Skip to content

Commit 454c40e

Browse files
committed
Updated screenshots, reorginized workspace location, updated date.
1 parent a9e262e commit 454c40e

File tree

5 files changed

+14
-14
lines changed

5 files changed

+14
-14
lines changed

articles/ddos-protection/alerts.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: article
99
ms.tgt_pltfrm: na
1010
ms.custom: ignite-2022
1111
ms.workload: infrastructure-services
12-
ms.date: 01/11/2023
12+
ms.date: 01/12/2023
1313
ms.author: abell
1414
---
1515
# Tutorial: View and configure Azure DDoS Protection alerts
@@ -22,7 +22,7 @@ In this tutorial, you'll learn how to:
2222
> * Configure alerts through Azure Monitor
2323
> * Configure alerts through portal
2424
> * View alerts in Microsoft Defender for Cloud
25-
> * Validate and test your alerts
25+
2626

2727
## Prerequisites
2828

@@ -38,15 +38,15 @@ You can select any of the available Azure DDoS Protection metrics to alert you w
3838

3939
1. In the search box at the top of the portal, enter **Alerts**. Select **Alerts** in the search results.
4040

41-
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-page.png" alt-text="Screenshot of creating Alerts.":::
42-
4341
1. Select **+ Create** on the navigation bar, then select **Alert rule**.
4442

43+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-page.png" alt-text="Screenshot of creating Alerts.":::
44+
4545
1. On the **Create an alert rule** page, Select **+ Select scope**.
4646

4747
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-scope.png" alt-text="Screenshot of selecting DDoS Protection attack alert scope.":::
4848

49-
1. Enter or select the following information in the **Select a resource** tab.
49+
1. Select the following information in the **Select a resource** tab.
5050

5151
| Setting | Value |
5252
|--|--|
@@ -60,7 +60,7 @@ You can select any of the available Azure DDoS Protection metrics to alert you w
6060

6161
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-add-condition.png" alt-text="Screenshot of adding DDoS Protection attack alert condition.":::
6262

63-
1. In the **Create an alert rule** page, enter the following information.
63+
1. In the **Create an alert rule** page, enter or select the following information.
6464

6565
| Setting | Value |
6666
|--|--|
@@ -116,13 +116,9 @@ You can also learn more about [configuring webhooks](../azure-monitor/alerts/ale
116116

117117
With these templates, you'll be able to configure alerts for all public IP addresses that you have enabled diagnostic logging on.
118118

119-
> [!NOTE]
120-
> In order to use these alert templates, you'll first need a Log Analytics Workspace with diagnostic settings enabled. For more information, see [Create Log Analytics workspace](alerts.md#create-log-analytics-workspace).
121-
### Azure Monitor alert rule
119+
### Create Log Analytics workspace
122120

123-
This Azure Monitor alert rule template will run a query against the diagnostic logs to detect when an active DDoS mitigation is occurring. This indicates a potential attack. Action groups can be used to invoke actions as a result of the alert.
124-
125-
#### Create Log Analytics workspace
121+
In order to use these alert templates, you'll first need a Log Analytics Workspace with diagnostic settings enabled.
126122

127123
1. Sign in to the [Azure portal](https://portal.azure.com/).
128124
1. In the search box at the top of the portal, enter **Log Analytics workspace**. Select **Log Analytics workspace** in the search results.
@@ -159,6 +155,10 @@ This Azure Monitor alert rule template will run a query against the diagnostic l
159155
1. Select **Save**.
160156

161157
For more information, see [Log Analytics workspace overview](../azure-monitor/logs/log-analytics-workspace-overview.md).
158+
### Azure Monitor alert rule
159+
160+
The Azure Monitor alert rule template will run a query against the diagnostic logs to detect when an active DDoS mitigation is occurring. The alert indicates a potential attack. Action groups can be used to invoke actions as a result of the alert.
161+
162162

163163
#### Deploy the template
164164

@@ -187,7 +187,7 @@ For more information, see [Log Analytics workspace overview](../azure-monitor/lo
187187
### Azure Monitor alert rule with Logic App
188188

189189
This DDoS Mitigation Alert Enrichment template deploys the necessary components of an enriched DDoS mitigation alert: Azure Monitor alert rule, action group, and Logic App. The result of the process is an email alert with details about the IP address under attack, including information about the resource associated with the IP. The owner of the resource is added as a recipient of the email, along with the security team. A basic application availability test is also performed and the results are included in the email alert.
190-
190+
#### Deploy the template
191191

192192
1. Select **Deploy to Azure** to sign in to Azure and open the template.
193193

@@ -218,7 +218,7 @@ There are two specific alerts that you'll see for any DDoS attack detection and
218218
- **DDoS Attack mitigated for Public IP**: This alert is generated when an attack on the public IP address has been mitigated.
219219
To view the alerts, open **Defender for Cloud** in the Azure portal and select **Security alerts**. Under **Threat Protection**, select **Security alerts**. The following screenshot shows an example of the DDoS attack alerts.
220220

221-
:::image type="content" source="./media/manage-ddos-protection/ddos-alert-asc.png" alt-text="Screenshot of DDoS Alert in Microsoft Defender for Cloud." lightbox="./media/manage-ddos-protection/ddos-alert-asc.png":::
221+
:::image type="content" source="./media/manage-ddos-protection/ddos-alert-asc.png" alt-text="Screenshot of DDoS Alert in Microsoft Defender for Cloud." lightbox="./media/manage-ddos-protection/ddos-alert-asc.png":::
222222

223223
1. Sign in to the [Azure portal](https://portal.azure.com/).
224224
1. In the search box at the top of the portal, enter **Microsoft Defender for Cloud**. Select **Microsoft Defender for Cloud** in the search results.
-455 Bytes
Loading
-736 Bytes
Loading
-459 Bytes
Loading
-820 Bytes
Loading

0 commit comments

Comments
 (0)