Skip to content

Latest commit

 

History

History
77 lines (74 loc) · 5.01 KB

security-center-alerts-schema-workflow-automation.md

File metadata and controls

77 lines (74 loc) · 5.01 KB
title description services author ms.service ms.topic ms.date ms.author ms.custom
include file
include file
data-factory
memildin
data-factory
include
03/10/2020
memildin
include file
{
  "VendorName": "Microsoft",
  "AlertType": "SUSPECT_SVCHOST",
  "StartTimeUtc": "2016-12-20T13:38:00.000Z",
  "EndTimeUtc": "2019-12-20T13:40:01.733Z",
  "ProcessingEndTime": "2019-09-16T12:10:19.5673533Z",
  "TimeGenerated": "2016-12-20T13:38:03.000Z",
  "IsIncident": false,
  "Severity": "High",
  "Status": "New",
  "ProductName": "Azure Security Center",
  "SystemAlertId": "2342409243234234_F2BFED55-5997-4FEA-95BD-BB7C6DDCD061",
  "CompromisedEntity": "WebSrv1",
  "Intent": "Execution",
  "AlertDisplayName": "Suspicious process detected",
  "Description": "Suspicious process named 'SVCHOST.EXE' was running from path: %{Process Path}",
  "RemediationSteps": ["contact your security information team"],
  "ExtendedProperties": {
    "Process Path": "c:\\temp\\svchost.exe",
    "Account": "Contoso\\administrator",
    "PID": 944,
    "ActionTaken": "Detected"
  },
  "Entities": [],
  "ResourceIdentifiers": [
        {
            Type: "AzureResource",
            AzureResourceId: "/subscriptions/86057C9F-3CDD-484E-83B1-7BF1C17A9FF8/resourceGroups/backend-srv/providers/Microsoft.Compute/WebSrv1"
        },
        {
            Type: "LogAnalytics",
            WorkspaceId: "077BA6B7-8759-4F41-9F97-017EB7D3E0A8",
            WorkspaceSubscriptionId: "86057C9F-3CDD-484E-83B1-7BF1C17A9FF8",
            WorkspaceResourceGroup: "omsrg",
            AgentId: "5A651129-98E6-4E6C-B2CE-AB89BD815616",
        }
  ]
}

The data model of the schema

Field Data type Description
AlertDisplayName String The display name of the alert.
AlertType String The type of alert. Alerts of the same type should have the same value. This field is a keyed string representing the type of alert and not of an alert instance. All alert instances from the same detection logic/analytic should have the same value for alert type.
CompromisedEntity String The display name of the resource most related to this alert.
Description String Description of the alert.
EndTimeUtc DateTime The time of the last event or activity included in the alert. The field should be a string that conforms to the ISO8601 format, including UTC timezone information.
Entities IEnumerable (IEntity) A list of entities related to the alert. This list can hold a mixture of entities of diverse types. The entities type can be any of the types defined in the Entities section. Entities that are not in the list below can also be sent, however it is not guaranteed that they will be processed (the alert will not fail validation with new types of entities).
ExtendedProperties Dictionary (String,String) Providers might (optionally) include custom fields here.
Intent Enum The kill chain related intent behind the alert. For list of supported values, and explanations of Azure Security Center's supported kill chain intents, see Intentions.
This field might have multiple values (separated by comma).
IsIncident Bool This field determines whether the alert is an incident (a compound grouping of several alerts) or a single alert. Default value for the field is 'false' (meaning it's a single alert).
ProcessingEndTime DateTime The time the alert was accessible to the end user in the original product holding the alert.
ProductName String The name of the product that published this alert (Azure Security Center, Azure ATP, Microsoft Defender ATP, O365 ATP, MCAS, and so on).
RemediationSteps List Manual action items to take to remediate the alert.
ResourceIdentifiers List (Resource Identifiers) The resource identifiers for this alert that can be used to direct the alert to the right product exposure group (tenant, workspace, subscription etc.). There can be multiple identifiers of different type per alert.
Severity Enum The severity of the alert as reported by the provider. Possible Values: Informational, Low, Medium, and High.
StartTimeUtc DateTime The time of the first event or activity included in the alert. The field should be a string that conforms to the ISO8601 format, including UTC timezone information.
Status Enum The life-cycle status of the alert.
Supported statuses are: New, Resolved, Dismissed, Unknown.
An alert that specifies a value other than the supported options is assigned the status 'Unknown'.
An alert that doesn't specify a value is assigned the status 'New'.
SystemAlertId String The alert identifier.
TimeGenerated DateTime The time the alert was generated by the alert provider. If not reported by internal alert providers, a product can choose to assign the time it was received for processing by the product. The field should be a string that conforms to the ISO8601 format, including UTC timezone information.
VendorName String The name of the vendor that raises the alert.