Skip to content

Commit df8cdf8

Browse files
authored
Merge pull request #142898 from memildin/melvyn-asc-alerts_ref
Melvyn asc alerts ref
2 parents f32af95 + 91b61a7 commit df8cdf8

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/security-center/alerts-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@ At the bottom of this page, there's a table describing the Azure Security Center
222222
| **Fileless Attack Behavior Detected**<br>(AppServices_FilelessAttackBehaviorDetection) | The memory of the process specified below contains behaviors commonly used by fileless attacks.<br>Specific behaviors include: {list of observed behaviors} <br>(Applies to: App Service on Windows and App Service on Linux) | Execution | Medium |
223223
| **Fileless Attack Technique Detected**<br>(AppServices_FilelessAttackTechniqueDetection) | The memory of the process specified below contains evidence of a fileless attack technique. Fileless attacks are used by attackers to execute code while evading detection by security software.<br>Specific behaviors include: {list of observed behaviors} <br>(Applies to: App Service on Windows and App Service on Linux) | Execution | High |
224224
| **Fileless Attack Toolkit Detected**<br>(AppServices_FilelessAttackToolkitDetection) | The memory of the process specified below contains a fileless attack toolkit: {ToolKitName}. Fileless attack toolkits typically do not have a presence on the filesystem, making detection by traditional anti-virus software difficult.<br>Specific behaviors include: {list of observed behaviors} <br>(Applies to: App Service on Windows and App Service on Linux) | DefenseEvasion, Execution | High |
225-
| **NMap scanning detected**<br>(AppServices_Nmap) | Azure App Service activity log indicates a possible web fingerprinting activity on your App Service resource.<br>The suspicious activity detected is associated with NMAP. Attackers often use this tool for probing the web application to find vulnerabilities. <br>(Applies to: App Service on Windows) | PreAttack | Medium |
225+
| **NMap scanning detected**<br>(AppServices_Nmap) | Azure App Service activity log indicates a possible web fingerprinting activity on your App Service resource.<br>The suspicious activity detected is associated with NMAP. Attackers often use this tool for probing the web application to find vulnerabilities. <br>(Applies to: App Service on Windows and App Service on Linux) | PreAttack | Medium |
226226
| **Phishing content hosted on Azure Webapps**<br>(AppServices_PhishingContent) | URL used for phishing attack found on the Azure AppServices website. This URL was part of a phishing attack sent to Microsoft 365 customers. The content typically lures visitors into entering their corporate credentials or financial information into a legitimate looking website. <br>(Applies to: App Service on Windows and App Service on Linux) | Collection | High |
227227
| **PHP file in upload folder**<br>(AppServices_PhpInUploadFolder) | Azure App Service activity log indicates an access to a suspicious PHP page located in the upload folder.<br>This type of folder does not usually contain PHP files. The existence of this type of file might indicate an exploitation taking advantage of arbitrary file upload vulnerabilities. <br>(Applies to: App Service on Windows and App Service on Linux) | Execution | Medium |
228228
| **Possible Cryptocoinminer download detected**<br>(AppServices_CryptoCoinMinerDownload) | Analysis of host data has detected the download of a file normally associated with digital currency mining <br>(Applies to: App Service on Linux) | DefenseEvasion, CommandAndControl, Exploitation | Medium |
@@ -243,7 +243,7 @@ At the bottom of this page, there's a table describing the Azure Security Center
243243
| **Vulnerability scanner detected**<br>(AppServices_DrupalScanner) | Azure App Service activity log indicates that a possible vulnerability scanner was used on your App Service resource.<br>The suspicious activity detected resembles that of tools targeting a content management system (CMS). <br>(Applies to: App Service on Windows) | PreAttack | Medium |
244244
| **Vulnerability scanner detected**<br>(AppServices_JoomlaScanner) | Azure App Service activity log indicates that a possible vulnerability scanner was used on your App Service resource.<br>The suspicious activity detected resembles that of tools targeting Joomla applications. <br>(Applies to: App Service on Windows and App Service on Linux) | PreAttack | Medium |
245245
| **Vulnerability scanner detected**<br>(AppServices_WpScanner) | Azure App Service activity log indicates that a possible vulnerability scanner was used on your App Service resource.<br>The suspicious activity detected resembles that of tools targeting WordPress applications. <br>(Applies to: App Service on Windows and App Service on Linux) | PreAttack | Medium |
246-
| **Web fingerprinting detected**<br>(AppServices_WebFingerprinting) | Azure App Service activity log indicates a possible web fingerprinting activity on your App Service resource.<br>The suspicious activity detected is associated with a tool called Blind Elephant. The tool fingerprint web servers and tries to detect the installed applications and version.<br>Attackers often use this tool for probing the web application to find vulnerabilities. <br>(Applies to: App Service on Windows) | PreAttack | Medium |
246+
| **Web fingerprinting detected**<br>(AppServices_WebFingerprinting) | Azure App Service activity log indicates a possible web fingerprinting activity on your App Service resource.<br>The suspicious activity detected is associated with a tool called Blind Elephant. The tool fingerprint web servers and tries to detect the installed applications and version.<br>Attackers often use this tool for probing the web application to find vulnerabilities. <br>(Applies to: App Service on Windows and App Service on Linux) | PreAttack | Medium |
247247
| **Website is tagged as malicious in threat intelligence feed**<br>(AppServices_SmartScreen) | Your website as described below is marked as a malicious site by Windows SmartScreen. If you think this is a false positive, contact Windows SmartScreen via report feedback link provided. <br>(Applies to: App Service on Windows and App Service on Linux) | Collection | Medium |
248248
| | |
249249

0 commit comments

Comments
 (0)