Skip to content

Commit a6f4ad8

Browse files
committed
Included screenshots, updated step sytax.
1 parent 0c9d33e commit a6f4ad8

7 files changed

+62
-17
lines changed

articles/ddos-protection/alerts.md

Lines changed: 62 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -36,31 +36,76 @@ You can select any of the available Azure DDoS Protection metrics to alert you w
3636

3737
1. Sign in to the [Azure portal](https://portal.azure.com/).
3838

39-
1. In **Search resources, service, and docs (G+/)**, type **Alerts**. Select **Alerts** from the Marketplace results to open the **Alerts** page.
39+
1. In the search box at the top of the portal, enter **Alerts**. Select **Alerts** in the search results.
4040

4141
1. Select the **+ Create** on the navigation bar, then select **Alert rule**.
4242

43-
1. On the **Create an alert rule** page, you'll see the follow tabs:
43+
1. On the **Create an alert rule** page, Select **+ Select scope**.
4444

45-
- Scope
46-
- Condition
47-
- Actions
48-
- Details
49-
- Tags
50-
- Review + create
51-
52-
For each step, use the values described below:
45+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-scope.png" alt-text="Screenshot of selecting DDoS Protection attack alert scope.":::
46+
47+
1. Enter or select the following information in the **Select a resource** tab.
48+
49+
| Setting | Value |
50+
|--|--|
51+
|Filter by subscription | Select your Azure subscription. |
52+
|Filter by resource type | Select **Public IP Address**.|
53+
54+
1. Select your Public IP address.
55+
1. Select **Done**, then select **Next: Condition**.
56+
1. On the **Condition** page, select **+ Add Condition**.
57+
1. In the *Search by signal name* search box, search and select **Under DDoS attack or not**.
58+
59+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-add-condition.png" alt-text="Screenshot of adding DDoS Protection attack alert condition.":::
60+
61+
1. In the **Create an alert rule** page, enter the following information.
62+
63+
| Setting | Value |
64+
|--|--|
65+
| Threshold | Leave as default. |
66+
| aggregation type | Leave as default. |
67+
| Operator | Select **Greater than or equal to**. |
68+
| Unit | Leave as default. |
69+
| Threshold value | Enter **1**. |
70+
71+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-signal.png" alt-text="Screenshot of adding DDoS Protection attack alert signal.":::
72+
73+
1. Select **Next: Actions** then select **+ Create action group**.
74+
1. in the **Create action group** page, enter the following information.
5375

5476
| Setting | Value |
5577
|--|--|
56-
| Scope | 1) Select **+ Select Scope**. <br/> 2) From the *Filter by subscription* dropdown list, select the **Subscription** that contains the public IP address you want to log. <br/> 3) From the *Filter by resource type* dropdown list, select **Public IP Address**, then select the specific public IP address you want to log metrics for. <br/> 4) Select **Done**. <br/> 5) Select **Next: Condition**. |
57-
| Condition | 1) Select the **+ Add Condition** button <br/> 2) In the *Search by signal name* search box, select **Under DDoS attack or not**. <br/> 3) Leave *Threshold* as default. <br/> 4) From the *Aggregation type* drop-down, select **Maximum**. <br/> 5) From the *Operator* drop-down, select **Greater than or equal to**. <br/> 6) In the *Unit* box, leave as default. <br/> 7) In the *Threshold value* box, enter **1**. For the *Under DDoS attack or not metric*, **0** means you're not under attack while **1** means you are under attack. <br/> 7) Select **Done**. <br/> 8) Select **Next: Actions**. |
58-
| Actions | 1) Select the **+ Create action group** button. <br/> 2) On the **Basics** tab, select your subscription, a resource group. <br/> 3 In the *Action group name* box, enter **myDDoSAlertsActionGroup**. <br/> 4 In the *Display name* box, enter **myDDoSAlerts**. <br/> 5) On the *Notifications* tab, under *Notification type*, select **Email/SMS message/Push/Voice**. <br/> 6) Under *Name*, enter **myUnderAttackEmailAlert**. <br/> 7) On the *Email/SMS message/Push/Voice* page, click the **Email** check box enter the required email. Click **OK**. <br/> 8) Select **Review + create** and then select **Create**. <br/> 9) Select **Next: Details** |
59-
| Details | 1) Under **Severity** select **2 - Warning**. <br/> 2) Under *Alert rule name*, enter **myDDoSAlert**. <br/> 3) Select **Review + create** and then select **Create**. |
78+
| Subscription | Select your Azure subscription. |
79+
| Resource Group | Select your Resource group. |
80+
| Region | Leave as default. |
81+
| Action Group | Enter **myDDoSAlertsActionGroup**. |
82+
| Display name | Enter **myDDoSAlerts**. |
83+
84+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-action-group-basics.png" alt-text="Screenshot of adding DDoS Protection attack alert action group basics.":::
85+
86+
1. Select **Next: Notifications**.
87+
1. On the *Notifications* tab, under *Notification type*, select **Email/SMS message/Push/Voice**. Under *Name*, enter **myUnderAttackEmailAlert**.
88+
1. On the *Email/SMS message/Push/Voice* page, select the **Email** check box, then enter the required email. Select **OK**.
89+
90+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-notification.png" alt-text="Screenshot of adding DDoS Protection attack alert action group basics.":::
91+
92+
1. Select **Review + create** and then select **Create**.
93+
1. Select **Next: Details**.
94+
95+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-alert-details.png" alt-text="Screenshot of adding DDoS Protection attack alert action group basics.":::
96+
97+
1. On the *Details* tab, under *Alert rule details*, enter the following information.
98+
99+
| Setting | Value |
100+
|--|--|
101+
| Severity | Select **2 - Warning**. |
102+
| Alert rule name | Enter **myDDoSAlert**. |
103+
104+
1. Select **Review + create** and then select **Create** after validation passes.
60105

61106
Within a few minutes of attack detection, you should receive an email from Azure Monitor metrics that looks similar to the following picture:
62107

63-
:::image type="content" source="./media/manage-ddos-protection/ddos-alert.png" alt-text="Screenshot of a DDoS Attack Alert." lightbox="./media/manage-ddos-protection/ddos-alert.png":::
108+
:::image type="content" source="./media/manage-ddos-protection/ddos-alert.png" alt-text="Screenshot of a DDoS Attack Alert.":::
64109

65110
You can also learn more about [configuring webhooks](../azure-monitor/alerts/alerts-webhooks.md?toc=%2fazure%2fvirtual-network%2ftoc.json) and [logic apps](../logic-apps/logic-apps-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json) for creating alerts.
66111

@@ -75,15 +120,15 @@ This Azure Monitor alert rule template will run a query to detect when an active
75120

76121
[![Deploy to Azure](../media/template-deployments/deploy-to-azure.svg)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Network-Security%2Fmaster%2FAzure%2520DDoS%2520Protection%2FAlert%2520-%2520DDOS%2520Mitigation%2520started%2520azure%2520monitor%2520alert%2FDDoSMitigationStarted.json)
77122

78-
:::image type="content" source="./media/manage-ddos-protection/ddos-deploy-alert.png" alt-text="Screenshot of Azure Monitor alert rule template." lightbox="./media/manage-ddos-protection/ddos-deploy-alert.png":::
123+
:::image type="content" source="./media/manage-ddos-protection/ddos-deploy-alert.png" alt-text="Screenshot of Azure Monitor alert rule template.":::
79124

80125
### Azure Monitor alert rule with Logic App
81126

82127
This DDoS Mitigation Alert Enrichment template deploys the necessary components of an enriched DDoS mitigation alert: Azure Monitor alert rule, action group, and Logic App. The result of the process is an email alert with details about the IP address under attack, including information about the resource associated with the IP. The owner of the resource is added as a recipient of the email, along with the security team. A basic application availability test is also performed and the results are included in the email alert.
83128

84129
[![Deploy to Azure](../media/template-deployments/deploy-to-azure.svg)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Network-Security%2Fmaster%2FAzure%2520DDoS%2520Protection%2FAutomation%2520-%2520DDoS%2520Mitigation%2520Alert%2520Enrichment%2FEnrich-DDoSAlert.json)
85130

86-
:::image type="content" source="./media/manage-ddos-protection/ddos-deploy-alert-logic-app.png" alt-text="Screenshot of DDoS Mitigation Alert Enrichment template." lightbox="./media/manage-ddos-protection/ddos-deploy-alert-logic-app.png":::
131+
:::image type="content" source="./media/manage-ddos-protection/ddos-deploy-alert-logic-app.png" alt-text="Screenshot of DDoS Mitigation Alert Enrichment template.":::
87132
## View alerts in Microsoft Defender for Cloud
88133

89134
Microsoft Defender for Cloud provides a list of [security alerts](../security-center/security-center-managing-and-responding-alerts.md), with information to help investigate and remediate problems. With this feature, you get a unified view of alerts, including DDoS attack-related alerts and the actions taken to mitigate the attack in near-time.
41.9 KB
Loading
34.8 KB
Loading
33.4 KB
Loading
58.2 KB
Loading
43 KB
Loading
33.9 KB
Loading

0 commit comments

Comments
 (0)