Events
19 Nov, 23 - 21 Nov, 23
Discover the latest partner benefits with product enhancements to support AI practice growth at Microsoft Ignite online.
Register nowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Appropriate roles: Admin agent
Applies to: Partner Center Direct Bill and Indirect Providers
You can subscribe to a new security alert for detections related to unauthorized party abuse and account takeovers. This security alert is one of the many ways Microsoft provides the data you need to secure your customer's tenants. You can subscribe to a new security alert for detections related to unauthorized party abuse and account takeovers. This security alert is one of the many ways Microsoft provides the data you need to secure your customer's tenants.
Important
As a partner in the Cloud Solution Provider (CSP) program, you're responsible for your customers' Azure consumption, so it's important that you're aware of any anomalous usage in your customer's Azure subscriptions. Use Microsoft Azure security alerts to detect patterns of fraudulent activities and misuse in Azure resources to help reduce your exposure to online transaction risks. Microsoft Azure security alerts don't detect all types of fraudulent activities or misuse, so it's critical that you use additional methods of monitoring to help detect anomalous usage in your customer's Azure subscriptions. To learn more, see Managing nonpayment, fraud, or misuse and Managing customer accounts.
Action required: With monitoring and signal awareness, you can take immediate action to determine whether the behavior is legitimate or fraudulent. If necessary, you can suspend affected Azure resources or Azure subscriptions to mitigate an issue.
Make sure that the preferred email address for your Partner Admin Agents is up-to-date, so they can be notified along with the security contacts.
You can subscribe to various partner notifications based on your role.
Security alerts notify you when your customer's Azure subscription shows possible anomalous activities.
We send security alerts when we detect possible security alert activities or misuse in some of your customers' Microsoft Azure subscriptions. There are three types of emails:
Cloud Solution Provider (CSP) direct bill partners can see more alerts for activities, for example: anomalous compute usage, crypto mining, Azure Machine Learning usage, and service health advisory notifications. Cloud Solution Provider (CSP) direct bill partners can see more alerts for activities, for example: anomalous compute usage, crypto mining, Azure Machine Learning usage, and service health advisory notifications.
Partners can register to a webhook event: azure-fraud-event-detected
to receive alerts for resource change events. To learn more, see Partner Center webhook events.
CSP partners can access the Partner Center Security Alerts dashboard to detect and respond to alerts. To learn more, see Respond to security events with Partner Center Security Alerts dashboard. CSP partners can access the Partner Center Security Alerts dashboard to detect and respond to alerts. To learn more, see Respond to security events with Partner Center Security Alerts dashboard.
Benefits: Starting in May 2024, the preview version of the Microsoft Graph Security Alerts API is available. This API provides a unified API gateway experience across other Microsoft services such as Microsoft Entra ID, Teams, and Outlook.
Onboarding requirements: CSP partners who are onboarding are required to use the new Security Alerts Beta API. To learn more, see Use the partner security alert API in Microsoft Graph.
The Microsoft Graph Security Alerts API V1 version will be released in July 2024.
Use case | APIs |
---|---|
Onboard to Microsoft Graph API to get Access Token | Get access on behalf of a user |
List Security Alerts to get visibility into the alerts | List securityAlerts |
Get Security Alerts to get visibility into a specific alert based on the query param selected. | Get partnerSecurityAlert |
Get token to call the Partner Center APIs for reference information | Enable secure application model |
Get your Organization Profile information | Get an organization profile |
Get your Customer information by ID | Get a customer by ID |
Get your Indirect Resellers information of a Customer by ID | Get indirect resellers of a customer |
Get Customer's Subscription information by ID | Get a subscription by ID |
Update alert status and resolve when mitigated | Update partnerSecurityAlert |
Important
The legacy fraud events API will be deprecated in CY Q4 2024. For more details, please look out for monthly Partner Center Security announcements. CSP partners should migrate to the new Microsoft Graph Security Alerts API, which is now available in preview.
During the transition period, CSP partners can continue to use the FraudEvents API to get extra detection signals using X-NewEventsModel. With this model, you can get new types of alerts as they're added to the system, for example, anomalous compute usage, crypto mining, Azure Machine Learning usage, and service health advisory notifications. New types of alerts can be added with limited notice, because threats are also evolving. If you use special handling through the API for different alert types, monitor these APIs for changes:
The following checklist provides suggested next steps for what to do when you receive a security notification.
no-reply@microsoft.com
. Partners only receive notification from Microsoft.Take immediate action to protect your account and data. Here are a few suggestions and tips to quickly respond and contain a potential incident to reduce its impact and overall business risk.
Remediating compromised identities in a cloud environment is crucial for ensuring the overall security of cloud-based systems. Compromised identities can provide attackers with access to sensitive data and resources, making it essential to take immediate action to protect the account and data.
Immediately change credentials for:
Review and verify all admin user password recovery emails and phone numbers within Microsoft Entra ID. Update them if necessary. Password policy recommendations
Review which users, tenants, and subscriptions are at risk within the Azure portal.
Review the Microsoft Entra sign-in logs on the customer tenant to see unusual sign-in patterns around the time when the security alert is triggered.
After malicious actors are evicted, clean the compromised resources. Keep a close eye on the affected subscription to make sure there's no further suspicious activity. It's also a good idea to regularly review your logs and audit trails to ensure that your account is secure.
Preventing account compromise is easier than recovering from it. Therefore, it's important to strengthen your security posture.
For more information, see the article support.
Microsoft sends notifications to Azure subscriptions, which go to your end customers. Work with your end customer to ensure that they can act appropriately and are alerted of various security issues within their environment:
If you suspect unauthorized usage of your or your customer's Azure subscription, engage Microsoft Azure Support so Microsoft can help expedite any other questions or concerns.
If you have specific questions regarding Partner Center, submit a support request in Partner Center. For more information: Get support in Partner Center.
Microsoft has been sending Azure Fraud alerts since December 2021. However, in the past, alert notification was based on opt-in preference only, where partners had to opt in to receive notice. We've changed this behavior. Partners should now resolve all fraud alerts (including old alerts) that are open. To secure your and your customers' security posture, follow the Cloud Solution Provider security best practices.
Microsoft is sending the daily fraud summary (this is the count of partners, customers, and subscriptions affected) if there's an active unresolved fraud alert within the last 60 days. Microsoft is sending the daily fraud summary (this is the count of partners, customers, and subscriptions affected) if there's an active unresolved fraud alert within the last 60 days.
Security alert notifications are limited to detecting patterns of certain anomalous actions in Azure. Security alert notifications don't detect and aren't guaranteed to detect all anomalous behaviors. It's critical that you use other methods of monitoring to help detect anomalous usage in your customer's Azure subscriptions, such as monthly Azure spending budgets. If you receive an alert that is significant and is a false negative, reach out to Partner Support and provide the following information:
Events
19 Nov, 23 - 21 Nov, 23
Discover the latest partner benefits with product enhancements to support AI practice growth at Microsoft Ignite online.
Register now