AZFWIdpsSignature

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Tables Index


Reference for AZFWIdpsSignature table in Azure Monitor Logs.

Attribute Value
Category Security
Basic Logs Eligible ✓ Yes (source)
Supports Transformations ✓ Yes (source)
Ingestion API Supported ✗ No
Azure Monitor Tables Reference View Documentation

Contents

Schema (18 columns)

Source: Azure Monitor documentation

Column Name Type Description
_BilledSize real The record size in bytes
_IsBillable string Specifies whether ingesting the data is billable. When _IsBillable isfalseingestion isn't billed to your Azure account
_ResourceId string A unique identifier for the resource that the record is associated with
_SubscriptionId string A unique identifier for the subscription that the record is associated with
Action string Action taken by the firewall following the IDPS signature hit.
Category string Category of the matched IDPS signature.
Description string Description of the matched IDPS signature.
DestinationIp string Packet's destination IP address.
DestinationPort int Packet's destination port.
Protocol string Packet's network protocol. For example: UDP, TCP.
Severity int Severity of the matched IDPS signature.
SignatureId string ID of the matched IDPS signature.
SourceIp string Packet's source IP address.
SourcePort int Packet's source port.
SourceSystem string The type of agent the event was collected by. For example,OpsManagerfor Windows agent, either direct connect or Operations Manager,Linuxfor all Linux agents, orAzurefor Azure Diagnostics
TenantId string The Log Analytics workspace ID
TimeGenerated datetime Timestamp (UTC) when the data plane log was created.
Type string The name of the table

Solutions (1)

This table is used by the following solutions:

Connectors (1)

This table is ingested by the following connectors:

Connector Selection Criteria
Azure Firewall

Content Items Using This Table (8)

Analytic Rules (7)

In solution Azure Firewall:

Analytic Rule Selection Criteria
Abnormal Deny Rate for Source IP
DDoS attack detected
Elevation of Privilege attempt detected
High severity malicious activity detected
Medium severity malicious activity detected
Several deny actions registered
Web Application attack detected

Workbooks (1)

In solution Azure Firewall:

Workbook Selection Criteria
AzureFirewallWorkbook-StructuredLogs

Resource Types

This table collects data from the following Azure resource types:


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Tables Index