Skip to content

Commit 2c726aa

Browse files
committed
created new steps for configuring alerts. created screenshots. Created clean up resources.
1 parent a6f4ad8 commit 2c726aa

8 files changed

+110
-16
lines changed

articles/ddos-protection/alerts.md

Lines changed: 110 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: article
99
ms.tgt_pltfrm: na
1010
ms.custom: ignite-2022
1111
ms.workload: infrastructure-services
12-
ms.date: 01/10/2023
12+
ms.date: 01/11/2023
1313
ms.author: abell
1414
---
1515
# Tutorial: View and configure Azure DDoS Protection alerts
@@ -28,7 +28,7 @@ In this tutorial, you'll learn how to:
2828

2929
- If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
3030
- Before you can complete the steps in this tutorial, you must first create a [Azure DDoS Protection plan](manage-ddos-protection.md). DDoS Network Protection must be enabled on a virtual network or DDoS IP Protection must be enabled on a public IP address.
31-
- DDoS monitors public IP addresses assigned to resources within a virtual network. If you don't have any resources with public IP addresses in the virtual network, you must first create a resource with a public IP address. You can monitor the public IP address of all resources deployed through Resource Manager (not classic) listed in [Virtual network for Azure services](../virtual-network/virtual-network-for-azure-services.md#services-that-can-be-deployed-into-a-virtual-network) (including Azure Load Balancers where the backend virtual machines are in the virtual network), except for Azure App Service Environments. To continue with this tutorial, you can quickly create a [Windows](../virtual-machines/windows/quick-create-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json) or [Linux](../virtual-machines/linux/quick-create-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json) virtual machine.  
31+
- DDoS Protection monitors public IP addresses assigned to resources within a virtual network. If you don't have any resources with public IP addresses in the virtual network, you must first create a resource with a public IP address. You can monitor the public IP address of all resources deployed through Resource Manager (not classic) listed in [Virtual network for Azure services](../virtual-network/virtual-network-for-azure-services.md#services-that-can-be-deployed-into-a-virtual-network) (including Azure Load Balancers where the backend virtual machines are in the virtual network), except for Azure App Service Environments. To continue with this tutorial, you can quickly create a [Windows](../virtual-machines/windows/quick-create-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json) or [Linux](../virtual-machines/linux/quick-create-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json) virtual machine.  
3232

3333
## Configure alerts through portal
3434

@@ -37,8 +37,8 @@ You can select any of the available Azure DDoS Protection metrics to alert you w
3737
1. Sign in to the [Azure portal](https://portal.azure.com/).
3838

3939
1. In the search box at the top of the portal, enter **Alerts**. Select **Alerts** in the search results.
40-
41-
1. Select the **+ Create** on the navigation bar, then select **Alert rule**.
40+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-page.png" alt-text="Screenshot of Security alert in Microsoft Defender for Cloud.":::
41+
1. Select **+ Create** on the navigation bar, then select **Alert rule**.
4242

4343
1. On the **Create an alert rule** page, Select **+ Select scope**.
4444

@@ -50,8 +50,8 @@ You can select any of the available Azure DDoS Protection metrics to alert you w
5050
|--|--|
5151
|Filter by subscription | Select your Azure subscription. |
5252
|Filter by resource type | Select **Public IP Address**.|
53+
| Resource | Select your Public IP address. To select all Public IP addresses in the resource group, select your *resource group*. |
5354

54-
1. Select your Public IP address.
5555
1. Select **Done**, then select **Next: Condition**.
5656
1. On the **Condition** page, select **+ Add Condition**.
5757
1. In the *Search by signal name* search box, search and select **Under DDoS attack or not**.
@@ -87,12 +87,12 @@ You can select any of the available Azure DDoS Protection metrics to alert you w
8787
1. On the *Notifications* tab, under *Notification type*, select **Email/SMS message/Push/Voice**. Under *Name*, enter **myUnderAttackEmailAlert**.
8888
1. On the *Email/SMS message/Push/Voice* page, select the **Email** check box, then enter the required email. Select **OK**.
8989

90-
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-notification.png" alt-text="Screenshot of adding DDoS Protection attack alert action group basics.":::
90+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-notification.png" alt-text="Screenshot of adding DDoS Protection attack alert notification page.":::
9191

9292
1. Select **Review + create** and then select **Create**.
9393
1. Select **Next: Details**.
9494

95-
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-details.png" alt-text="Screenshot of adding DDoS Protection attack alert action group basics.":::
95+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-details.png" alt-text="Screenshot of adding DDoS Protection attack alert details page.":::
9696

9797
1. On the *Details* tab, under *Alert rule details*, enter the following information.
9898

@@ -112,23 +112,101 @@ You can also learn more about [configuring webhooks](../azure-monitor/alerts/ale
112112

113113
## Configure alerts through Azure Monitor
114114

115-
With these templates, you'll be able to configure alerts for all public IP addresses that you have enabled diagnostic logging on. Hence in order to use these alert templates, you'll first need a Log Analytics Workspace with diagnostic settings enabled. For more information, see [Log Analytics workspace overview](../azure-monitor/logs/log-analytics-workspace-overview.md).
115+
With these templates, you'll be able to configure alerts for all public IP addresses that you have enabled diagnostic logging on.
116116

117+
> [!NOTE]
118+
> In order to use these alert templates, you'll first need a Log Analytics Workspace with diagnostic settings enabled. For more information, see [Create Log Analytics workspace](alerts.md#create-log-analytics-workspace).
117119
### Azure Monitor alert rule
118120

119-
This Azure Monitor alert rule template will run a query to detect when an active DDoS mitigation is occurring. This indicates a potential attack. Action groups can be used to invoke actions as a result of the alert.
121+
This Azure Monitor alert rule template will run a query against the diagnostic logs to detect when an active DDoS mitigation is occurring. This indicates a potential attack. Action groups can be used to invoke actions as a result of the alert.
122+
123+
#### Create Log Analytics workspace
124+
125+
1. Sign in to the [Azure portal](https://portal.azure.com/).
126+
1. In the search box at the top of the portal, enter **Log Analytics workspace**. Select **Log Analytics workspace** in the search results.
127+
1. Select **+ Create** on the navigation bar.
128+
129+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-log-analytics-workspace.png" alt-text="Screenshot of configuring a log analytics workspace.":::
130+
131+
1. On the *Create Log Analytics workspace* page, enter the following information.
132+
133+
| Setting | Value |
134+
|--|--|
135+
| Subscription | Select your Azure subscription. |
136+
| Resource Group | Select your Resource group. |
137+
| Name | Enter **myLogAnalyticsWorkspace**. |
138+
| Region | Select **East US**. |
139+
140+
1. Select **Review + create** and then select **Create** after validation passes.
141+
1. In the search box at the top of the portal, enter **myLogAnalyticsWorkspace**. Select **myLogAnalyticsWorkspace** in the search results.
142+
1. Under *Monitoring* in the side tab, select **Diagnostic settings.
143+
144+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-diagnostic-settings.png" alt-text="Screenshot of log analytics workspace diagnostic settings.":::
145+
146+
1. On the *Diagnostic setting* page, under *Destination details*, select **Send to Log Analytics workspace**.
147+
1. Enter the following information.
148+
149+
| Setting | Value |
150+
|--|--|
151+
| Diagnostic setting name | Enter **myDiagnosticSettings**. |
152+
| Logs | Select **allLogs**. |
153+
| Metrics | Select **AllMetrics**. |
154+
| Subscription | Select your Azure subscription. |
155+
| Log Analytics Workspace | Select **myLogAnalyticsWorkspace**. |
156+
157+
1. Select **Save**.
158+
159+
For more information, see [Log Analytics workspace overview](../azure-monitor/logs/log-analytics-workspace-overview.md).
160+
161+
#### Deploy the template
162+
163+
1. Select **Deploy to Azure** to sign in to Azure and open the template.
164+
165+
[![Deploy to Azure](../media/template-deployments/deploy-to-azure.svg)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Network-Security%2Fmaster%2FAzure%2520DDoS%2520Protection%2FAlert%2520-%2520DDOS%2520Mitigation%2520started%2520azure%2520monitor%2520alert%2FDDoSMitigationStarted.json)
120166

121-
[![Deploy to Azure](../media/template-deployments/deploy-to-azure.svg)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Network-Security%2Fmaster%2FAzure%2520DDoS%2520Protection%2FAlert%2520-%2520DDOS%2520Mitigation%2520started%2520azure%2520monitor%2520alert%2FDDoSMitigationStarted.json)
167+
:::image type="content" source="./media/manage-ddos-protection/ddos-deploy-alert.png" alt-text="Screenshot of Azure Monitor alert rule template.":::
168+
169+
1. On the *Custom deployment* page, under *Project details*, enter the following information.
170+
171+
| Setting | Value |
172+
|--|--|
173+
| Subscription | Select your Azure subscription. |
174+
| Resource Group | Select your Resource group. |
175+
| Region | Select your Region. |
176+
| Workspace Name | Enter **myLogAnalyticsWorkspace**. |
177+
| Location | Enter **East US**. |
178+
179+
> [!NOTE]
180+
> *Location* must match the location of the workspace.
181+
182+
1. Select **Review + create** and then select **Create** after validation passes.
122183

123-
:::image type="content" source="./media/manage-ddos-protection/ddos-deploy-alert.png" alt-text="Screenshot of Azure Monitor alert rule template.":::
124184

125185
### Azure Monitor alert rule with Logic App
126186

127187
This DDoS Mitigation Alert Enrichment template deploys the necessary components of an enriched DDoS mitigation alert: Azure Monitor alert rule, action group, and Logic App. The result of the process is an email alert with details about the IP address under attack, including information about the resource associated with the IP. The owner of the resource is added as a recipient of the email, along with the security team. A basic application availability test is also performed and the results are included in the email alert.
128188

129-
[![Deploy to Azure](../media/template-deployments/deploy-to-azure.svg)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Network-Security%2Fmaster%2FAzure%2520DDoS%2520Protection%2FAutomation%2520-%2520DDoS%2520Mitigation%2520Alert%2520Enrichment%2FEnrich-DDoSAlert.json)
130189

131-
:::image type="content" source="./media/manage-ddos-protection/ddos-deploy-alert-logic-app.png" alt-text="Screenshot of DDoS Mitigation Alert Enrichment template.":::
190+
1. Select **Deploy to Azure** to sign in to Azure and open the template.
191+
192+
[![Deploy to Azure](../media/template-deployments/deploy-to-azure.svg)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Network-Security%2Fmaster%2FAzure%2520DDoS%2520Protection%2FAutomation%2520-%2520DDoS%2520Mitigation%2520Alert%2520Enrichment%2FEnrich-DDoSAlert.json)
193+
194+
:::image type="content" source="./media/manage-ddos-protection/ddos-deploy-alert-logic-app.png" alt-text="Screenshot of DDoS Mitigation Alert Enrichment template.":::
195+
196+
1. On the *Custom deployment* page, under *Project details*, enter the following information.
197+
198+
| Setting | Value |
199+
|--|--|
200+
| Subscription | Select your Azure subscription. |
201+
| Resource Group | Select your Resource group. |
202+
| Region | Select your Region. |
203+
| Alert Name | Leave as default. |
204+
| Security Team Email | Enter the required email address. |
205+
| Company Domain | Enter the required domain. |
206+
| Workspace Name | Enter **myLogAnalyticsWorkspace**. |
207+
208+
1. Select **Review + create** and then select **Create** after validation passes.
209+
132210
## View alerts in Microsoft Defender for Cloud
133211

134212
Microsoft Defender for Cloud provides a list of [security alerts](../security-center/security-center-managing-and-responding-alerts.md), with information to help investigate and remediate problems. With this feature, you get a unified view of alerts, including DDoS attack-related alerts and the actions taken to mitigate the attack in near-time.
@@ -140,20 +218,36 @@ To view the alerts, open **Defender for Cloud** in the Azure portal and select *
140218

141219
:::image type="content" source="./media/manage-ddos-protection/ddos-alert-asc.png" alt-text="Screenshot of DDoS Alert in Microsoft Defender for Cloud." lightbox="./media/manage-ddos-protection/ddos-alert-asc.png":::
142220

221+
1. Sign in to the [Azure portal](https://portal.azure.com/).
222+
1. In the search box at the top of the portal, enter **Microsoft Defender for Cloud**. Select **Microsoft Defender for Cloud** in the search results.
223+
1. Under *General* in the side tab, select **Security alerts**.
224+
225+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-security-alerts.png" alt-text="Screenshot of Security alert in Microsoft Defender for Cloud.":::
226+
1. To filter the alerts list, select any of the relevant filters. You can optionally add further filters with the **Add filter** option.
227+
143228
The alerts include general information about the public IP address that’s under attack, geo and threat intelligence information, and remediation steps.
144229

145-
## Validate and test
230+
## Clean up resources
231+
You can keep your resources for the next tutorial. If no longer needed, delete the alerts.
232+
233+
1. In the search box at the top of the portal, enter **Alerts**. Select **Alerts** in the search results.
234+
235+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-rule.png" alt-text="Screenshot of Security alert in Microsoft Defender for Cloud.":::
236+
237+
1. Select **Alert rules**.
146238

147-
To simulate a DDoS attack to validate your alerts, see [Test with simulation partners](test-through-simulations.md).
239+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-delete-alert-rules.png" alt-text="Screenshot of Security alert in Microsoft Defender for Cloud.":::
148240

241+
1. In the Alert rules page, select your subscription.
242+
1. Select the alerts created in this tutorial, then select **Delete**.
149243
## Next steps
150244

151245
In this tutorial, you learned how to:
152246

153247
- Configure alerts through Azure Monitor
154248
- Configure alerts through portal
155249
- View alerts in Microsoft Defender for Cloud
156-
- Validate and test your alerts
250+
- View and delete created alerts
157251

158252
To learn how to test and simulate a DDoS attack, see the simulation testing guide:
159253

1.57 KB
Loading
40.5 KB
Loading
40.5 KB
Loading
37.3 KB
Loading
53.5 KB
Loading
66.9 KB
Loading
91.7 KB
Loading

0 commit comments

Comments
 (0)