You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/alerts-schemas.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,6 @@
2
2
title: Schemas for the Azure Security Center alerts
3
3
description: This article describes the different schemas used by Azure Security Center for security alerts.
4
4
services: security-center
5
-
documentationcenter: na
6
5
author: memildin
7
6
manager: rkarlin
8
7
ms.service: security-center
@@ -169,7 +168,7 @@ You can view the security alerts events in Activity Log by searching for the Act
169
168
170
169
Microsoft Graph is the gateway to data and intelligence in Microsoft 365. It provides a unified programmability model that you can use to access the tremendous amount of data in Microsoft 365, Windows 10, and Enterprise Mobility + Security. Use the wealth of data in Microsoft Graph to build apps for organizations and consumers that interact with millions of users.
171
170
172
-
The schema and a JSON representation for security alerts sent to MS Graph, are available in [the Microsoft Graph documentation](https://docs.microsoft.com/graph/api/resources/alert?view=graph-rest-1.0).
171
+
The schema and a JSON representation for security alerts sent to MS Graph, are available in [the Microsoft Graph documentation](https://docs.microsoft.com/graph/api/resources/alert?view=graph-rest-1.0&preserve-view=true).
Copy file name to clipboardExpand all lines: articles/security-center/defender-for-sql-usage.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,7 +114,7 @@ Azure Defender alerts are available in Security Center's alerts page, the resour
114
114
115
115
1. Alerts are designed to be self-contained, with detailed remediation steps and investigation information in each one. You can investigate further by using other Azure Security Center and Azure Sentinel capabilities for a broader view:
116
116
117
-
* Enable SQL Server's auditing feature for further investigations. If you're an Azure Sentinel user, you can upload the SQL auditing logs from the Windows Security Log events to Sentinel and enjoy a rich investigation experience. [Learn more about SQL Server Auditing](https://docs.microsoft.com/sql/relational-databases/security/auditing/create-a-server-audit-and-server-audit-specification?view=sql-server-ver15).
117
+
* Enable SQL Server's auditing feature for further investigations. If you're an Azure Sentinel user, you can upload the SQL auditing logs from the Windows Security Log events to Sentinel and enjoy a rich investigation experience. [Learn more about SQL Server Auditing](https://docs.microsoft.com/sql/relational-databases/security/auditing/create-a-server-audit-and-server-audit-specification?view=sql-server-ver15&preserve-view=true).
118
118
* To improve your security posture, use Security Center's recommendations for the host machine indicated in each alert. This will reduce the risks of future attacks.
119
119
120
120
[Learn more about managing and responding to alerts](security-center-managing-and-responding-alerts.md).
Copy file name to clipboardExpand all lines: articles/security-center/security-center-endpoint-protection.md
+42-70Lines changed: 42 additions & 70 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,142 +25,114 @@ Azure Security Center provides health assessments of [supported](security-center
25
25
26
26
## Windows Defender
27
27
28
-
* Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) runs and the result is **AMServiceEnabled: False**
28
+
* Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps&preserve-view=true) runs and the result is **AMServiceEnabled: False**
29
29
30
-
* Security Center recommends you **"Resolve endpoint protection health issues on your machines"** when [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) runs and any of the following occurs:
30
+
* Security Center recommends you **"Resolve endpoint protection health issues on your machines"** when [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps&preserve-view=true) runs and any of the following occurs:
31
31
32
32
* Any of the following properties are false:
33
33
34
-
**AMServiceEnabled**
34
+
-**AMServiceEnabled**
35
+
-**AntispywareEnabled**
36
+
-**RealTimeProtectionEnabled**
37
+
-**BehaviorMonitorEnabled**
38
+
-**IoavProtectionEnabled**
39
+
-**OnAccessProtectionEnabled**
35
40
36
-
**AntispywareEnabled**
41
+
* If one or both of the following properties are 7 or more:
37
42
38
-
**RealTimeProtectionEnabled**
39
-
40
-
**BehaviorMonitorEnabled**
41
-
42
-
**IoavProtectionEnabled**
43
-
44
-
**OnAccessProtectionEnabled**
45
-
46
-
* If one or both of the following properties are 7 or more.
47
-
48
-
**AntispywareSignatureAge**
49
-
50
-
**AntivirusSignatureAge**
43
+
-**AntispywareSignatureAge**
44
+
-**AntivirusSignatureAge**
51
45
52
46
## Microsoft System Center endpoint protection
53
47
54
-
* Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when importing **SCEPMpModule ("$env:ProgramFiles\Microsoft Security Client\MpProvider\MpProvider.psd1")** and running **Get-MProtComputerStatus** results with**AMServiceEnabled = false**
48
+
* Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when importing **SCEPMpModule ("$env:ProgramFiles\Microsoft Security Client\MpProvider\MpProvider.psd1")** and running **Get-MProtComputerStatus** results in**AMServiceEnabled = false**.
55
49
56
50
* Security Center recommends you **"Resolve endpoint protection health issues on your machines"** when **Get-MprotComputerStatus** runs and any of the following occurs:
57
51
58
52
* At least one of the following properties is false:
59
53
60
-
***AMServiceEnabled**
61
-
***AntispywareEnabled**
62
-
***RealTimeProtectionEnabled**
63
-
***BehaviorMonitorEnabled**
64
-
***IoavProtectionEnabled**
65
-
***OnAccessProtectionEnabled**
54
+
-**AMServiceEnabled**
55
+
-**AntispywareEnabled**
56
+
-**RealTimeProtectionEnabled**
57
+
-**BehaviorMonitorEnabled**
58
+
-**IoavProtectionEnabled**
59
+
-**OnAccessProtectionEnabled**
66
60
67
-
* If one or both of the following Signature Updates is greater or equal to 7.
61
+
* If one or both of the following Signature Updates are greater or equal to 7:
68
62
69
63
***AntispywareSignatureAge**
70
64
***AntivirusSignatureAge**
71
65
72
66
## Trend Micro
73
67
74
68
* Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when any of the following checks aren't met:
-**"/opt/isec/ens/threatprevention/bin/isecav --version"** output is: **McAfee name = McAfee Endpoint Security for Linux Threat Prevention and McAfee version >= 10**
137
118
138
119
Security Center recommends you **"Resolve endpoint protection health issues on your machines"** when any of the following checks aren't met:
139
120
140
121
-**"/opt/isec/ens/threatprevention/bin/isecav --listtask"** returns **Quick scan, Full scan** and both of the scans <= 7 days
141
-
142
122
-**"/opt/isec/ens/threatprevention/bin/isecav --listtask"** returns **DAT and engine Update time** and both of them <= 7 days
143
-
144
123
-**"/opt/isec/ens/threatprevention/bin/isecav --getoasconfig --summary"** returns **On Access Scan** status
145
124
146
125
## Sophos Antivirus for Linux
147
126
148
127
Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when any of the following checks aren't met:
149
-
150
128
- File **/opt/sophos-av/bin/savdstatus** exits or search for customized location **"readlink $(which savscan)"**
151
-
152
129
-**"/opt/sophos-av/bin/savdstatus --version"** returns Sophos name = **Sophos Anti-Virus and Sophos version >= 9**
153
130
154
131
Security Center recommends you **"Resolve endpoint protection health issues on your machines"** when any of the following checks aren't met:
155
-
156
132
-**"/opt/sophos-av/bin/savlog --maxage=7 | grep -i "Scheduled scan .\* completed" | tail -1"**, returns a value
157
-
158
133
-**"/opt/sophos-av/bin/savlog --maxage=7 | grep "scan finished"** | tail -1", returns a value
159
-
160
134
-**"/opt/sophos-av/bin/savdstatus --lastupdate"** returns lastUpdate, which should be <= 7 days
161
-
162
135
-**"/opt/sophos-av/bin/savdstatus -v"** is equal to **"On-access scanning is running"**
163
-
164
136
-**"/opt/sophos-av/bin/savconfig get LiveProtection"** returns enabled
Copy file name to clipboardExpand all lines: articles/security/benchmarks/security-control-identity-access-control.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,9 +22,9 @@ Identity and access management recommendations focus on addressing issues relate
22
22
23
23
Azure AD has built-in roles that must be explicitly assigned and are queryable. Use the Azure AD PowerShell module to perform ad hoc queries to discover accounts that are members of administrative groups.
24
24
25
-
-[How to get a directory role in Azure AD with PowerShell](https://docs.microsoft.com/powershell/module/azuread/get-azureaddirectoryrole?view=azureadps-2.0)
25
+
-[How to get a directory role in Azure AD with PowerShell](https://docs.microsoft.com/powershell/module/azuread/get-azureaddirectoryrole?view=azureadps-2.0&preserve-view=true)
26
26
27
-
-[How to get members of a directory role in Azure AD with PowerShell](https://docs.microsoft.com/powershell/module/azuread/get-azureaddirectoryrolemember?view=azureadps-2.0)
27
+
-[How to get members of a directory role in Azure AD with PowerShell](https://docs.microsoft.com/powershell/module/azuread/get-azureaddirectoryrolemember?view=azureadps-2.0&preserve-view=true)
0 commit comments