MEDIUM
Source
CloudSploit
ID
security-policy-alerts-enabled

Security Policy Alerts Enabled

Ensures Activity Log alerts for create or update Security Policy Rule events are enabled

Monitoring for create or update Security Policy Rule events gives insight into policy changes and may reduce the time it takes to detect suspicious activity.

Follow the appropriate remediation steps below to resolve the issue.

  1. Log into the Microsoft Azure Management Console.

  2. Select the “Search resources, services, and docs” option at the top and search for Alerts. Step

  3. On the “Alerts” page, click on the “Manage alert rules” at the top panel.Step

  4. On the “Rules” page, scroll down the page and check the “Target Resource Type” and check if there is any rules for “Security Policy Alerts”. If there is no “Alerts” configured then “Activity Log Alerts” for the create or update “Security Policy Rule” events are not enabled.Step

  5. Repeat steps number 2 - 4 to check other Azure accounts.

  6. Navigate to the “Alerts” and click on the “New alert rule” at the top.Step

  7. On the “Create rule” page, click on the “Select” option under the “Resources” and search for “Security Policy (policies)” from the “Filter by resource type” and select the “Resource” accordingly.Step

  8. On the “Create rule” page, click on the “Add” option under the “Condition” and select “All Security Operations” from the options and click on the “Done” option at the bottom of the tab.Step

  9. Under the “Actions”, select the “Action group” or “Create action group” accordingly.Step

  10. Enter the “Alert rule name” and “Description” under the “Alert Details” and click on the “Yes” button under the “Enable rule upon creation” to quickly enable the “Security Policy Alerts”. Click on the “Create alert rule” button at the bottom to create a rule.Step

  11. Repeat steps number 6 - 10 to add a new log alert to the Alerts service that monitors for Security Policy Rule create or update events.