Skip to content

Commit f5dc71c

Browse files
Merge pull request #95333 from memildin/asc-melvyn-quickfixFriday
Asc melvyn quickfix friday
2 parents cb39ce2 + 6538105 commit f5dc71c

12 files changed

+22
-20
lines changed
232 KB
Loading
144 KB
Loading
112 KB
Loading
81.1 KB
Loading
117 KB
Loading
60.4 KB
Loading
98.9 KB
Loading
89.1 KB
Loading
19.2 KB
Loading

articles/security-center/security-center-alerts-data-services.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Threat detection for data services in Azure Security Center | Microsoft Docs
3-
description: This topic presents the data services alerts available in Azure Security Center.
3+
description: This article presents the data services alerts available in Azure Security Center.
44
services: security-center
55
documentationcenter: na
66
author: memildin
@@ -14,7 +14,7 @@ ms.author: memildin
1414
---
1515
# Threat detection for data services in Azure Security Center
1616

17-
Azure Security Center analyzes the logs of data storage services, and triggers alerts when it detects a threat to your data resources. This topic lists the alerts that Security Center generates for the following services:
17+
Azure Security Center analyzes the logs of data storage services, and triggers alerts when it detects a threat to your data resources. This article lists the alerts that Security Center generates for the following services:
1818

1919
* [Azure SQL Database and Azure SQL Data Warehouse](#data-sql)
2020
* [Azure Storage](#azure-storage)
@@ -48,7 +48,7 @@ Security Center analyzes diagnostic logs of read, write, and delete requests to
4848
4949
|Alert|Description|
5050
|---|---|
51-
|**Unusual location access anomaly**|Sampled network traffic analysis detected anomalous outgoing Remote Desktop Protocol (RDP) communication, originating from a resource in your deployment. This activity is considered abnormal for this environment. It can indicate that your resource has been compromised, and is now used to brute force attack an external RDP endpoint. This type of activity might cause your IP to be flagged as malicious by external entities.|
51+
|**Access from unusual location**|Indicates that there was a change in the access pattern to an Azure Storage account. Someone has accessed this account from an IP address considered unfamiliar when compared with recent activity. Either an attacker has gained access to the account, or a legitimate user has connected from a new or unusual geographic location. An example of the latter is remote maintenance from a new application or developer.|
5252
|**Application access anomaly**|Indicates that an unusual application has accessed this storage account. A potential cause is that an attacker has accessed your storage account by using a new application.|
5353
|**Anonymous access anomaly**|Indicates that there is a change in the access pattern to a storage account. For instance, the account has been accessed anonymously (without any authentication), which is unexpected compared to the recent access pattern on this account. A potential cause is that an attacker has exploited public read access to a container that holds blob storage.|
5454
|**Tor Anomaly**|Indicates that this account has been accessed successfully from an IP address that is known as an active exit node of Tor (an anonymizing proxy). The severity of this alert considers the authentication type used (if any), and whether this is the first case of such access. Potential causes can be an attacker who has accessed your storage account by using Tor, or a legitimate user who has accessed your storage account by using Tor.|

0 commit comments

Comments
 (0)