Skip to content

Commit c5bbbbd

Browse files
authored
Merge pull request #108285 from memildin/asc-melvyn-alertsschema
Tweaked the intro to schema article
2 parents f985e5b + 514554e commit c5bbbbd

File tree

1 file changed

+16
-23
lines changed

1 file changed

+16
-23
lines changed

articles/security-center/alerts-schemas.md

Lines changed: 16 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -10,28 +10,22 @@ ms.devlang: na
1010
ms.topic: conceptual
1111
ms.tgt_pltfrm: na
1212
ms.workload: na
13-
ms.date: 03/10/2020
13+
ms.date: 03/19/2020
1414
ms.author: memildin
1515

1616
---
1717

1818
# Security alerts schemas
1919

20-
Azure Security Center's advanced threat protection mechanisms generate security alerts when they detect threats to your resources.
20+
Users of Azure Security Center's standard tier receive security alerts when Security Center detects threats to their resources.
2121

22-
These alerts are only available to users of the standard tier.
22+
You can view these security alerts in Azure Security Center's **Threat Protection** pages, or through external tools such as:
2323

24-
Security alerts can be seen in Azure Security Center's Threat Protection pages. They can also be accessed from:
24+
- [Azure Sentinel](https://docs.microsoft.com/azure/sentinel/) - Microsoft's cloud-native SIEM. The Sentinel Connector gets alerts from Azure Security Center and sends them to the [Log Analytics workspace](https://docs.microsoft.com/azure/azure-monitor/learn/quick-create-workspace) for Azure Sentinel.
25+
- Third-party SIEMs - Use Security Center's [continuous export](continuous-export.md) tools to send data to [Azure Event Hubs](https://docs.microsoft.com/azure/event-hubs/). Then integrate your Event Hub data with a third-party SIEM.
26+
- [The REST API](https://docs.microsoft.com/rest/api/securitycenter/) - If you're using the REST API to access alerts, see the [online Alerts API documentation](https://docs.microsoft.com/rest/api/securitycenter/alerts).
2527

26-
- [Azure Sentinel](https://docs.microsoft.com/azure/sentinel/)
27-
28-
- [Azure Event Hubs](https://docs.microsoft.com/azure/event-hubs/) using Security Center's [continuous export feature](continuous-export.md) for integrations with third-party SIEMs
29-
30-
- [The REST API](https://docs.microsoft.com/rest/api/securitycenter/) - If you're using the REST API to access alerts, see the [online Alerts API documentation](https://docs.microsoft.com/rest/api/securitycenter/alerts)
31-
32-
- [Log Analytics workspaces](https://docs.microsoft.com/azure/azure-monitor/learn/quick-create-workspace)
33-
34-
If you're using any programmatic methods to consume the alerts, you'll need the correct schema to find the fields that are relevant to you. In addition, when exporting to an Event Hub or when triggering Workflow Automation with generic HTTP connectors, you could use the schemas to properly parse the JSON objects.
28+
If you're using any programmatic methods to consume the alerts, you'll need the correct schema to find the fields that are relevant to you. Also, if you're exporting to an Event Hub or trying to trigger Workflow Automation with generic HTTP connectors, use the schemas to properly parse the JSON objects.
3529

3630
>[!IMPORTANT]
3731
> The schema is slightly different for each of these scenarios, so make sure you select the relevant tab below.
@@ -44,12 +38,12 @@ If you're using any programmatic methods to consume the alerts, you'll need the
4438

4539
### Sample JSON for alerts sent to Logic Apps, Event Hub, and third-party SIEMs
4640

47-
This is the schema of the alert events passed to:
41+
Below you'll find the schema of the alert events passed to:
4842

4943
- Azure Logic App instances that were configured in Security Center's workflow automation
5044
- Azure Event Hub using Security Center's continuous export feature
5145

52-
For more information about the workflow automation feature see [Automate responses to alerts and recommendations](workflow-automation.md).
46+
For more information about the workflow automation feature, see [Automate responses to alerts and recommendations](workflow-automation.md).
5347
For more information about continuous export, see [Export alerts and recommendations](continuous-export.md).
5448

5549
[!INCLUDE [Workflow schema](../../includes/security-center-alerts-schema-workflow-automation.md)]
@@ -148,19 +142,19 @@ You can view the security alerts events in Activity Log by searching for the Act
148142
|**correlationId**|The Azure Security Center alert ID|
149143
|**description**|Description of the alert|
150144
|**eventDataId**|See correlationId|
151-
|**eventName**|The value and localizedValue sub-fields contain the alert display name|
152-
|**category**|The value and localizedValue sub-fields are constant - "Security"|
145+
|**eventName**|The value and localizedValue subfields contain the alert display name|
146+
|**category**|The value and localizedValue subfields are constant - "Security"|
153147
|**eventTimestamp**|UTC timestamp for when the alert was generated|
154148
|**id**|The fully qualified alert ID|
155149
|**level**|Constant, "Informational"|
156150
|**operationId**|See correlationId|
157151
|**operationName**|The value field is constant - "Microsoft.Security/locations/alerts/activate/action", and the localized value will be "Activate Alert" (can potentially be localized par the user locale)|
158152
|**resourceGroupName**|Will include the resource group name|
159-
|**resourceProviderName**|The value and localizedValue sub-fields are constant - "Microsoft.Security"|
160-
|**resourceType**|The value and localizedValue sub-fields are constant - "Microsoft.Security/locations/alerts"|
153+
|**resourceProviderName**|The value and localizedValue subfields are constant - "Microsoft.Security"|
154+
|**resourceType**|The value and localizedValue subfields are constant - "Microsoft.Security/locations/alerts"|
161155
|**resourceId**|The fully qualified Azure resource ID|
162-
|**status**|The value and localizedValue sub-fields are constant - "Active"|
163-
|**subStatus**|The value and localizedValue sub-fields are empty|
156+
|**status**|The value and localizedValue subfields are constant - "Active"|
157+
|**subStatus**|The value and localizedValue subfields are empty|
164158
|**submissionTimestamp**|The UTC timestamp of event submission to Activity Log|
165159
|**subscriptionId**|The subscription ID of the compromised resource|
166160
|**properties**|A JSON bag of additional properties pertaining to the alert. These can change from one alert to the other, however, the following fields will appear in all alerts:<br>- severity: The severity of the attack<br>- compromisedEntity: The name of the compromised resource<br>- remediationSteps: Array of remediation steps to be taken<br>- intent: The kill-chain intent of the alert. Possible intents are documented in the [Intentions table](alerts-reference.md#intentions)|
@@ -184,10 +178,9 @@ The schema and a JSON representation for security alerts sent to MS Graph, are a
184178

185179
This article described the schemas that Azure Security Center's threat protection tools use when sending security alert information.
186180

187-
For more information on the ways to access security alerts from outside Security Center, see the following:
181+
For more information on the ways to access security alerts from outside Security Center, see the following pages:
188182

189183
- [Azure Sentinel](https://docs.microsoft.com/azure/sentinel/) - Microsoft's cloud-native SIEM
190184
- [Azure Event Hubs](https://docs.microsoft.com/azure/event-hubs/) - Microsoft's fully managed, real-time data ingestion service
191185
- Security Center's [continuous export feature](continuous-export.md)
192-
193186
- [Log Analytics workspaces](https://docs.microsoft.com/azure/azure-monitor/learn/quick-create-workspace) - Azure Monitor stores log data in a Log Analytics workspace, a container that includes data and configuration information

0 commit comments

Comments
 (0)