%3CLINGO-SUB%20id%3D%22lingo-sub-167596%22%20slang%3D%22en-US%22%3ENotable%20Events%20in%20Azure%20Security%20Center%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-167596%22%20slang%3D%22en-US%22%3E%3CP%3ESecurity%20Center%20uses%20the%20Microsoft%20Monitoring%20Agent%20to%20collect%20various%20security%20related%20configurations%20and%20events%20from%20your%20machines%20and%20stores%20these%20events%20in%20your%20workspace(s).%20Examples%20of%20such%20data%20are%3A%20operating%20system%20logs%20(Windows%20event%20logs)%2C%20running%20processes%2C%20and%20events%20from%20security%20solutions%20integrated%20with%20Security%20Center.%26nbsp%3BThe%20built-in%20notable%20events%20are%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDistinct%20malicious%20IP%20addresses%20accessed%3C%2FSTRONG%3E%3CBR%20%2F%3Eunion%20isfuzzy%3Dtrue%20(WireData%20%7C%20where%20Direction%20%3D%3D%20'Outbound')%2C%20(WindowsFirewall%20%7C%20where%20CommunicationDirection%20%3D%3D%20'SEND')%2C%20(CommonSecurityLog%20%7C%20where%20CommunicationDirection%20%3D%3D%20'Outbound')%20%7C%20where%20isnotempty(MaliciousIP)%20%7C%20summarize%20by%20MaliciousIP%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EComputers%20with%20detected%20threats%3C%2FSTRONG%3E%3CBR%20%2F%3EProtectionStatus%20%7C%20summarize%20(TimeGenerated%2C%20ThreatStatusRank)%20%3D%20argmax(TimeGenerated%2C%20ThreatStatusRank)%20by%20Computer%20%7C%20where%20ThreatStatusRank%20%26gt%3B%20199%20and%20ThreatStatusRank%20!%3D%20470%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EComputer%20with%20guest%20account%20logons%3C%2FSTRONG%3E%3CBR%20%2F%3ESecurityEvent%20%7C%20where%20EventID%20%3D%3D%204624%20and%20TargetUserName%20%3D%3D%20'Guest'%20and%20LogonType%20in%20(10%2C%203)%20%7C%20summarize%20count()%20by%20Computer%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EHigh%20priority%20Active%20Directory%20assessment%20security%20recommendations%3C%2FSTRONG%3E%3CBR%20%2F%3Elet%20schemaColumns%20%3D%20datatable(TimeGenerated%3Adatetime%2C%20RecommendationId%3Astring)%5B%5D%3B%20union%20isfuzzy%3Dtrue%20schemaColumns%2C%20(ADAssessmentRecommendation%20%7C%20where%20FocusArea%20%3D%3D%20'Security%20and%20Compliance'%20and%20RecommendationResult%20%3D%3D%20'Failed'%20and%20RecommendationScore%26gt%3B%3D35)%20%7C%20summarize%20arg_max(TimeGenerated%2C%20*)%20by%20RecommendationId%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EHigh%20priority%20SQL%20assessment%20security%20recommendations%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3Elet%20schemaColumns%20%3D%20datatable(TimeGenerated%3Adatetime%2C%20RecommendationId%3Astring)%5B%5D%3B%20union%20isfuzzy%3Dtrue%20schemaColumns%2C%20(SQLAssessmentRecommendation%20%7C%20where%20FocusArea%20%3D%3D%20'Security%20and%20Compliance'%20and%20RecommendationResult%20%3D%3D%20'Failed'%20and%20RecommendationScore%26gt%3B%3D35)%20%7C%20summarize%20arg_max(TimeGenerated%2C%20*)%20by%20RecommendationId%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMembers%20added%20To%20security-enabled%20groups%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESecurityEvent%20%7C%20where%20EventID%20in%20(4728%2C%204732%2C%204756)%20%7C%20summarize%20count()%20by%20SubjectAccount%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDomain%20security%20policy%20changes%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESecurityEvent%20%7C%20where%20EventID%20%3D%3D%204739%20%7C%20summarize%20count()%20by%20DomainPolicyChanged%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EComputers%20with%20system%20audit%20policy%20changes%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESecurityEvent%20%7C%20where%20EventID%20%3D%3D%204719%20%7C%20summarize%20count()%20by%20Computer%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESuspicious%20executables%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESecurityEvent%20%7C%20where%20EventID%20%3D%3D%208002%20and%20Fqbn%20%3D%3D%20'-'%20%7C%20summarize%20ExecutionCountHash%3Dcount()%20by%20FileHash%20%7C%20where%20ExecutionCountHash%20%26lt%3B%3D%205%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EComputers%20missing%20critical%20updates%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EUpdate%20%7C%20where%20UpdateState%20%3D%3D%20'Needed'%20and%20Optional%20%3D%3D%20false%20and%20Classification%20%3D%3D%20'Critical%20Updates'%20and%20Approved%20!%3D%20false%20%7C%20summarize%20count()%20by%20Computer%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ELow%20priority%20AD%20assessment%20security%20recommendations%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3Elet%20schemaColumns%20%3D%20datatable(TimeGenerated%3Adatetime%2C%20RecommendationId%3Astring)%5B%5D%3B%20union%20isfuzzy%3Dtrue%20schemaColumns%2C%20(ADAssessmentRecommendation%20%7C%20where%20FocusArea%20%3D%3D%20'Security%20and%20Compliance'%20and%20RecommendationResult%20%3D%3D%20'Failed'%20and%20RecommendationScore%26lt%3B35)%20%7C%20summarize%20arg_max(TimeGenerated%2C%20*)%20by%20RecommendationId%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ELow%20priority%20SQL%20assessment%20security%20recommendations%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3Elet%20schemaColumns%20%3D%20datatable(TimeGenerated%3Adatetime%2C%20RecommendationId%3Astring)%5B%5D%3B%20union%20isfuzzy%3Dtrue%20schemaColumns%2C%20(SQLAssessmentRecommendation%20%7C%20where%20FocusArea%20%3D%3D%20'Security%20and%20Compliance'%20and%20RecommendationResult%20%3D%3D%20'Failed'%20and%20RecommendationScore%26lt%3B35)%20%7C%20summarize%20arg_max(TimeGenerated%2C%20*)%20by%20RecommendationId%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAccounts%20failed%20to%20log%20on%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESecurityEvent%20%7C%20where%20EventID%20%3D%3D%204625%20%7C%20summarize%20count()%20by%20TargetAccount%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ELocked%20accounts%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESecurityEvent%20%7C%20where%20EventID%20%3D%3D%204740%20%7C%20summarize%20count()%20by%20TargetAccount%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EChange%20or%20reset%20passwords%20attempts%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESecurityEvent%20%7C%20where%20EventID%20in%20(4723%2C%204724)%20%7C%20summarize%20count()%20by%20TargetAccount%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESecurity%20groups%20created%20or%20modified%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESecurityEvent%20%7C%20where%20EventID%20in%20(4727%2C%204731%2C%204735%2C%204737%2C%204754%2C%204755)%20%7C%20summarize%20count()%20by%20TargetAccount%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERemote%20procedure%20call(RPC)%20attempts%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESecurityEvent%20%7C%20where%20EventID%20%3D%3D%205712%20%7C%20summarize%20count()%20by%20Computer%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EUser%20accounts%20created%20or%20enabled%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESecurityEvent%20%7C%20where%20EventID%20in%20(4720%2C%204722)%20%7C%20summarize%20by%20TargetAccount%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EComputers%20with%20users%20added%20to%20a%20Linux%20group%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESyslog%20%7C%20where%20Facility%20%3D%3D%20'authpriv'%20and%20SyslogMessage%20has%20'to%20group'%20and%20(SyslogMessage%20has%20'add'%20or%20SyslogMessage%20has%20'added')%20%7C%20summarize%20by%20Computer%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EComputers%20with%20new%20Linux%20group%20created%3C%2FSTRONG%3E%3CBR%20%2F%3ESyslog%20%7C%20where%20Facility%20%3D%3D%20'authpriv'%20and%20SyslogMessage%20has%20'new%20group'%20%7C%20summarize%20count()%20by%20Computer%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EComputers%20with%20failed%20Linux%20user%20password%20change%3C%2FSTRONG%3E%3CBR%20%2F%3ESyslog%20%7C%20where%20Facility%20%3D%3D%20'authpriv'%20and%20((SyslogMessage%20has%20'passwd%3Achauthtok'%20and%20SyslogMessage%20has%20'authentication%20failure')%20or%20SyslogMessage%20has%20'password%20change%20failed')%20%7C%20summarize%20count()%20by%20Computer%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EComputers%20with%20failed%20ssh%20logons%3C%2FSTRONG%3E%3CBR%20%2F%3ESyslog%20%7C%20where%20(Facility%20%3D%3D%20'authpriv'%20and%20SyslogMessage%20has%20'sshd%3Aauth'%20and%20SyslogMessage%20has%20'authentication%20failure')%20or%20(Facility%20%3D%3D%20'auth'%20and%20((SyslogMessage%20has%20'Failed'%20and%20SyslogMessage%20has%20'invalid%20user'%20and%20SyslogMessage%20has%20'ssh2')%20or%20SyslogMessage%20has%20'error%3A%20PAM%3A%20Authentication%20failure'))%20%7C%20summarize%20count()%20by%20Computer%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EComputers%20with%20failed%20su%20logons%3C%2FSTRONG%3E%3CBR%20%2F%3ESyslog%20%7C%20where%20(Facility%20%3D%3D%20'authpriv'%20and%20SyslogMessage%20has%20'su%3Aauth'%20and%20SyslogMessage%20has%20'authentication%20failure')%20or%20(Facility%20%3D%3D%20'auth'%20and%20SyslogMessage%20has%20'FAILED%20SU')%20%7C%20summarize%20count()%20by%20Computer%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EComputers%20with%20failed%20sudo%20logons%3C%2FSTRONG%3E%3CBR%20%2F%3ESyslog%20%7C%20where%20(Facility%20%3D%3D%20'authpriv'%20and%20SyslogMessage%20has%20'sudo%3Aauth'%20and%20(SyslogMessage%20has%20'authentication%20failure'%20or%20SyslogMessage%20has%20'conversation%20failed'))%20or%20((Facility%20%3D%3D%20'auth'%20or%20Facility%20%3D%3D%20'authpriv')%20and%20SyslogMessage%20has%20'user%20NOT%20in%20sudoers')%20%7C%20summarize%20count()%20by%20Computer%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDistinct%20clients%20resolving%20malicious%20domains%3C%2FSTRONG%3E%3CBR%20%2F%3Elet%20schemaColumns%20%3D%20datatable(ClientIP%3Astring)%5B%5D%3B%20union%20isfuzzy%3Dtrue%20schemaColumns%2C%20(DnsEvents%20%7C%20where%20SubType%20%3D%3D%20'LookupQuery'%20and%20isnotempty(MaliciousIP))%20%7C%20summarize%20count()%20by%20ClientIP%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EComputers%20with%20web%20vulnerabilities%3C%2FSTRONG%3E%3CBR%20%2F%3ESecurityBaselineSummary%20%7C%20where%20PercentageOfPassedRules%20%26lt%3B%20100%20and%20BaselineType%20%3D%3D%20%22Web%22%20%7C%20summarize%20count()%20by%20Computer%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20create%20your%20own%20notable%20event%2C%20and%20add%20on%20top%20of%20the%20built-in%20ones.%20Read%20%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fyuridiogenes%2F2018%2F01%2F12%2Fcreating-custom-notable-events-in-azure-security-center%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ECreating%20Custom%20Notable%20Event%20in%20Azure%20Security%20Center%3C%2FA%3E%20for%20more%20information%20on%20that.%20Notable%20events%20can%20also%20appear%20as%20contextual%20information%20in%20a%20Security%20Incident%2C%20read%20%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fyuridiogenes%2F2018%2F01%2F26%2Fexploring-notable-events-in-security-incidents%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EExploring%20Notable%20Events%20in%20Security%20Incidents%3C%2FA%3E%20for%20more%20information%20on%20that.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-167596%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Security%20Center%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Security Center uses the Microsoft Monitoring Agent to collect various security related configurations and events from your machines and stores these events in your workspace(s). Examples of such data are: operating system logs (Windows event logs), running processes, and events from security solutions integrated with Security Center. The built-in notable events are:

 

Distinct malicious IP addresses accessed
union isfuzzy=true (WireData | where Direction == 'Outbound'), (WindowsFirewall | where CommunicationDirection == 'SEND'), (CommonSecurityLog | where CommunicationDirection == 'Outbound') | where isnotempty(MaliciousIP) | summarize by MaliciousIP

 

Computers with detected threats
ProtectionStatus | summarize (TimeGenerated, ThreatStatusRank) = argmax(TimeGenerated, ThreatStatusRank) by Computer | where ThreatStatusRank > 199 and ThreatStatusRank != 470

 

Computer with guest account logons
SecurityEvent | where EventID == 4624 and TargetUserName == 'Guest' and LogonType in (10, 3) | summarize count() by Computer

 

High priority Active Directory assessment security recommendations
let schemaColumns = datatable(TimeGenerated:datetime, RecommendationId:string)[]; union isfuzzy=true schemaColumns, (ADAssessmentRecommendation | where FocusArea == 'Security and Compliance' and RecommendationResult == 'Failed' and RecommendationScore>=35) | summarize arg_max(TimeGenerated, *) by RecommendationId

 

High priority SQL assessment security recommendations

let schemaColumns = datatable(TimeGenerated:datetime, RecommendationId:string)[]; union isfuzzy=true schemaColumns, (SQLAssessmentRecommendation | where FocusArea == 'Security and Compliance' and RecommendationResult == 'Failed' and RecommendationScore>=35) | summarize arg_max(TimeGenerated, *) by RecommendationId

 

Members added To security-enabled groups

SecurityEvent | where EventID in (4728, 4732, 4756) | summarize count() by SubjectAccount

 

Domain security policy changes

SecurityEvent | where EventID == 4739 | summarize count() by DomainPolicyChanged

 

Computers with system audit policy changes

SecurityEvent | where EventID == 4719 | summarize count() by Computer

 

Suspicious executables

SecurityEvent | where EventID == 8002 and Fqbn == '-' | summarize ExecutionCountHash=count() by FileHash | where ExecutionCountHash <= 5

 

Computers missing critical updates

Update | where UpdateState == 'Needed' and Optional == false and Classification == 'Critical Updates' and Approved != false | summarize count() by Computer

 

Low priority AD assessment security recommendations

let schemaColumns = datatable(TimeGenerated:datetime, RecommendationId:string)[]; union isfuzzy=true schemaColumns, (ADAssessmentRecommendation | where FocusArea == 'Security and Compliance' and RecommendationResult == 'Failed' and RecommendationScore<35) | summarize arg_max(TimeGenerated, *) by RecommendationId

 

Low priority SQL assessment security recommendations

let schemaColumns = datatable(TimeGenerated:datetime, RecommendationId:string)[]; union isfuzzy=true schemaColumns, (SQLAssessmentRecommendation | where FocusArea == 'Security and Compliance' and RecommendationResult == 'Failed' and RecommendationScore<35) | summarize arg_max(TimeGenerated, *) by RecommendationId

 

Accounts failed to log on

SecurityEvent | where EventID == 4625 | summarize count() by TargetAccount

 

Locked accounts

SecurityEvent | where EventID == 4740 | summarize count() by TargetAccount

 

Change or reset passwords attempts

SecurityEvent | where EventID in (4723, 4724) | summarize count() by TargetAccount

 

Security groups created or modified

SecurityEvent | where EventID in (4727, 4731, 4735, 4737, 4754, 4755) | summarize count() by TargetAccount

 

Remote procedure call(RPC) attempts

SecurityEvent | where EventID == 5712 | summarize count() by Computer

 

User accounts created or enabled

SecurityEvent | where EventID in (4720, 4722) | summarize by TargetAccount

 

Computers with users added to a Linux group

Syslog | where Facility == 'authpriv' and SyslogMessage has 'to group' and (SyslogMessage has 'add' or SyslogMessage has 'added') | summarize by Computer

 

Computers with new Linux group created
Syslog | where Facility == 'authpriv' and SyslogMessage has 'new group' | summarize count() by Computer

 

Computers with failed Linux user password change
Syslog | where Facility == 'authpriv' and ((SyslogMessage has 'passwd:chauthtok' and SyslogMessage has 'authentication failure') or SyslogMessage has 'password change failed') | summarize count() by Computer

 

Computers with failed ssh logons
Syslog | where (Facility == 'authpriv' and SyslogMessage has 'sshd:auth' and SyslogMessage has 'authentication failure') or (Facility == 'auth' and ((SyslogMessage has 'Failed' and SyslogMessage has 'invalid user' and SyslogMessage has 'ssh2') or SyslogMessage has 'error: PAM: Authentication failure')) | summarize count() by Computer

 

Computers with failed su logons
Syslog | where (Facility == 'authpriv' and SyslogMessage has 'su:auth' and SyslogMessage has 'authentication failure') or (Facility == 'auth' and SyslogMessage has 'FAILED SU') | summarize count() by Computer

 

Computers with failed sudo logons
Syslog | where (Facility == 'authpriv' and SyslogMessage has 'sudo:auth' and (SyslogMessage has 'authentication failure' or SyslogMessage has 'conversation failed')) or ((Facility == 'auth' or Facility == 'authpriv') and SyslogMessage has 'user NOT in sudoers') | summarize count() by Computer

 

 

Distinct clients resolving malicious domains
let schemaColumns = datatable(ClientIP:string)[]; union isfuzzy=true schemaColumns, (DnsEvents | where SubType == 'LookupQuery' and isnotempty(MaliciousIP)) | summarize count() by ClientIP

 

Computers with web vulnerabilities
SecurityBaselineSummary | where PercentageOfPassedRules < 100 and BaselineType == "Web" | summarize count() by Computer

 

You can create your own notable event, and add on top of the built-in ones. Read Creating Custom Notable Event in Azure Security Center for more information on that. Notable events can also appear as contextual information in a Security Incident, read Exploring Notable Events in Security Incidents for more information on that.