You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/alerts-schemas.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,9 +20,9 @@ If your subscription has Azure Defender enabled, you'll receive security alerts
20
20
21
21
You can view these security alerts in Azure Security Center's **Threat Protection** pages, or through external tools such as:
22
22
23
-
-[Azure Sentinel](https://docs.microsoft.com/azure/sentinel/) - Microsoft's cloud-native SIEM. The Sentinel Connector gets alerts from Azure Security Center and sends them to the [Log Analytics workspace](https://docs.microsoft.com/azure/azure-monitor/learn/quick-create-workspace) for Azure Sentinel.
24
-
- Third-party SIEMs - Use Security Center's [continuous export](continuous-export.md) tools to send data to [Azure Event Hubs](https://docs.microsoft.com/azure/event-hubs/). Then integrate your Event Hub data with a third-party SIEM.
25
-
-[The REST API](https://docs.microsoft.com/rest/api/securitycenter/) - If you're using the REST API to access alerts, see the [online Alerts API documentation](https://docs.microsoft.com/rest/api/securitycenter/alerts).
23
+
-[Azure Sentinel](../sentinel/index.yml) - Microsoft's cloud-native SIEM. The Sentinel Connector gets alerts from Azure Security Center and sends them to the [Log Analytics workspace](../azure-monitor/learn/quick-create-workspace.md) for Azure Sentinel.
24
+
- Third-party SIEMs - Use Security Center's [continuous export](continuous-export.md) tools to send data to [Azure Event Hubs](../event-hubs/index.yml). Then integrate your Event Hub data with a third-party SIEM.
25
+
-[The REST API](/rest/api/securitycenter/) - If you're using the REST API to access alerts, see the [online Alerts API documentation](/rest/api/securitycenter/alerts).
26
26
27
27
If you're using any programmatic methods to consume the alerts, you'll need the correct schema to find the fields that are relevant to you. Also, if you're exporting to an Event Hub or trying to trigger Workflow Automation with generic HTTP connectors, use the schemas to properly parse the JSON objects.
28
28
@@ -56,7 +56,7 @@ The Sentinel Connector gets alerts from Azure Security Center and sends them to
56
56
57
57
To create a Sentinel case or incident using Security Center alerts, you'll need the schema for those alerts shown below.
58
58
59
-
For more information about Azure Sentinel, see [the documentation](https://docs.microsoft.com/azure/sentinel/).
59
+
For more information about Azure Sentinel, see [the documentation](../sentinel/index.yml).
60
60
61
61
[!INCLUDE [Sentinel and workspace schema](../../includes/security-center-alerts-schema-log-analytics-workspace.md)]
62
62
@@ -168,7 +168,7 @@ You can view the security alerts events in Activity Log by searching for the Act
168
168
169
169
Microsoft Graph is the gateway to data and intelligence in Microsoft 365. It provides a unified programmability model that you can use to access the tremendous amount of data in Microsoft 365, Windows 10, and Enterprise Mobility + Security. Use the wealth of data in Microsoft Graph to build apps for organizations and consumers that interact with millions of users.
170
170
171
-
The schema and a JSON representation for security alerts sent to MS Graph, are available in [the Microsoft Graph documentation](https://docs.microsoft.com/graph/api/resources/alert?view=graph-rest-1.0&preserve-view=true).
171
+
The schema and a JSON representation for security alerts sent to MS Graph, are available in [the Microsoft Graph documentation](/graph/api/resources/alert?preserve-view=true&view=graph-rest-1.0).
172
172
173
173
---
174
174
@@ -179,7 +179,7 @@ This article described the schemas that Azure Security Center's threat protectio
179
179
180
180
For more information on the ways to access security alerts from outside Security Center, see the following pages:
-[Log Analytics workspaces](https://docs.microsoft.com/azure/azure-monitor/learn/quick-create-workspace) - Azure Monitor stores log data in a Log Analytics workspace, a container that includes data and configuration information
185
+
-[Log Analytics workspaces](../azure-monitor/learn/quick-create-workspace.md) - Azure Monitor stores log data in a Log Analytics workspace, a container that includes data and configuration information
> The KQL documentation provides a database with some sample data together with some simple queries to get the "feel" for the language. [Learn more in this KQL tutorial](https://docs.microsoft.com/azure/data-explorer/kusto/query/tutorial?pivots=azuredataexplorer).
66
+
> The KQL documentation provides a database with some sample data together with some simple queries to get the "feel" for the language. [Learn more in this KQL tutorial](/azure/data-explorer/kusto/query/tutorial?pivots=azuredataexplorer).
67
67
68
68
-**Asset management options** - Inventory lets you perform complex discovery queries. When you've found the resources that match your queries, inventory provides shortcuts for operations such as:
69
69
70
70
- Assign tags to the filtered resources - select the checkboxes alongside the resources you want to tag.
71
71
- Onboard new servers to Security Center - use the **Add non-Azure servers** toolbar button.
72
-
- Automate workloads with Azure Logic Apps - use the **Trigger Logic App** button to run a logic app on one or more resources. Your logic apps have to be prepared in advance, and accept the relevant trigger type (HTTP request). [Learn more about logic apps](https://docs.microsoft.com/azure/logic-apps/logic-apps-overview).
72
+
- Automate workloads with Azure Logic Apps - use the **Trigger Logic App** button to run a logic app on one or more resources. Your logic apps have to be prepared in advance, and accept the relevant trigger type (HTTP request). [Learn more about logic apps](../logic-apps/logic-apps-overview.md).
73
73
74
74
75
75
## How does asset inventory work?
76
76
77
-
Asset inventory utilizes [Azure Resource Graph (ARG)](https://docs.microsoft.com/azure/governance/resource-graph/), an Azure service that provides the ability to query Security Center's security posture data across multiple subscriptions.
77
+
Asset inventory utilizes [Azure Resource Graph (ARG)](../governance/resource-graph/index.yml), an Azure service that provides the ability to query Security Center's security posture data across multiple subscriptions.
78
78
79
79
ARG is designed to provide efficient resource exploration with the ability to query at scale.
80
80
81
-
Using the [Kusto Query Language (KQL)](https://docs.microsoft.com/azure/data-explorer/kusto/query/), asset inventory can quickly produce deep insights by cross-referencing ASC data with other resource properties.
81
+
Using the [Kusto Query Language (KQL)](/azure/data-explorer/kusto/query/), asset inventory can quickly produce deep insights by cross-referencing ASC data with other resource properties.
82
82
83
83
84
84
## How to use asset inventory
@@ -151,5 +151,5 @@ This article described the asset inventory page of Azure Security Center.
151
151
152
152
For more information on related tools, see the following pages:
Copy file name to clipboardExpand all lines: articles/security-center/continuous-export.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,7 +76,7 @@ The steps below are necessary whether you're setting up a continuous export to L
76
76
77
77
### Configure continuous export using the REST API
78
78
79
-
Continuous export can be configured and managed via the Azure Security Center [automations API](https://docs.microsoft.com/rest/api/securitycenter/automations). Use this API to create or update rules for exporting to any of the following possible destinations:
79
+
Continuous export can be configured and managed via the Azure Security Center [automations API](/rest/api/securitycenter/automations). Use this API to create or update rules for exporting to any of the following possible destinations:
80
80
81
81
- Azure Event Hub
82
82
- Log Analytics workspace
@@ -93,7 +93,7 @@ The API provides additional functionality not available from the Azure portal, f
93
93
> [!TIP]
94
94
> If you've set up multiple export configurations using the API, or if you've used API-only parameters, those extra features will not be displayed in the Security Center UI. Instead, there'll be a banner informing you that other configurations exist.
95
95
96
-
Learn more about the automations API in the [REST API documentation](https://docs.microsoft.com/rest/api/securitycenter/automations).
96
+
Learn more about the automations API in the [REST API documentation](/rest/api/securitycenter/automations).
97
97
98
98
99
99
@@ -159,7 +159,7 @@ To view the event schemas of the exported data types, visit the [Log Analytics t
159
159
160
160
## View exported alerts and recommendations in Azure Monitor
161
161
162
-
In some cases, you may choose to view the exported Security Alerts and/or recommendations in [Azure Monitor](https://docs.microsoft.com/azure/azure-monitor/platform/alerts-overview).
162
+
In some cases, you may choose to view the exported Security Alerts and/or recommendations in [Azure Monitor](../azure-monitor/platform/alerts-overview.md).
163
163
164
164
Azure Monitor provides a unified alerting experience for a variety of Azure alerts including Diagnostic Log, Metric alerts, and custom alerts based on Log Analytics workspace queries.
165
165
@@ -169,13 +169,13 @@ To view alerts and recommendations from Security Center in Azure Monitor, config
1. In the create rule page, configure your new rule (in the same way you'd configure a [log alert rule in Azure Monitor](https://docs.microsoft.com/azure/azure-monitor/platform/alerts-unified-log)):
172
+
1. In the create rule page, configure your new rule (in the same way you'd configure a [log alert rule in Azure Monitor](../azure-monitor/platform/alerts-unified-log.md)):
173
173
174
174
* For **Resource**, select the Log Analytics workspace to which you exported security alerts and recommendations.
175
175
176
176
* For **Condition**, select **Custom log search**. In the page that appears, configure the query, lookback period, and frequency period. In the search query, you can type *SecurityAlert* or *SecurityRecommendation* to query the data types that Security Center continuously exports to as you enable the Continuous export to Log Analytics feature.
177
177
178
-
* Optionally, configure the [Action Group](https://docs.microsoft.com/azure/azure-monitor/platform/action-groups) that you'd like to trigger. Action groups can trigger email sending, ITSM tickets, WebHooks, and more.
178
+
* Optionally, configure the [Action Group](../azure-monitor/platform/action-groups.md) that you'd like to trigger. Action groups can trigger email sending, ITSM tickets, WebHooks, and more.
You'll now see new Azure Security Center alerts or recommendations (depending on your configured continuous export rules and the condition you defined in your Azure Monitor alert rule) in Azure Monitor alerts, with automatic triggering of an action group (if provided).
@@ -210,7 +210,7 @@ In this article, you learned how to configure continuous exports of your recomme
210
210
For related material, see the following documentation:
211
211
212
212
- Learn more about [workflow automation templates](https://github.com/Azure/Azure-Security-Center/tree/master/Workflow%20automation).
Copy file name to clipboardExpand all lines: articles/security-center/custom-security-policies.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ To help secure your systems and environment, Azure Security Center generates sec
19
19
20
20
With this feature, you can add your own *custom* initiatives. You'll then receive recommendations if your environment doesn't follow the policies you create. Any custom initiatives you create will appear alongside the built-in initiatives in the regulatory compliance dashboard, as described in the tutorial [Improve your regulatory compliance](security-center-compliance-dashboard.md).
21
21
22
-
As discussed in [the Azure Policy documentation](https://docs.microsoft.com/azure/governance/policy/concepts/definition-structure#definition-location), when you specify a location for your custom initiative, it must be a management group or a subscription.
22
+
As discussed in [the Azure Policy documentation](../governance/policy/concepts/definition-structure.md#definition-location), when you specify a location for your custom initiative, it must be a management group or a subscription.
23
23
24
24
## To add a custom initiative to your subscription
25
25
@@ -134,7 +134,7 @@ Below is an example of a custom policy including the metadata/securityCenter pro
134
134
}
135
135
```
136
136
137
-
For another example of using the securityCenter property, see [this section of the REST API documentation](https://docs.microsoft.com/rest/api/securitycenter/assessmentsmetadata/createinsubscription#examples).
137
+
For another example of using the securityCenter property, see [this section of the REST API documentation](/rest/api/securitycenter/assessmentsmetadata/createinsubscription#examples).
138
138
139
139
140
140
## Next steps
@@ -144,4 +144,4 @@ In this article, you learned how to create custom security policies.
144
144
For other related material, see the following articles:
145
145
146
146
- [The overview of security policies](tutorial-security-policy.md)
147
-
- [A list of the built-in security policies](security-center-policy-definitions.md)
147
+
- [A list of the built-in security policies](./policy-reference.md)
Copy file name to clipboardExpand all lines: articles/security-center/defender-for-container-registries-usage.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ When the scanner reports vulnerabilities to Security Center, Security Center pre
25
25
|Release state:|Generally available (GA)|
26
26
|Pricing:|**Azure Defender for container registries** is billed as shown on [the pricing page](security-center-pricing.md)|
27
27
|Supported registries and images:| Linux-hosted ACR registries that are accessible from the public internet and provide shell access.<br> Windows-hosted ACR registries.<br> 'Private' registries - Security Center requires your registries to be accessible from the public internet. Security Center can't currently connect to, or scan, registries with access limited with a firewall, a service endpoint, or private endpoints such as Azure Private Link.<br> Super minimalist images such as [Docker scratch](https://hub.docker.com/_/scratch/) images, or "Distroless" images that only contain an application and its runtime dependencies without a package manager, shell, or OS.|
28
-
|Required roles and permissions:|**Security reader** and [Azure Container Registry reader role](https://docs.microsoft.com/azure/container-registry/container-registry-roles)|
28
+
|Required roles and permissions:|**Security reader** and [Azure Container Registry reader role](../container-registry/container-registry-roles.md)|
29
29
|Clouds:| Commercial clouds<br> National/Sovereign (US Gov, China Gov, Other Gov)|
Copy file name to clipboardExpand all lines: articles/security-center/defender-for-sql-introduction.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ manager: rkarlin
13
13
14
14
# Introduction to Azure Defender for SQL
15
15
16
-
Azure Defender for SQL includes two Azure Defender plans that extend Azure Security Center's [data security package](../azure-sql/database/advanced-data-security.md) to secure your databases and their data wherever they're located.
16
+
Azure Defender for SQL includes two Azure Defender plans that extend Azure Security Center's [data security package](../azure-sql/database/azure-defender-for-sql.md) to secure your databases and their data wherever they're located.
17
17
18
18
## Availability
19
19
@@ -65,5 +65,5 @@ In this article, you learned about Azure Defender for SQL.
65
65
For related material, see the following articles:
66
66
67
67
-[How to enable Azure Defender for SQL servers on machines](defender-for-sql-usage.md)
68
-
-[How to enable Azure Defender for SQL database servers](../azure-sql/database/advanced-data-security.md)
68
+
-[How to enable Azure Defender for SQL database servers](../azure-sql/database/azure-defender-for-sql.md)
69
69
-[The list of Azure Defender alerts for SQL](alerts-reference.md#alerts-sql-db-and-warehouse)
0 commit comments