Skip to content

Commit cb39370

Browse files
committed
Removed deprecated DDoS alerts
1 parent f30a471 commit cb39370

File tree

1 file changed

+0
-3
lines changed

1 file changed

+0
-3
lines changed

articles/security-center/alerts-reference.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -304,9 +304,6 @@ Types of alerts included in this table:
304304
||<a name="alerts-azureddos"></a><h3>Azure DDoS Protection</h3> [Further details and notes](security-center-alerts-integration.md#azure-ddos)||
305305
|**DDoS Attack detected for Public IP**|DDoS Attack detected for Public IP (IP address) and being mitigated.|Probing|
306306
|**DDoS Attack mitigated for Public IP**|DDoS Attack mitigated for Public IP (IP address).|Probing|
307-
|**Volumetric attack detected**|This attack's goal is to flood the network layer with a substantial amount of seemingly legitimate traffic. It includes UDP floods, amplification floods, and other spoofed-packet floods. DDoS Protection Standard mitigates these potential multi-gigabyte attacks by absorbing and scrubbing them, with global network scale, automatically.|-|
308-
|**Protocol attack detected**|These attacks render a target inaccessible, by exploiting a weakness in the layer 3 and layer 4 protocol stacks. It includes SYN flood attacks, reflection attacks, and other protocol attacks. DDoS Protection Standard mitigates these attacks, differentiating between malicious and legitimate traffic, by interacting with the client, and blocking malicious traffic.|-|
309-
|**Resource (application) layer attack detected**|These attacks target web application packets, to disrupt the transmission of data between hosts. The attacks include HTTP protocol violations, SQL injection, cross-site scripting, and other layer 7 attacks. Use the Azure Application Gateway WAF, with DDoS Protection Standard, to defend against these attacks. There are also third-party WAF offerings available in Azure Marketplace.|-|
310307
||||
311308

312309

0 commit comments

Comments
 (0)