New Blog Post | Automatically Extend Multiple Suppression Rules on Security Alerts

%3CLINGO-SUB%20id%3D%22lingo-sub-2896678%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Automatically%20Extend%20Multiple%20Suppression%20Rules%20on%20Security%20Alerts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2896678%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22AshleyMartin_0-1635438763767.png%22%20style%3D%22width%3A%20660px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F320927iBE9E6D404C085E5B%2Fimage-dimensions%2F660x798%3Fv%3Dv2%22%20width%3D%22660%22%20height%3D%22798%22%20role%3D%22button%22%20title%3D%22AshleyMartin_0-1635438763767.png%22%20alt%3D%22AshleyMartin_0-1635438763767.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-security-center%2Fautomatically-extend-multiple-suppression-rules-on-security%2Fba-p%2F2896121%22%20target%3D%22_blank%22%3EAutomatically%20Extend%20Multiple%20Suppression%20Rules%20on%20Security%20Alerts%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EAzure%20Defender%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3Ehelps%20organizations%20be%20more%20secure%20by%20providing%20dedicated%20security%20analytics%20for%20a%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity-center%2Fazure-defender%23what-resource-types-can-azure-defender-secure%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Evariety%20of%20workloads%3C%2FA%3E.%20Once%20you%E2%80%99ve%20enabled%20Azure%20Defender%20for%20the%20workload%20you%20need%2C%20you%20will%20receive%20alerts%20based%20on%20the%20analytics%20that%20were%20created%20to%20detects%20threats%20for%20the%20type%20of%20workload%20you%20selected.%20To%20ensure%20security%20alerts%20meet%20your%20organization%E2%80%99s%20specific%20requirements%2C%20you%20can%20create%20suppression%20rule(s)%20to%20fine%20tune%20alerts.%20Each%20suppression%20rule%20has%20an%20expiration%20date%2C%20which%20can%20be%20altered%20either%20through%20the%20Azure%20portal%20or%20REST%20API.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThe%20purpose%20of%20this%20article%20is%20to%20highlight%20an%20automation%2C%20which%20has%20been%20developed%20and%20that%20can%20be%20leveraged%20by%20organizations%26nbsp%3B%3C%2FSPAN%3Eto%20automatically%20extend%20the%20expiration%20date%20of%20all%20enabled%20suppression%20rules%20that%20are%20about%20to%20expire.%20This%20automation%20has%20been%20published%20to%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FAzure%2FAzure-Security-Center%2Ftree%2Fmain%2FWorkflow%2520automation%2FExtend-AlertSuppressionRulesAboutToExpire%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Security%20Center%20GitHub%20repository%3C%2FA%3E%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%E2%80%93%20from%20where%20it%20can%20be%20deployed%20directly%20to%20your%20environment%2C%20through%20the%20provided%20ARM%20template.%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOriginal%20Post%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fnew-blog-post-automatically-extend-multiple-suppression-rules-on%2Fm-p%2F2896671%23M6503%22%20target%3D%22_blank%22%3ENew%20Blog%20Post%20%7C%20Automatically%20Extend%20Multiple%20Suppression%20Rules%20on%20Security%20Alerts%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

AshleyMartin_0-1635438763767.png

 

Automatically Extend Multiple Suppression Rules on Security Alerts - Microsoft Tech Community

Azure Defender helps organizations be more secure by providing dedicated security analytics for a variety of workloads. Once you’ve enabled Azure Defender for the workload you need, you will receive alerts based on the analytics that were created to detects threats for the type of workload you selected. To ensure security alerts meet your organization’s specific requirements, you can create suppression rule(s) to fine tune alerts. Each suppression rule has an expiration date, which can be altered either through the Azure portal or REST API.

The purpose of this article is to highlight an automation, which has been developed and that can be leveraged by organizations to automatically extend the expiration date of all enabled suppression rules that are about to expire. This automation has been published to Azure Security Center GitHub repository – from where it can be deployed directly to your environment, through the provided ARM template. 

Original Post: New Blog Post | Automatically Extend Multiple Suppression Rules on Security Alerts - Microsoft Tech ...

0 Replies
www.000webhost.com