File tree Expand file tree Collapse file tree
Azure Firewall/Alerts - Queries and Alerts/Detection - AZFW IDPS Threat Category based Detections Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1+ ## IDPS Threat Category based detections
2+
3+ 1 . High severity malicious activity detected
4+ 2 . Medium severity malicious activity detected
5+ 3 . Web Application attack detected
6+ 4 . DDoS attack detected
7+ 5 . Elevation of Privilege attempt detected
8+
9+
10+
11+ ## Contributing
12+
13+ This project welcomes contributions and suggestions. Most contributions require you to agree to a
14+ Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us
15+ the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com .
16+
17+ When you submit a pull request, a CLA bot will automatically determine whether you need to provide
18+ a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions
19+ provided by the bot. You will only need to do this once across all repos using our CLA.
20+
21+ This project has adopted the [ Microsoft Open Source Code of Conduct] ( https://opensource.microsoft.com/codeofconduct/ ) .
22+ For more information see the [ Code of Conduct FAQ] ( https://opensource.microsoft.com/codeofconduct/faq/ ) or
23+ contact [ opencode@microsoft.com ] ( mailto:opencode@microsoft.com ) with any additional questions or comments.
You can’t perform that action at this time.
0 commit comments