent: The kill-chain intent of the alert. Possible intents are documented in the [Intentions table](alerts-reference.md#intentions)|
@@ -184,10 +178,9 @@ The schema and a JSON representation for security alerts sent to MS Graph, are a
184
178
185
179
This article described the schemas that Azure Security Center's threat protection tools use when sending security alert information.
186
180
187
-
For more information on the ways to access security alerts from outside Security Center, see the following:
181
+
For more information on the ways to access security alerts from outside Security Center, see the following pages:
-[Log Analytics workspaces](https://docs.microsoft.com/azure/azure-monitor/learn/quick-create-workspace) - Azure Monitor stores log data in a Log Analytics workspace, a container that includes data and configuration information
0 commit comments