Skip to content

Commit d45c865

Browse files
Merge pull request #261929 from MicrosoftDocs/main
Publish to live, Sunday 4pm PST, 12/24
2 parents ad44cff + 5c66700 commit d45c865

28 files changed

+359
-392
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -588,7 +588,7 @@
588588
{
589589
"source_path_from_root": "/articles/security-center/managing-and-responding-alerts.md",
590590
"redirect_url": "/azure/defender-for-cloud/managing-and-responding-alerts",
591-
"redirect_document_id": true
591+
"redirect_document_id": false
592592
},
593593
{
594594
"source_path_from_root": "/articles/security-center/os-coverage.md",
@@ -702,8 +702,8 @@
702702
},
703703
{
704704
"source_path_from_root": "/articles/security-center/tutorial-security-incident.md",
705-
"redirect_url": "/azure/defender-for-cloud/tutorial-security-incident",
706-
"redirect_document_id": true
705+
"redirect_url": "/azure/defender-for-cloud/managing-and-responding-alerts",
706+
"redirect_document_id": false
707707
},
708708
{
709709
"source_path_from_root": "/articles/security-center/tutorial-security-policy.md",
@@ -904,6 +904,11 @@
904904
"source_path_from_root": "/articles/defender-for-cloud/attack-path-reference.md",
905905
"redirect_url": "/azure/defender-for-cloud/how-to-manage-attack-path",
906906
"redirect_document_id": true
907+
},
908+
{
909+
"source_path_from_root": "/articles/defender-for-cloud/tutorial-security-incident.md",
910+
"redirect_url": "/azure/defender-for-cloud/managing-and-responding-alerts",
911+
"redirect_document_id": true
907912
}
908913
]
909914
}

articles/azure-monitor/alerts/alerts-create-rule-cli-powershell-arm.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.date: 11/29/2023
88
ms.reviewer: harelbr
99
---
1010
# Create a new alert rule using the CLI, PowerShell, or an ARM template
11-
You can create a new alert rule using the [Create a new alert rule using the CLI](#create-a-new-alert-rule-using-the-cli), [PowerShell](#create-a-new-alert-rule-using-powershell), or an [Azure Resource Manager template](#create-a-new-alert-rule-using-an-arm-template).
11+
You can create a new alert rule using the [the CLI](#create-a-new-alert-rule-using-the-cli), [PowerShell](#create-a-new-alert-rule-using-powershell), or an [Azure Resource Manager template](#create-a-new-alert-rule-using-an-arm-template).
1212

1313
## Create a new alert rule using the CLI
1414

@@ -50,6 +50,6 @@ You can use an [Azure Resource Manager template (ARM template)](../../azure-reso
5050
1. Deploy the template using [PowerShell](../../azure-resource-manager/templates/deploy-powershell.md#deploy-local-template) or the [CLI](../../azure-resource-manager/templates/deploy-cli.md#deploy-local-template).
5151
5252
## Next steps
53-
[Manage alert rules](alerts-manage-alert-rules.md)
54-
[Manage alert instances](alerts-manage-alert-instances.md)
55-
53+
- [Manage alert rules](alerts-manage-alert-rules.md)
54+
- [Manage alert instances](alerts-manage-alert-instances.md)
55+

articles/azure-monitor/alerts/alerts-non-common-schema-definitions.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,20 +8,17 @@ ms.reviewer: nolavime
88
---
99

1010
# Noncommon alert schema definitions
11+
The noncommon alert schema were historically used to customize alert email templates and webhook schemas for metric, log, and activity log alert rules. We recommend using the [common schema](./alerts-common-schema.md) for all alert types and integrations.
1112

1213
This article describes the noncommon alert schema definitions for Azure Monitor, including definitions for:
1314
- Webhooks
1415
- Azure Logic Apps
1516
- Azure Functions
1617
- Azure Automation runbooks
1718

18-
## What is the noncommon alert schema?
19-
20-
The noncommon alert schema lets you customize the consumption experience for alert notifications in Azure today. Historically, the three alert types in Azure today (metric, log, and activity log) have had their own email templates and webhook schemas.
21-
2219
## Metric alerts
2320

24-
See sample values for log alerts.
21+
See sample values for metric alerts.
2522

2623
### Metric alerts: Static threshold
2724

articles/azure-monitor/essentials/diagnostic-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Each Azure resource requires its own diagnostic setting, which defines the follo
2929
A single diagnostic setting can define no more than one of each of the destinations. If you want to send data to more than one of a particular destination type (for example, two different Log Analytics workspaces), create multiple settings. Each resource can have up to five diagnostic settings.
3030

3131
> [!WARNING]
32-
> If you need to delete a resource or migrate it across resource groups or subscriptions, you should first delete its diagnostic settings. Otherwise, if you recreate this resource, the diagnostic settings for the deleted resource could be included with the new resource, depending on the resource configuration for each resource. If the diagnostics settings are included with the new resource, this resumes the collection of resource logs as defined in the diagnostic setting and sends the applicable metric and log data to the previously configured destination.
32+
> If you need to delete a resource, rename, or move a resource, or migrate it across resource groups or subscriptions, first delete its diagnostic settings. Otherwise, if you recreate this resource, the diagnostic settings for the deleted resource could be included with the new resource, depending on the resource configuration for each resource. If the diagnostics settings are included with the new resource, this resumes the collection of resource logs as defined in the diagnostic setting and sends the applicable metric and log data to the previously configured destination.
3333
>
3434
> Also, it's a good practice to delete the diagnostic settings for a resource you're going to delete and don't plan on using again to keep your environment clean.
3535

articles/azure-monitor/logs/basic-logs-configure.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -184,6 +184,7 @@ All custom tables created with or migrated to the [data collection rule (DCR)-ba
184184
| Azure Active Directory | [AADDomainServicesDNSAuditsGeneral](/azure/azure-monitor/reference/tables/AADDomainServicesDNSAuditsGeneral)<br> [AADDomainServicesDNSAuditsDynamicUpdates](/azure/azure-monitor/reference/tables/AADDomainServicesDNSAuditsDynamicUpdates)<br>[AADServicePrincipalSignInLogs](/azure/azure-monitor/reference/tables/AADServicePrincipalSignInLogs) |
185185
| API Management | [ApiManagementGatewayLogs](/azure/azure-monitor/reference/tables/ApiManagementGatewayLogs)<br>[ApiManagementWebSocketConnectionLogs](/azure/azure-monitor/reference/tables/ApiManagementWebSocketConnectionLogs) |
186186
| Application Gateways | [AGWAccessLogs](/azure/azure-monitor/reference/tables/AGWAccessLogs)<br>[AGWPerformanceLogs](/azure/azure-monitor/reference/tables/AGWPerformanceLogs)<br>[AGWFirewallLogs](/azure/azure-monitor/reference/tables/AGWFirewallLogs) |
187+
| Application Gateway for Containers | [AGCAccessLogs](/azure/azure-monitor/reference/tables/AGCAccessLogs) |
187188
| Application Insights | [AppTraces](/azure/azure-monitor/reference/tables/apptraces) |
188189
| Bare Metal Machines | [NCBMSystemLogs](/azure/azure-monitor/reference/tables/NCBMSystemLogs)<br>[NCBMSecurityLogs](/azure/azure-monitor/reference/tables/NCBMSecurityLogs) |
189190
| Chaos Experiments | [ChaosStudioExperimentEventLogs](/azure/azure-monitor/reference/tables/ChaosStudioExperimentEventLogs) |
@@ -194,6 +195,7 @@ All custom tables created with or migrated to the [data collection rule (DCR)-ba
194195
| Communication Services | [ACSCallAutomationIncomingOperations](/azure/azure-monitor/reference/tables/ACSCallAutomationIncomingOperations)<br>[ACSCallAutomationMediaSummary](/azure/azure-monitor/reference/tables/ACSCallAutomationMediaSummary)<br>[ACSCallClientMediaStatsTimeSeries](/azure/azure-monitor/reference/tables/ACSCallClientMediaStatsTimeSeries)<br>[ACSCallClientOperations](/azure/azure-monitor/reference/tables/ACSCallClientOperations)<br>[ACSCallRecordingIncomingOperations](/azure/azure-monitor/reference/tables/ACSCallRecordingIncomingOperations)<br>[ACSCallRecordingSummary](/azure/azure-monitor/reference/tables/ACSCallRecordingSummary)<br>[ACSCallSummary](/azure/azure-monitor/reference/tables/ACSCallSummary)<br>[ACSJobRouterIncomingOperations](/azure/azure-monitor/reference/tables/ACSJobRouterIncomingOperations)<br>[ACSRoomsIncomingOperations](/azure/azure-monitor/reference/tables/acsroomsincomingoperations) |
195196
| Confidential Ledgers | [CCFApplicationLogs](/azure/azure-monitor/reference/tables/CCFApplicationLogs) |
196197
| Cosmos DB for MongoDB (vCore) | [VCoreMongoRequests](/azure/azure-monitor/reference/tables/VCoreMongoRequests) |
198+
| Kubernetes clusters - Azure Arc | [ArcK8sAudit](/azure/azure-monitor/reference/tables/ArcK8sAudit)<br>[ArcK8sAuditAdmin](/azure/azure-monitor/reference/tables/ArcK8sAuditAdmin)<br>[ArcK8sControlPlane](/azure/azure-monitor/reference/tables/ArcK8sControlPlane) |
197199
| Data Manager for Energy | [OEPDataplaneLogs](/azure/azure-monitor/reference/tables/OEPDataplaneLogs) |
198200
| Dedicated SQL Pool | [SynapseSqlPoolSqlRequests](/azure/azure-monitor/reference/tables/synapsesqlpoolsqlrequests)<br>[SynapseSqlPoolRequestSteps](/azure/azure-monitor/reference/tables/synapsesqlpoolrequeststeps)<br>[SynapseSqlPoolExecRequests](/azure/azure-monitor/reference/tables/synapsesqlpoolexecrequests)<br>[SynapseSqlPoolDmsWorkers](/azure/azure-monitor/reference/tables/synapsesqlpooldmsworkers)<br>[SynapseSqlPoolWaits](/azure/azure-monitor/reference/tables/synapsesqlpoolwaits) |
199201
| DNS Security Policies | [DNSQueryLogs](/azure/azure-monitor/reference/tables/DNSQueryLogs) |

articles/azure-monitor/logs/log-standard-columns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ The **TimeGenerated** column contains the date and time that the record was cre
2626
**TimeGenerated** provides a common column to use for filtering or summarizing by time. When you select a time range for a view or dashboard in the Azure portal, it uses **TimeGenerated** to filter the results.
2727

2828
> [!NOTE]
29-
> Tables supporting classic Application Insights resources use the **timestamp** column instead of the **TimeGenerated** column.
29+
> Tables supporting classic Application Insights resources use the **Timestamp** column instead of the **TimeGenerated** column.
3030
3131
> [!NOTE]
3232
> The **TimeGenerated** value cannot be older than 2 days before received time or more than a day in the future. If in some situation, the value is older than 2 days or more than a day in the future, it would be replaced with the actual recieved time.

articles/azure-vmware/configure-azure-elastic-san.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ The following prerequisites are required to continue.
4141

4242
## Set up Elastic SAN
4343

44-
In this section, you create a virtual network for your Elastic SAN. Then you create the Elastic SAN that includes creating at least one volume group and one volume that becomes your VMFS datastore. Next, you set up a Private Endpoint for your Elastic SAN that allows your SDDC to connect to the Elastic SAN volume. Then you're ready to add an Elastic SAN volume as a datastore in your private cloud.
44+
In this section, you create a virtual network for your Elastic SAN. Then you create the Elastic SAN that includes creating at least one volume group and one volume that becomes your VMFS datastore. Next, you set up a Private Endpoint for your Elastic SAN that allows your private cloud to connect to the Elastic SAN volume. Then you're ready to add an Elastic SAN volume as a datastore in your private cloud.
4545

4646
1. Use one of the following instruction options to set up a dedicated virtual network for your Elastic SAN:
4747
- [Azure portal](../virtual-network/quick-create-portal.md)

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -109,9 +109,6 @@
109109
- name: Protect VMs
110110
displayName: manage, access, harden
111111
href: tutorial-protect-resources.md
112-
- name: Investigate and respond to security alerts
113-
displayName: triage, security, alerts, investigate,
114-
href: tutorial-security-incident.md
115112
- name: Investigate the health of your resources
116113
displayName: health, resources, outstanding, security, issues,
117114
href: investigate-resource-health.md
@@ -394,7 +391,7 @@
394391
href: powershell-onboarding.md
395392
- name: Alerts, incidents, and threat reports
396393
items:
397-
- name: Respond to security alerts
394+
- name: Manage and respond to security alerts
398395
displayName: security alerts, alerts
399396
href: managing-and-responding-alerts.md
400397
- name: Create and manage alerts suppression rules

articles/defender-for-cloud/alerts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,5 +115,5 @@ In this article, you learned about the different types of alerts available in De
115115

116116
- [Security alerts in Azure Activity log](https://go.microsoft.com/fwlink/?linkid=2114113) - In addition to being available in the Azure portal or programmatically, Security alerts and incidents are audited as events in Azure Activity Log
117117
- [Reference table of Defender for Cloud alerts](alerts-reference.md)
118-
- [Respond to security alerts](managing-and-responding-alerts.md#respond-to-security-alerts)
118+
- [Respond to security alerts](managing-and-responding-alerts.md#respond-to-a-security-alert)
119119
- Learn how to [manage security incidents in Defender for Cloud](incidents.md).

articles/defender-for-cloud/alerts-schemas.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,26 +9,26 @@ ms.date: 11/09/2021
99

1010
# Security alerts schemas
1111

12-
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled, you'll receive security alerts when Defender for Cloud detects threats to their resources.
12+
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled, you receive security alerts when Defender for Cloud detects threats to their resources.
1313

14-
You can view these security alerts in Microsoft Defender for Cloud's pages - [overview dashboard](overview-page.md), [alerts](tutorial-security-incident.md), [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md) - and through external tools such as:
14+
You can view these security alerts in Microsoft Defender for Cloud's pages - [overview dashboard](overview-page.md), [alerts](managing-and-responding-alerts.md), [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md) - and through external tools such as:
1515

1616
- [Microsoft Sentinel](../sentinel/index.yml) - Microsoft's cloud-native SIEM. The Sentinel Connector gets alerts from Microsoft Defender for Cloud and sends them to the [Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md) for Microsoft Sentinel.
17-
- Third-party SIEMs - Send data to [Azure Event Hubs](../event-hubs/index.yml). Then integrate your Event Hub data with a third-party SIEM. Learn more in [Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
17+
- Third-party SIEMs - Send data to [Azure Event Hubs](../event-hubs/index.yml). Then integrate your Event Hubs data with a third-party SIEM. Learn more in [Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
1818
- [The REST API](/rest/api/defenderforcloud/) - If you're using the REST API to access alerts, see the [online Alerts API documentation](/rest/api/defenderforcloud/alerts).
1919

20-
If you're using any programmatic methods to consume the alerts, you'll need the correct schema to find the fields that are relevant to you. Also, if you're exporting to an Event Hub or trying to trigger Workflow Automation with generic HTTP connectors, use the schemas to properly parse the JSON objects.
20+
If you're using any programmatic methods to consume the alerts, you need the correct schema to find the fields that are relevant to you. Also, if you're exporting to an Event Hubs or trying to trigger Workflow Automation with generic HTTP connectors, use the schemas to properly parse the JSON objects.
2121

2222
>[!IMPORTANT]
23-
> The schema is slightly different for each of these scenarios, so make sure you select the relevant tab below.
23+
> The schema is slightly different for each of these scenarios, so make sure you select the relevant tab.
2424
2525
## The schemas
2626

2727
### [Microsoft Sentinel](#tab/schema-sentinel)
2828

2929
The Sentinel Connector gets alerts from Microsoft Defender for Cloud and sends them to the Log Analytics Workspace for Microsoft Sentinel.
3030

31-
To create a Microsoft Sentinel case or incident using Defender for Cloud alerts, you'll need the schema for those alerts shown below.
31+
To create a Microsoft Sentinel case or incident using Defender for Cloud alerts, you need the schema for those alerts shown.
3232

3333
Learn more in the [Microsoft Sentinel documentation](../sentinel/index.yml).
3434

@@ -117,16 +117,16 @@ You can view the security alerts events in Activity Log by searching for the Act
117117
|**id**|The fully qualified alert ID|
118118
|**level**|Constant, "Informational"|
119119
|**operationId**|See correlationId|
120-
|**operationName**|The value field is constant - "Microsoft.Security/locations/alerts/activate/action", and the localized value will be "Activate Alert" (can potentially be localized par the user locale)|
121-
|**resourceGroupName**|Will include the resource group name|
120+
|**operationName**|The value field is constant - `Microsoft.Security/locations/alerts/activate/action`, and the localized value is `Activate Alert` (can potentially be localized par the user locale)|
121+
|**resourceGroupName**| Includes the resource group name|
122122
|**resourceProviderName**|The value and localizedValue subfields are constant - "Microsoft.Security"|
123123
|**resourceType**|The value and localizedValue subfields are constant - "Microsoft.Security/locations/alerts"|
124124
|**resourceId**|The fully qualified Azure resource ID|
125125
|**status**|The value and localizedValue subfields are constant - "Active"|
126126
|**subStatus**|The value and localizedValue subfields are empty|
127127
|**submissionTimestamp**|The UTC timestamp of event submission to Activity Log|
128128
|**subscriptionId**|The subscription ID of the compromised resource|
129-
|**properties**|A JSON bag of additional properties pertaining to the alert. These can change from one alert to the other, however, the following fields will appear in all alerts:<br>- severity: The severity of the attack<br>- compromisedEntity: The name of the compromised resource<br>- remediationSteps: Array of remediation steps to be taken<br>- intent: The kill-chain intent of the alert. Possible intents are documented in the [Intentions table](alerts-reference.md#intentions)|
129+
|**properties**|A JSON bag of other properties pertaining to the alert. Properties can change from one alert to the other, however, the following fields appear in all alerts:<br>- severity: The severity of the attack<br>- compromisedEntity: The name of the compromised resource<br>- remediationSteps: Array of remediation steps to be taken<br>- intent: The kill-chain intent of the alert. Possible intents are documented in the [Intentions table](alerts-reference.md#intentions)|
130130
|**relatedEvents**|Constant - empty array|
131131

132132

@@ -138,8 +138,8 @@ For the alerts schema when using workflow automation, see the [connectors docume
138138

139139
Defender for Cloud's continuous export feature passes alert data to:
140140

141-
- Azure Event Hub using the same schema as [the alerts API](/rest/api/defenderforcloud/alerts).
142-
- Log Analytics workspaces according to the [SecurityAlert schema](/azure/azure-monitor/reference/tables/SecurityAlert) in the Azure Monitor data reference documentation.
141+
- Azure Event Hubs using the same schema as [the alerts API](/rest/api/defenderforcloud/alerts).
142+
- Log Analytics workspaces according to the [SecurityAlert schema](/azure/azure-monitor/reference/tables/SecurityAlert) in the Azure Monitor data documentation.
143143

144144
### [MS Graph API](#tab/schema-graphapi)
145145

@@ -151,7 +151,7 @@ The schema and a JSON representation for security alerts sent to MS Graph, are a
151151

152152
## Next steps
153153

154-
This article described the schemas that Microsoft Defender for Cloud's threat protection tools use when sending security alert information.
154+
This article described the schemas that Microsoft Defenders for Cloud's threat protection tools use when sending security alert information.
155155

156156
For more information on the ways to access security alerts from outside Defender for Cloud, see:
157157

0 commit comments

Comments
 (0)