Skip to content

Commit f6c13e1

Browse files
Merge pull request #292307 from halkazwini/nw-ta-schema
Malicious FQDN note
2 parents e1d449c + 2c3f60f commit f6c13e1

File tree

1 file changed

+9
-6
lines changed

1 file changed

+9
-6
lines changed

articles/network-watcher/traffic-analytics-schema.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: halkazwini
66
ms.author: halkazwini
77
ms.service: azure-network-watcher
88
ms.topic: concept-article
9-
ms.date: 07/11/2024
9+
ms.date: 12/22/2024
1010

1111
#CustomerIntent: As a administrator, I want learn about traffic analytics schema so I can easily use the queries and understand their output.
1212
---
@@ -272,8 +272,8 @@ The following table details public IP schema:
272272
| **ThreatType** | Threat posed by malicious IP | **For Malicious IPs only**: One of the threats from the list of currently allowed values (described in the next table). |
273273
| **ThreatDescription** | Description of the threat | *For Malicious IPs only*. Description of the threat posed by the malicious IP. |
274274
| **DNSDomain** | DNS domain | *For Malicious IPs only*. Domain name associated with the malicious IP. |
275-
| **Url** | URL corresponding to the malicious IP | *For Malicious IPs only* |
276-
| **Port** | Port corresponding to the malicious IP | *For Malicious IPs only* |
275+
| **Url** | URL corresponding to the malicious IP | *For Malicious IPs only*. |
276+
| **Port** | Port corresponding to the malicious IP | *For Malicious IPs only*. |
277277

278278
# [**Virtual network flow logs**](#tab/vnet)
279279

@@ -291,14 +291,17 @@ The following table details public IP schema:
291291
| **DNSDomain** | DNS domain | *For Malicious IPs only*. Domain name associated with this IP. |
292292
| **ThreatDescription** | Description of the threat | *For Malicious IPs only*. Description of the threat posed by the malicious IP. |
293293
| **Location** | Location of the IP | **For Azure Public IP**: Azure region of virtual network / network interface / virtual machine to which the IP belongs or Global for IP 168.63.129.16. <br> **For External Public IP and Malicious IP**: two-letter country code (ISO 3166-1 alpha-2) where IP is located. |
294-
| **Url** | URL corresponding to the malicious IP | *For Malicious IPs only* . |
294+
| **Url** | URL corresponding to the malicious IP | *For Malicious IPs only*. |
295295
| **Port** | Port corresponding to the malicious IP | *For Malicious IPs only*. |
296296

297297
> [!NOTE]
298-
> *NTAIPDetails* in virtual network flow logs replaces *AzureNetworkAnalyticsIPDetails_CL* used in network security group flow logs.
298+
> - *NTAIPDetails* in virtual network flow logs replaces *AzureNetworkAnalyticsIPDetails_CL* used in network security group flow logs.
299+
>
300+
> - Traffic analytics can log any malicious FQDN associated to the IP for malicious flows. To filter out, use the port, URL and domain fields as needed.
299301
300302
---
301303

304+
<br>
302305
List of threat types:
303306

304307
| Value | Description |
@@ -307,7 +310,7 @@ List of threat types:
307310
| C2 | Indicator detailing a Command & Control node of a botnet. |
308311
| CryptoMining | Traffic involving this network address / URL is an indication of CyrptoMining / Resource abuse. |
309312
| DarkNet | Indicator of a Darknet node/network. |
310-
| DDos | Indicators relating to an active or upcoming DDoS campaign. |
313+
| DDoS | Indicators relating to an active or upcoming DDoS campaign. |
311314
| MaliciousUrl | URL that is serving malware. |
312315
| Malware | Indicator describing a malicious file or files. |
313316
| Phishing | Indicators relating to a phishing campaign. |

0 commit comments

Comments
 (0)