Sdílet prostřednictvím


Microsoft Defender for Cloud Alert

Microsoft Defender for Cloud is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud - whether they're in Azure or not - as well as on premises

This connector is available in the following products and regions:

Service Class Regions
Logic Apps Standard All Logic Apps regions except the following:
     -   US Department of Defense (DoD)
Contact
Name Microsoft
URL Microsoft LogicApps Support
Connector Metadata
Publisher Microsoft
learn more> https://docs.microsoft.com/connectors/ascalert
Website https://azure.microsoft.com/services/security-center/

Throttling Limits

Name Calls Renewal Period
API calls per connection 100 60 seconds

Triggers

When a Microsoft Defender for Cloud alert is created or triggered

Triggers when an alert is created in Microsoft Defender for Cloud and matches the evaluation criteria configured in an automation, or when manually run on a specific alert. Note: automated running of this trigger requires enabling automation in Microsoft Defender for Cloud and enabling a workload protection plan as a preliminary step. To do so, visit Microsoft Defender for Cloud.

When a Microsoft Defender for Cloud alert is created or triggered

Triggers when an alert is created in Microsoft Defender for Cloud and matches the evaluation criteria configured in an automation, or when manually run on a specific alert. Note: automated running of this trigger requires enabling automation in Microsoft Defender for Cloud and enabling a workload protection plan as a preliminary step. To do so, visit Microsoft Defender for Cloud.

Returns

Name Path Type Description
Alert Uri
AlertUri string

A direct link to view the alert with all its details in Microsoft Defender for Cloud in the Azure portal.

Alert Display Name
AlertDisplayName string

The display name of the alert, this value is displayed to users either as-is or with additional parameters. (for examples for place holders formatting see in Notes Section). It is advised not to put place holders in the AlertDisplayName field and have the same value for all alerts sharing the same AlertType value, since alerts can be aggregated according to the AlertType field and shown to end users as such.

Alert Type
AlertType string

The type name of the alert. Alerts of the same type should have the same name. This field is a keyed string representing the category or type of the alert and not of an alert instance. All alert instances from the same detection logic/analytic should share the same value for alert type.

Compromised Entity
CompromisedEntity string

Display name of the main entity being reported on. This field is presented to the user AS-IS and is not required to conform to any format. It could hold computer, ip addresses, VMs or anything that the alert provider decides to present.

Description
Description string

Alert description, might have parameters placeholders (for examples for place holders formatting see in Notes Section)

End Time (UTC)
EndTimeUtc date-time

The impact end time of the alert (the time of the last event contributing to the alert).

Intent
Intent string

Optional field that specify the kill chain related intent behind the alert. For list of supported values is in the section Kill Chain Intent enumeration. Multiple values can be selected in this field. The JSON format for this field should serialize the enumeration values as strings. Multiple values should be separated by comma, e.g. Probing, Exploitation.

Product Name
ProductName string

The name of the product which published this alert, i.e. ASC, WDATP, MCAS.

Severity
Severity string

The severity of the alert as it is reported by the provider. Possible Values: Informational (a.k.a Silent), Low, Medium, High

Start Time (UTC)
StartTimeUtc date-time

The impact start time of the alert (the time of the first event contributing to the alert).

System Alert Id
SystemAlertId string

Holds the product identifier of the alert for the product. This is the alert identifier which is usually also available externally to query alerts by customers or external systems. Alert publisher which are internal to a product should use the ProviderAlertId field in order to report any identifier to be used in a scope of a single product.

Time Generated (UTC)
TimeGenerated date-time

The time the alert was generated. This time should contain the time it was generated by the alert provider, if missing the system will assign to it the time it was received for processing.

Vendor Name
VendorName string

The name of the vendor that raise the alert, this value is displayed to users as is, i.e. Microsoft or Deep Security Agent or Microsoft Antimalware etc.

Entities
Entities array of object

A list of entities related to the alert. This list can hold a mixture of entities of diverse types. The entities type can be any of the types defined in the Entitiessection. Entities which are not in the list below can also be send, however we dont guarantee that they will be processed (however the alert will not fail validation). Cannot be set to null (will be set to empty enumerable instead).

Extended Links
ExtendedLinks array of object

A bag for all links related to the alert. This bag can hold a mixture of links for diverse types. Links which are not in the list below can also be send, however we dont guarantee that they will be processed (however the alert will not fail validation). Cannot be set to null (will be set to empty enumerable instead)

Remediation Steps
RemediationSteps array of string

Manual action items to take to remediate the alert. Might have parameters placeholders. (for examples for place holders formatting see in Notes Section).

Resource Identifiers
ResourceIdentifiers array of object

The resource identifiers for this alert which can be used to direct the alert to the right product exposure group (workspace, subscription etc.). There can be multiple identifiers of different type per alert. See Resource Identifiers for more details.