Skip to content

Commit e9f8417

Browse files
author
David Curwin
committed
Key Vault alert
1 parent 8975d90 commit e9f8417

File tree

2 files changed

+17
-2
lines changed

2 files changed

+17
-2
lines changed

articles/defender-for-cloud/alerts-reference.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -538,6 +538,7 @@ Microsoft Defender for Containers provides security alerts on the cluster level
538538
| **Unusual user-application pair accessed a key vault**<br>(KV_UserAppAnomaly) | A key vault has been accessed by a user-service principal pair that doesn't normally access it. This anomalous access pattern may be legitimate activity, but it could be an indication that a threat actor has gained access to the key vault in an attempt to access the secrets contained within it. We recommend further investigations. | Credential Access | Medium |
539539
| **User accessed high volume of key vaults**<br>(KV_AccountVolumeAnomaly) | A user or service principal has accessed an anomalously high volume of key vaults. This anomalous access pattern may be legitimate activity, but it could be an indication that a threat actor has gained access to multiple key vaults in an attempt to access the secrets contained within them. We recommend further investigations. | Credential Access | Medium |
540540
| **Denied access from a suspicious IP to a key vault**<br>(KV_SuspiciousIPAccessDenied) | An unsuccessful key vault access has been attempted by an IP that has been identified by Microsoft Threat Intelligence as a suspicious IP address. Though this attempt was unsuccessful, it indicates that your infrastructure might have been compromised. We recommend further investigations. | Credential Access | Low |
541+
| **Key vault unusual IP access - unusual IP accessing key vault**<br><br />(KV_UnusualAccessFromSuspeciousIP) | A user or service principal has attempted anomalous access to key vaults from a non-Microsoft IP in the last 24 hours. This anomalous access pattern may be legitimate activity. It could be an indication of a possible attempt to gain access of the key vault and the secrets contained within it. We recommend further investigations. | Credential Access | Medium |
541542

542543

543544
## <a name="alerts-azureddos"></a>Alerts for Azure DDoS Protection
@@ -588,7 +589,7 @@ Defender for Cloud's supported kill chain intents are based on [version 9 of the
588589
| **Command and Control** | V7, V9 | The command and control tactic represents how adversaries communicate with systems under their control within a target network. |
589590
| **Exfiltration** | V7, V9 | Exfiltration refers to techniques and attributes that result or aid in the adversary removing files and information from a target network. This category also covers locations on a system or network where the adversary may look for information to exfiltrate. |
590591
| **Impact** | V7, V9 | Impact events primarily try to directly reduce the availability or integrity of a system, service, or network; including manipulation of data to impact a business or operational process. This would often refer to techniques such as ransomware, defacement, data manipulation, and others.
591-
592+
592593
> [!NOTE]
593594
> For alerts that are in preview: [!INCLUDE [Legalese](../../includes/defender-for-cloud-preview-legal-text.md)]
594595

articles/defender-for-cloud/release-notes.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Release notes for Microsoft Defender for Cloud
33
description: A description of what's new and changed in Microsoft Defender for Cloud
44
ms.topic: overview
5-
ms.date: 05/01/2023
5+
ms.date: 05/02/2023
66
---
77

88
# What's new in Microsoft Defender for Cloud?
@@ -16,6 +16,20 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
1616
> [!TIP]
1717
> If you're looking for items older than six months, you can find them in the [Archive for What's new in Microsoft Defender for Cloud](release-notes-archive.md).
1818
19+
## May 2023
20+
21+
Updates in May include:
22+
23+
- [New alert in Defender for Key Vault](#new-alert-in-defender-for-key-vault)
24+
25+
### New alert in Defender for Key Vault
26+
27+
Defender for Key Vault has the following new alert:
28+
29+
| Alert (alert type) | Description | MITRE tactics | Severity |
30+
|---|---|:-:|---|
31+
| **Key vault unusual IP access - unusual IP accessing key vault**<br><br />(KV_UnusualAccessFromSuspeciousIP) | A user or service principal has attempted anomalous access to key vaults from a non-Microsoft IP in the last 24 hours. This anomalous access pattern may be legitimate activity. It could be an indication of a possible attempt to gain access of the key vault and the secrets contained within it. We recommend further investigations. | Credential Access | Medium |
32+
1933
## April 2023
2034

2135
Updates in April include:

0 commit comments

Comments
 (0)