Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.
I understand that you would like to know more information about the IDPS Signature that was triggered.
The only information available with respect to a Rule signature is it's "Description" and "Group".
To investigate further on it, you must make use of the
- Source IP
- Destination IP &
- Destination Port
You should then check which source is the malicious actor and what destination VM and port is the malicious actor targeting.
If this is some application, you must verify it's behavior from the OS level.
This can be done by collecting a packet capture and see what application/service is initiating this malicious traffic.
Should you feel this is a legitimate traffic, then you can use the Bypass List feature of IDPS to allow only this traffic flow
Refer : https://learn.microsoft.com/en-us/azure/firewall/premium-features#idps-signature-rules
Kindly let us know if this helps or you need further assistance on this issue.
Thanks,
Kapil
Please don’t forget to close the thread by clicking "Accept the answer" wherever the information provided helps you, as this can be beneficial to other community members.