You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. In the **Create an alert rule** page, enter the following information.
63
+
1. In the **Create an alert rule** page, enter or select the following information.
64
64
65
65
| Setting | Value |
66
66
|--|--|
@@ -116,13 +116,9 @@ You can also learn more about [configuring webhooks](../azure-monitor/alerts/ale
116
116
117
117
With these templates, you'll be able to configure alerts for all public IP addresses that you have enabled diagnostic logging on.
118
118
119
-
> [!NOTE]
120
-
> In order to use these alert templates, you'll first need a Log Analytics Workspace with diagnostic settings enabled. For more information, see [Create Log Analytics workspace](alerts.md#create-log-analytics-workspace).
121
-
### Azure Monitor alert rule
119
+
### Create Log Analytics workspace
122
120
123
-
This Azure Monitor alert rule template will run a query against the diagnostic logs to detect when an active DDoS mitigation is occurring. This indicates a potential attack. Action groups can be used to invoke actions as a result of the alert.
124
-
125
-
#### Create Log Analytics workspace
121
+
In order to use these alert templates, you'll first need a Log Analytics Workspace with diagnostic settings enabled.
126
122
127
123
1. Sign in to the [Azure portal](https://portal.azure.com/).
128
124
1. In the search box at the top of the portal, enter **Log Analytics workspace**. Select **Log Analytics workspace** in the search results.
@@ -159,6 +155,10 @@ This Azure Monitor alert rule template will run a query against the diagnostic l
159
155
1. Select **Save**.
160
156
161
157
For more information, see [Log Analytics workspace overview](../azure-monitor/logs/log-analytics-workspace-overview.md).
158
+
### Azure Monitor alert rule
159
+
160
+
The Azure Monitor alert rule template will run a query against the diagnostic logs to detect when an active DDoS mitigation is occurring. The alert indicates a potential attack. Action groups can be used to invoke actions as a result of the alert.
161
+
162
162
163
163
#### Deploy the template
164
164
@@ -187,7 +187,7 @@ For more information, see [Log Analytics workspace overview](../azure-monitor/lo
187
187
### Azure Monitor alert rule with Logic App
188
188
189
189
This DDoS Mitigation Alert Enrichment template deploys the necessary components of an enriched DDoS mitigation alert: Azure Monitor alert rule, action group, and Logic App. The result of the process is an email alert with details about the IP address under attack, including information about the resource associated with the IP. The owner of the resource is added as a recipient of the email, along with the security team. A basic application availability test is also performed and the results are included in the email alert.
190
-
190
+
#### Deploy the template
191
191
192
192
1. Select **Deploy to Azure** to sign in to Azure and open the template.
193
193
@@ -218,7 +218,7 @@ There are two specific alerts that you'll see for any DDoS attack detection and
218
218
-**DDoS Attack mitigated for Public IP**: This alert is generated when an attack on the public IP address has been mitigated.
219
219
To view the alerts, open **Defender for Cloud** in the Azure portal and select **Security alerts**. Under **Threat Protection**, select **Security alerts**. The following screenshot shows an example of the DDoS attack alerts.
220
220
221
-
:::image type="content" source="./media/manage-ddos-protection/ddos-alert-asc.png" alt-text="Screenshot of DDoS Alert in Microsoft Defender for Cloud." lightbox="./media/manage-ddos-protection/ddos-alert-asc.png":::
221
+
:::image type="content" source="./media/manage-ddos-protection/ddos-alert-asc.png" alt-text="Screenshot of DDoS Alert in Microsoft Defender for Cloud." lightbox="./media/manage-ddos-protection/ddos-alert-asc.png":::
222
222
223
223
1. Sign in to the [Azure portal](https://portal.azure.com/).
224
224
1. In the search box at the top of the portal, enter **Microsoft Defender for Cloud**. Select **Microsoft Defender for Cloud** in the search results.
0 commit comments