You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-create-rule-cli-powershell-arm.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.date: 11/29/2023
8
8
ms.reviewer: harelbr
9
9
---
10
10
# Create a new alert rule using the CLI, PowerShell, or an ARM template
11
-
You can create a new alert rule using the [Create a new alert rule using the CLI](#create-a-new-alert-rule-using-the-cli), [PowerShell](#create-a-new-alert-rule-using-powershell), or an [Azure Resource Manager template](#create-a-new-alert-rule-using-an-arm-template).
11
+
You can create a new alert rule using the [the CLI](#create-a-new-alert-rule-using-the-cli), [PowerShell](#create-a-new-alert-rule-using-powershell), or an [Azure Resource Manager template](#create-a-new-alert-rule-using-an-arm-template).
12
12
13
13
## Create a new alert rule using the CLI
14
14
@@ -50,6 +50,6 @@ You can use an [Azure Resource Manager template (ARM template)](../../azure-reso
50
50
1. Deploy the template using [PowerShell](../../azure-resource-manager/templates/deploy-powershell.md#deploy-local-template) or the [CLI](../../azure-resource-manager/templates/deploy-cli.md#deploy-local-template).
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-non-common-schema-definitions.md
+2-5Lines changed: 2 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,20 +8,17 @@ ms.reviewer: nolavime
8
8
---
9
9
10
10
# Noncommon alert schema definitions
11
+
The noncommon alert schema were historically used to customize alert email templates and webhook schemas for metric, log, and activity log alert rules. We recommend using the [common schema](./alerts-common-schema.md) for all alert types and integrations.
11
12
12
13
This article describes the noncommon alert schema definitions for Azure Monitor, including definitions for:
13
14
- Webhooks
14
15
- Azure Logic Apps
15
16
- Azure Functions
16
17
- Azure Automation runbooks
17
18
18
-
## What is the noncommon alert schema?
19
-
20
-
The noncommon alert schema lets you customize the consumption experience for alert notifications in Azure today. Historically, the three alert types in Azure today (metric, log, and activity log) have had their own email templates and webhook schemas.
Copy file name to clipboardExpand all lines: articles/azure-monitor/essentials/diagnostic-settings.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Each Azure resource requires its own diagnostic setting, which defines the follo
29
29
A single diagnostic setting can define no more than one of each of the destinations. If you want to send data to more than one of a particular destination type (for example, two different Log Analytics workspaces), create multiple settings. Each resource can have up to five diagnostic settings.
30
30
31
31
> [!WARNING]
32
-
> If you need to delete a resourceor migrate it across resource groups or subscriptions, you should first delete its diagnostic settings. Otherwise, if you recreate this resource, the diagnostic settings for the deleted resource could be included with the new resource, depending on the resource configuration for each resource. If the diagnostics settings are included with the new resource, this resumes the collection of resource logs as defined in the diagnostic setting and sends the applicable metric and log data to the previously configured destination.
32
+
> If you need to delete a resource, rename, or move a resource, or migrate it across resource groups or subscriptions, first delete its diagnostic settings. Otherwise, if you recreate this resource, the diagnostic settings for the deleted resource could be included with the new resource, depending on the resource configuration for each resource. If the diagnostics settings are included with the new resource, this resumes the collection of resource logs as defined in the diagnostic setting and sends the applicable metric and log data to the previously configured destination.
33
33
>
34
34
> Also, it's a good practice to delete the diagnostic settings for a resource you're going to delete and don't plan on using again to keep your environment clean.
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/basic-logs-configure.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -184,6 +184,7 @@ All custom tables created with or migrated to the [data collection rule (DCR)-ba
184
184
| Azure Active Directory |[AADDomainServicesDNSAuditsGeneral](/azure/azure-monitor/reference/tables/AADDomainServicesDNSAuditsGeneral)<br> [AADDomainServicesDNSAuditsDynamicUpdates](/azure/azure-monitor/reference/tables/AADDomainServicesDNSAuditsDynamicUpdates)<br>[AADServicePrincipalSignInLogs](/azure/azure-monitor/reference/tables/AADServicePrincipalSignInLogs)|
185
185
| API Management |[ApiManagementGatewayLogs](/azure/azure-monitor/reference/tables/ApiManagementGatewayLogs)<br>[ApiManagementWebSocketConnectionLogs](/azure/azure-monitor/reference/tables/ApiManagementWebSocketConnectionLogs)|
| Bare Metal Machines |[NCBMSystemLogs](/azure/azure-monitor/reference/tables/NCBMSystemLogs)<br>[NCBMSecurityLogs](/azure/azure-monitor/reference/tables/NCBMSecurityLogs)|
@@ -194,6 +195,7 @@ All custom tables created with or migrated to the [data collection rule (DCR)-ba
194
195
| Communication Services |[ACSCallAutomationIncomingOperations](/azure/azure-monitor/reference/tables/ACSCallAutomationIncomingOperations)<br>[ACSCallAutomationMediaSummary](/azure/azure-monitor/reference/tables/ACSCallAutomationMediaSummary)<br>[ACSCallClientMediaStatsTimeSeries](/azure/azure-monitor/reference/tables/ACSCallClientMediaStatsTimeSeries)<br>[ACSCallClientOperations](/azure/azure-monitor/reference/tables/ACSCallClientOperations)<br>[ACSCallRecordingIncomingOperations](/azure/azure-monitor/reference/tables/ACSCallRecordingIncomingOperations)<br>[ACSCallRecordingSummary](/azure/azure-monitor/reference/tables/ACSCallRecordingSummary)<br>[ACSCallSummary](/azure/azure-monitor/reference/tables/ACSCallSummary)<br>[ACSJobRouterIncomingOperations](/azure/azure-monitor/reference/tables/ACSJobRouterIncomingOperations)<br>[ACSRoomsIncomingOperations](/azure/azure-monitor/reference/tables/acsroomsincomingoperations)|
| Data Manager for Energy |[OEPDataplaneLogs](/azure/azure-monitor/reference/tables/OEPDataplaneLogs)|
198
200
| Dedicated SQL Pool |[SynapseSqlPoolSqlRequests](/azure/azure-monitor/reference/tables/synapsesqlpoolsqlrequests)<br>[SynapseSqlPoolRequestSteps](/azure/azure-monitor/reference/tables/synapsesqlpoolrequeststeps)<br>[SynapseSqlPoolExecRequests](/azure/azure-monitor/reference/tables/synapsesqlpoolexecrequests)<br>[SynapseSqlPoolDmsWorkers](/azure/azure-monitor/reference/tables/synapsesqlpooldmsworkers)<br>[SynapseSqlPoolWaits](/azure/azure-monitor/reference/tables/synapsesqlpoolwaits)|
199
201
| DNS Security Policies |[DNSQueryLogs](/azure/azure-monitor/reference/tables/DNSQueryLogs)|
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/log-standard-columns.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ The **TimeGenerated** column contains the date and time that the record was cre
26
26
**TimeGenerated** provides a common column to use for filtering or summarizing by time. When you select a time range for a view or dashboard in the Azure portal, it uses **TimeGenerated** to filter the results.
27
27
28
28
> [!NOTE]
29
-
> Tables supporting classic Application Insights resources use the **timestamp** column instead of the **TimeGenerated** column.
29
+
> Tables supporting classic Application Insights resources use the **Timestamp** column instead of the **TimeGenerated** column.
30
30
31
31
> [!NOTE]
32
32
> The **TimeGenerated** value cannot be older than 2 days before received time or more than a day in the future. If in some situation, the value is older than 2 days or more than a day in the future, it would be replaced with the actual recieved time.
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-azure-elastic-san.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ The following prerequisites are required to continue.
41
41
42
42
## Set up Elastic SAN
43
43
44
-
In this section, you create a virtual network for your Elastic SAN. Then you create the Elastic SAN that includes creating at least one volume group and one volume that becomes your VMFS datastore. Next, you set up a Private Endpoint for your Elastic SAN that allows your SDDC to connect to the Elastic SAN volume. Then you're ready to add an Elastic SAN volume as a datastore in your private cloud.
44
+
In this section, you create a virtual network for your Elastic SAN. Then you create the Elastic SAN that includes creating at least one volume group and one volume that becomes your VMFS datastore. Next, you set up a Private Endpoint for your Elastic SAN that allows your private cloud to connect to the Elastic SAN volume. Then you're ready to add an Elastic SAN volume as a datastore in your private cloud.
45
45
46
46
1. Use one of the following instruction options to set up a dedicated virtual network for your Elastic SAN:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/alerts-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,5 +115,5 @@ In this article, you learned about the different types of alerts available in De
115
115
116
116
-[Security alerts in Azure Activity log](https://go.microsoft.com/fwlink/?linkid=2114113) - In addition to being available in the Azure portal or programmatically, Security alerts and incidents are audited as events in Azure Activity Log
117
117
-[Reference table of Defender for Cloud alerts](alerts-reference.md)
118
-
-[Respond to security alerts](managing-and-responding-alerts.md#respond-to-security-alerts)
118
+
-[Respond to security alerts](managing-and-responding-alerts.md#respond-to-a-security-alert)
119
119
- Learn how to [manage security incidents in Defender for Cloud](incidents.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/alerts-schemas.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,26 +9,26 @@ ms.date: 11/09/2021
9
9
10
10
# Security alerts schemas
11
11
12
-
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled, you'll receive security alerts when Defender for Cloud detects threats to their resources.
12
+
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled, you receive security alerts when Defender for Cloud detects threats to their resources.
13
13
14
-
You can view these security alerts in Microsoft Defender for Cloud's pages - [overview dashboard](overview-page.md), [alerts](tutorial-security-incident.md), [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md) - and through external tools such as:
14
+
You can view these security alerts in Microsoft Defender for Cloud's pages - [overview dashboard](overview-page.md), [alerts](managing-and-responding-alerts.md), [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md) - and through external tools such as:
15
15
16
16
-[Microsoft Sentinel](../sentinel/index.yml) - Microsoft's cloud-native SIEM. The Sentinel Connector gets alerts from Microsoft Defender for Cloud and sends them to the [Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md) for Microsoft Sentinel.
17
-
- Third-party SIEMs - Send data to [Azure Event Hubs](../event-hubs/index.yml). Then integrate your Event Hub data with a third-party SIEM. Learn more in [Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
17
+
- Third-party SIEMs - Send data to [Azure Event Hubs](../event-hubs/index.yml). Then integrate your Event Hubs data with a third-party SIEM. Learn more in [Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
18
18
-[The REST API](/rest/api/defenderforcloud/) - If you're using the REST API to access alerts, see the [online Alerts API documentation](/rest/api/defenderforcloud/alerts).
19
19
20
-
If you're using any programmatic methods to consume the alerts, you'll need the correct schema to find the fields that are relevant to you. Also, if you're exporting to an Event Hub or trying to trigger Workflow Automation with generic HTTP connectors, use the schemas to properly parse the JSON objects.
20
+
If you're using any programmatic methods to consume the alerts, you need the correct schema to find the fields that are relevant to you. Also, if you're exporting to an Event Hubs or trying to trigger Workflow Automation with generic HTTP connectors, use the schemas to properly parse the JSON objects.
21
21
22
22
>[!IMPORTANT]
23
-
> The schema is slightly different for each of these scenarios, so make sure you select the relevant tab below.
23
+
> The schema is slightly different for each of these scenarios, so make sure you select the relevant tab.
24
24
25
25
## The schemas
26
26
27
27
### [Microsoft Sentinel](#tab/schema-sentinel)
28
28
29
29
The Sentinel Connector gets alerts from Microsoft Defender for Cloud and sends them to the Log Analytics Workspace for Microsoft Sentinel.
30
30
31
-
To create a Microsoft Sentinel case or incident using Defender for Cloud alerts, you'll need the schema for those alerts shown below.
31
+
To create a Microsoft Sentinel case or incident using Defender for Cloud alerts, you need the schema for those alerts shown.
32
32
33
33
Learn more in the [Microsoft Sentinel documentation](../sentinel/index.yml).
34
34
@@ -117,16 +117,16 @@ You can view the security alerts events in Activity Log by searching for the Act
117
117
|**id**|The fully qualified alert ID|
118
118
|**level**|Constant, "Informational"|
119
119
|**operationId**|See correlationId|
120
-
|**operationName**|The value field is constant - "Microsoft.Security/locations/alerts/activate/action", and the localized value will be "Activate Alert" (can potentially be localized par the user locale)|
121
-
|**resourceGroupName**|Will include the resource group name|
120
+
|**operationName**|The value field is constant - `Microsoft.Security/locations/alerts/activate/action`, and the localized value is `Activate Alert` (can potentially be localized par the user locale)|
121
+
|**resourceGroupName**| Includes the resource group name|
122
122
|**resourceProviderName**|The value and localizedValue subfields are constant - "Microsoft.Security"|
123
123
|**resourceType**|The value and localizedValue subfields are constant - "Microsoft.Security/locations/alerts"|
|**status**|The value and localizedValue subfields are constant - "Active"|
126
126
|**subStatus**|The value and localizedValue subfields are empty|
127
127
|**submissionTimestamp**|The UTC timestamp of event submission to Activity Log|
128
128
|**subscriptionId**|The subscription ID of the compromised resource|
129
-
|**properties**|A JSON bag of additional properties pertaining to the alert. These can change from one alert to the other, however, the following fields will appear in all alerts:<br>- severity: The severity of the attack<br>- compromisedEntity: The name of the compromised resource<br>- remediationSteps: Array of remediation steps to be taken<br>- intent: The kill-chain intent of the alert. Possible intents are documented in the [Intentions table](alerts-reference.md#intentions)|
129
+
|**properties**|A JSON bag of other properties pertaining to the alert. Properties can change from one alert to the other, however, the following fields appear in all alerts:<br>- severity: The severity of the attack<br>- compromisedEntity: The name of the compromised resource<br>- remediationSteps: Array of remediation steps to be taken<br>- intent: The kill-chain intent of the alert. Possible intents are documented in the [Intentions table](alerts-reference.md#intentions)|
130
130
|**relatedEvents**|Constant - empty array|
131
131
132
132
@@ -138,8 +138,8 @@ For the alerts schema when using workflow automation, see the [connectors docume
138
138
139
139
Defender for Cloud's continuous export feature passes alert data to:
140
140
141
-
- Azure Event Hub using the same schema as [the alerts API](/rest/api/defenderforcloud/alerts).
142
-
- Log Analytics workspaces according to the [SecurityAlert schema](/azure/azure-monitor/reference/tables/SecurityAlert) in the Azure Monitor data reference documentation.
141
+
- Azure Event Hubs using the same schema as [the alerts API](/rest/api/defenderforcloud/alerts).
142
+
- Log Analytics workspaces according to the [SecurityAlert schema](/azure/azure-monitor/reference/tables/SecurityAlert) in the Azure Monitor data documentation.
143
143
144
144
### [MS Graph API](#tab/schema-graphapi)
145
145
@@ -151,7 +151,7 @@ The schema and a JSON representation for security alerts sent to MS Graph, are a
151
151
152
152
## Next steps
153
153
154
-
This article described the schemas that Microsoft Defender for Cloud's threat protection tools use when sending security alert information.
154
+
This article described the schemas that Microsoft Defenders for Cloud's threat protection tools use when sending security alert information.
155
155
156
156
For more information on the ways to access security alerts from outside Defender for Cloud, see:
0 commit comments