Leverage Azure Security Center to detect when compromised Linux machines attack

%3CLINGO-SUB%20id%3D%22lingo-sub-294957%22%20slang%3D%22en-US%22%3ELeverage%20Azure%20Security%20Center%20to%20detect%20when%20compromised%20Linux%20machines%20attack%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-294957%22%20slang%3D%22en-US%22%3E%3CP%3E%3CFONT%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fleverage-azure-security-center-to-detect-when-compromised-linux-machines-attack%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fleverage-azure-security-center-to-detect-when-compromised-linux-machines-attack%2F%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%3E%3CSPAN%3E%22When%20an%20attacker%20compromises%20a%20machine%2C%20they%20typically%20have%20a%20goal%20in%20mind.%20Some%20attackers%20are%20looking%20for%20information%20residing%20on%20the%20victim%E2%80%99s%20machine%20or%20are%20looking%20for%20access%20to%20other%20machines%20on%20the%20victim%E2%80%99s%20network.%20Other%20times%2C%20attackers%20have%20plans%20to%20use%20the%20processing%20power%20of%20the%20machine%20itself%20or%20even%20use%20the%20machine%20as%20a%20launch%20point%20for%20other%20attacks.%22%3C%2FSPAN%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
Microsoft

https://azure.microsoft.com/en-us/blog/leverage-azure-security-center-to-detect-when-compromised-lin...

 

"When an attacker compromises a machine, they typically have a goal in mind. Some attackers are looking for information residing on the victim’s machine or are looking for access to other machines on the victim’s network. Other times, attackers have plans to use the processing power of the machine itself or even use the machine as a launch point for other attacks."