You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Tutorial: View and configure Azure DDoS Protection alerts
@@ -28,7 +28,7 @@ In this tutorial, you'll learn how to:
28
28
29
29
- If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
30
30
- Before you can complete the steps in this tutorial, you must first create a [Azure DDoS Protection plan](manage-ddos-protection.md). DDoS Network Protection must be enabled on a virtual network or DDoS IP Protection must be enabled on a public IP address.
31
-
- DDoS monitors public IP addresses assigned to resources within a virtual network. If you don't have any resources with public IP addresses in the virtual network, you must first create a resource with a public IP address. You can monitor the public IP address of all resources deployed through Resource Manager (not classic) listed in [Virtual network for Azure services](../virtual-network/virtual-network-for-azure-services.md#services-that-can-be-deployed-into-a-virtual-network) (including Azure Load Balancers where the backend virtual machines are in the virtual network), except for Azure App Service Environments. To continue with this tutorial, you can quickly create a [Windows](../virtual-machines/windows/quick-create-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json) or [Linux](../virtual-machines/linux/quick-create-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json) virtual machine.
31
+
- DDoS Protection monitors public IP addresses assigned to resources within a virtual network. If you don't have any resources with public IP addresses in the virtual network, you must first create a resource with a public IP address. You can monitor the public IP address of all resources deployed through Resource Manager (not classic) listed in [Virtual network for Azure services](../virtual-network/virtual-network-for-azure-services.md#services-that-can-be-deployed-into-a-virtual-network) (including Azure Load Balancers where the backend virtual machines are in the virtual network), except for Azure App Service Environments. To continue with this tutorial, you can quickly create a [Windows](../virtual-machines/windows/quick-create-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json) or [Linux](../virtual-machines/linux/quick-create-portal.md?toc=%2fazure%2fvirtual-network%2ftoc.json) virtual machine.
32
32
33
33
## Configure alerts through portal
34
34
@@ -37,8 +37,8 @@ You can select any of the available Azure DDoS Protection metrics to alert you w
37
37
1. Sign in to the [Azure portal](https://portal.azure.com/).
38
38
39
39
1. In the search box at the top of the portal, enter **Alerts**. Select **Alerts** in the search results.
40
-
41
-
1. Select the **+ Create** on the navigation bar, then select **Alert rule**.
40
+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-page.png" alt-text="Screenshot of Security alert in Microsoft Defender for Cloud.":::
41
+
1. Select **+ Create** on the navigation bar, then select **Alert rule**.
42
42
43
43
1. On the **Create an alert rule** page, Select **+ Select scope**.
44
44
@@ -50,8 +50,8 @@ You can select any of the available Azure DDoS Protection metrics to alert you w
50
50
|--|--|
51
51
|Filter by subscription | Select your Azure subscription. |
52
52
|Filter by resource type | Select **Public IP Address**.|
53
+
| Resource | Select your Public IP address. To select all Public IP addresses in the resource group, select your *resource group*. |
53
54
54
-
1. Select your Public IP address.
55
55
1. Select **Done**, then select **Next: Condition**.
56
56
1. On the **Condition** page, select **+ Add Condition**.
57
57
1. In the *Search by signal name* search box, search and select **Under DDoS attack or not**.
@@ -87,12 +87,12 @@ You can select any of the available Azure DDoS Protection metrics to alert you w
87
87
1. On the *Notifications* tab, under *Notification type*, select **Email/SMS message/Push/Voice**. Under *Name*, enter **myUnderAttackEmailAlert**.
88
88
1. On the *Email/SMS message/Push/Voice* page, select the **Email** check box, then enter the required email. Select **OK**.
89
89
90
-
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-notification.png" alt-text="Screenshot of adding DDoS Protection attack alert action group basics.":::
1. On the *Details* tab, under *Alert rule details*, enter the following information.
98
98
@@ -112,23 +112,101 @@ You can also learn more about [configuring webhooks](../azure-monitor/alerts/ale
112
112
113
113
## Configure alerts through Azure Monitor
114
114
115
-
With these templates, you'll be able to configure alerts for all public IP addresses that you have enabled diagnostic logging on. Hence in order to use these alert templates, you'll first need a Log Analytics Workspace with diagnostic settings enabled. For more information, see [Log Analytics workspace overview](../azure-monitor/logs/log-analytics-workspace-overview.md).
115
+
With these templates, you'll be able to configure alerts for all public IP addresses that you have enabled diagnostic logging on.
116
116
117
+
> [!NOTE]
118
+
> In order to use these alert templates, you'll first need a Log Analytics Workspace with diagnostic settings enabled. For more information, see [Create Log Analytics workspace](alerts.md#create-log-analytics-workspace).
117
119
### Azure Monitor alert rule
118
120
119
-
This Azure Monitor alert rule template will run a query to detect when an active DDoS mitigation is occurring. This indicates a potential attack. Action groups can be used to invoke actions as a result of the alert.
121
+
This Azure Monitor alert rule template will run a query against the diagnostic logs to detect when an active DDoS mitigation is occurring. This indicates a potential attack. Action groups can be used to invoke actions as a result of the alert.
122
+
123
+
#### Create Log Analytics workspace
124
+
125
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
126
+
1. In the search box at the top of the portal, enter **Log Analytics workspace**. Select **Log Analytics workspace** in the search results.
127
+
1. Select **+ Create** on the navigation bar.
128
+
129
+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-log-analytics-workspace.png" alt-text="Screenshot of configuring a log analytics workspace.":::
130
+
131
+
1. On the *Create Log Analytics workspace* page, enter the following information.
132
+
133
+
| Setting | Value |
134
+
|--|--|
135
+
| Subscription | Select your Azure subscription. |
136
+
| Resource Group | Select your Resource group. |
137
+
| Name | Enter **myLogAnalyticsWorkspace**. |
138
+
| Region | Select **East US**. |
139
+
140
+
1. Select **Review + create** and then select **Create** after validation passes.
141
+
1. In the search box at the top of the portal, enter **myLogAnalyticsWorkspace**. Select **myLogAnalyticsWorkspace** in the search results.
142
+
1. Under *Monitoring* in the side tab, select **Diagnostic settings.
143
+
144
+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-diagnostic-settings.png" alt-text="Screenshot of log analytics workspace diagnostic settings.":::
145
+
146
+
1. On the *Diagnostic setting* page, under *Destination details*, select **Send to Log Analytics workspace**.
147
+
1. Enter the following information.
148
+
149
+
| Setting | Value |
150
+
|--|--|
151
+
| Diagnostic setting name | Enter **myDiagnosticSettings**. |
152
+
| Logs | Select **allLogs**. |
153
+
| Metrics | Select **AllMetrics**. |
154
+
| Subscription | Select your Azure subscription. |
For more information, see [Log Analytics workspace overview](../azure-monitor/logs/log-analytics-workspace-overview.md).
160
+
161
+
#### Deploy the template
162
+
163
+
1. Select **Deploy to Azure** to sign in to Azure and open the template.
164
+
165
+
[](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Network-Security%2Fmaster%2FAzure%2520DDoS%2520Protection%2FAlert%2520-%2520DDOS%2520Mitigation%2520started%2520azure%2520monitor%2520alert%2FDDoSMitigationStarted.json)
120
166
121
-
[](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Network-Security%2Fmaster%2FAzure%2520DDoS%2520Protection%2FAlert%2520-%2520DDOS%2520Mitigation%2520started%2520azure%2520monitor%2520alert%2FDDoSMitigationStarted.json)
167
+
:::image type="content" source="./media/manage-ddos-protection/ddos-deploy-alert.png" alt-text="Screenshot of Azure Monitor alert rule template.":::
168
+
169
+
1. On the *Custom deployment* page, under *Project details*, enter the following information.
170
+
171
+
| Setting | Value |
172
+
|--|--|
173
+
| Subscription | Select your Azure subscription. |
174
+
| Resource Group | Select your Resource group. |
175
+
| Region | Select your Region. |
176
+
| Workspace Name | Enter **myLogAnalyticsWorkspace**. |
177
+
| Location | Enter **East US**. |
178
+
179
+
> [!NOTE]
180
+
> *Location* must match the location of the workspace.
181
+
182
+
1. Select **Review + create** and then select **Create** after validation passes.
122
183
123
-
:::image type="content" source="./media/manage-ddos-protection/ddos-deploy-alert.png" alt-text="Screenshot of Azure Monitor alert rule template.":::
124
184
125
185
### Azure Monitor alert rule with Logic App
126
186
127
187
This DDoS Mitigation Alert Enrichment template deploys the necessary components of an enriched DDoS mitigation alert: Azure Monitor alert rule, action group, and Logic App. The result of the process is an email alert with details about the IP address under attack, including information about the resource associated with the IP. The owner of the resource is added as a recipient of the email, along with the security team. A basic application availability test is also performed and the results are included in the email alert.
128
188
129
-
[](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Network-Security%2Fmaster%2FAzure%2520DDoS%2520Protection%2FAutomation%2520-%2520DDoS%2520Mitigation%2520Alert%2520Enrichment%2FEnrich-DDoSAlert.json)
130
189
131
-
:::image type="content" source="./media/manage-ddos-protection/ddos-deploy-alert-logic-app.png" alt-text="Screenshot of DDoS Mitigation Alert Enrichment template.":::
190
+
1. Select **Deploy to Azure** to sign in to Azure and open the template.
191
+
192
+
[](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Network-Security%2Fmaster%2FAzure%2520DDoS%2520Protection%2FAutomation%2520-%2520DDoS%2520Mitigation%2520Alert%2520Enrichment%2FEnrich-DDoSAlert.json)
193
+
194
+
:::image type="content" source="./media/manage-ddos-protection/ddos-deploy-alert-logic-app.png" alt-text="Screenshot of DDoS Mitigation Alert Enrichment template.":::
195
+
196
+
1. On the *Custom deployment* page, under *Project details*, enter the following information.
197
+
198
+
| Setting | Value |
199
+
|--|--|
200
+
| Subscription | Select your Azure subscription. |
201
+
| Resource Group | Select your Resource group. |
202
+
| Region | Select your Region. |
203
+
| Alert Name | Leave as default. |
204
+
| Security Team Email | Enter the required email address. |
205
+
| Company Domain | Enter the required domain. |
206
+
| Workspace Name | Enter **myLogAnalyticsWorkspace**. |
207
+
208
+
1. Select **Review + create** and then select **Create** after validation passes.
209
+
132
210
## View alerts in Microsoft Defender for Cloud
133
211
134
212
Microsoft Defender for Cloud provides a list of [security alerts](../security-center/security-center-managing-and-responding-alerts.md), with information to help investigate and remediate problems. With this feature, you get a unified view of alerts, including DDoS attack-related alerts and the actions taken to mitigate the attack in near-time.
@@ -140,20 +218,36 @@ To view the alerts, open **Defender for Cloud** in the Azure portal and select *
140
218
141
219
:::image type="content" source="./media/manage-ddos-protection/ddos-alert-asc.png" alt-text="Screenshot of DDoS Alert in Microsoft Defender for Cloud." lightbox="./media/manage-ddos-protection/ddos-alert-asc.png":::
142
220
221
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
222
+
1. In the search box at the top of the portal, enter **Microsoft Defender for Cloud**. Select **Microsoft Defender for Cloud** in the search results.
223
+
1. Under *General* in the side tab, select **Security alerts**.
224
+
225
+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-security-alerts.png" alt-text="Screenshot of Security alert in Microsoft Defender for Cloud.":::
226
+
1. To filter the alerts list, select any of the relevant filters. You can optionally add further filters with the **Add filter** option.
227
+
143
228
The alerts include general information about the public IP address that’s under attack, geo and threat intelligence information, and remediation steps.
144
229
145
-
## Validate and test
230
+
## Clean up resources
231
+
You can keep your resources for the next tutorial. If no longer needed, delete the alerts.
232
+
233
+
1. In the search box at the top of the portal, enter **Alerts**. Select **Alerts** in the search results.
234
+
235
+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-rule.png" alt-text="Screenshot of Security alert in Microsoft Defender for Cloud.":::
236
+
237
+
1. Select **Alert rules**.
146
238
147
-
To simulate a DDoS attack to validate your alerts, see [Test with simulation partners](test-through-simulations.md).
239
+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-delete-alert-rules.png" alt-text="Screenshot of Security alert in Microsoft Defender for Cloud.":::
148
240
241
+
1. In the Alert rules page, select your subscription.
242
+
1. Select the alerts created in this tutorial, then select **Delete**.
149
243
## Next steps
150
244
151
245
In this tutorial, you learned how to:
152
246
153
247
- Configure alerts through Azure Monitor
154
248
- Configure alerts through portal
155
249
- View alerts in Microsoft Defender for Cloud
156
-
-Validate and test your alerts
250
+
-View and delete created alerts
157
251
158
252
To learn how to test and simulate a DDoS attack, see the simulation testing guide:
0 commit comments