Skip to content

Commit f7cce86

Browse files
committed
Merge branch 'melvyn-asc-alerts_ref' of https://github.com/memildin/azure-docs-pr into melvyn-asc-alerts_ref
2 parents 1e4c47f + a557b27 commit f7cce86

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/security-center/security-center-alerts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ Using incidents, Security Center provides you with a single view of an attack ca
111111

112112
## Security alerts in Azure Activity Log
113113

114-
In addition to being available in the Azure Portal or programmatically, Security alerts and incidents are audited as events in [Azure Activity Log](https://docs.microsoft.com/azure/azure-monitor/platform/activity-log-view). For more information on the event schema, see [Security Alerts in Azure Activity log](https://go.microsoft.com/fwlink/?linkid=2114113).
114+
In addition to being available in the Azure portal or programmatically, Security alerts and incidents are audited as events in [Azure Activity Log](https://docs.microsoft.com/azure/azure-monitor/platform/activity-log-view). For more information on the event schema, see [Security Alerts in Azure Activity log](https://go.microsoft.com/fwlink/?linkid=2114113).
115115

116116
## Next steps
117117

articles/security-center/security-center-alerts-service-layer.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,11 @@ Security Center network-layer analytics are based on sample [IPFIX data](https:/
2626

2727
Some network configurations may restrict Security Center from generating alerts on suspicious network activity. For Security Center to generate network alerts, ensure that:
2828

29-
Your virtual machine has a public IP address (or is on a load balancer with a public IP address).
29+
- Your virtual machine has a public IP address (or is on a load balancer with a public IP address).
3030

31-
Your virtual machine's network egress traffic isn't blocked by an external IDS solution.
31+
- Your virtual machine's network egress traffic isn't blocked by an external IDS solution.
3232

33-
Your virtual machine has been assigned the same IP address for the entire hour during which the suspicious communication occurred. This also applies to VMs created as part of a managed service (e.g. AKS, Databricks).
33+
- Your virtual machine has been assigned the same IP address for the entire hour during which the suspicious communication occurred. This also applies to VMs created as part of a managed service (e.g. AKS, Databricks).
3434

3535
For a list of the Azure network layer alerts, see the [Reference table of alerts](alerts-reference.md#alerts-azurenetlayer).
3636

0 commit comments

Comments
 (0)