MEDIUM
Source
CloudSploit
ID
virtual-network-alerts-monitor

Virtual Network Alerts Monitor

Ensures Activity Log Alerts for the create or update and delete Virtual Networks events are enabled

Monitoring for create or update and delete Virtual Networks events gives insight into event changes and may reduce the time it takes to detect suspicious activity.

Follow the appropriate remediation steps below to resolve the issue.

  1. Log into the Microsoft Azure Management Console.

  2. Select the “Search resources, services, and docs” option at the top and search for Alerts. Step

  3. On the “Alerts” page, click on the “Manage alert rules” at the top panel.Step

  4. On the “Rules” page, scroll down the page and check the “Target Resource Type” and check if there is any rules for “Virtual Network Alerts Monitor”. If there are no “Alerts” configured then “Activity Log Alerts” for the create or update and delete “Virtual Networks” events are not enabled.Step

  5. Repeat steps number 2 - 4 to check other Azure accounts.

  6. Navigate to the “Alerts” and click on the “New alert rule” at the top.Step

  7. On the “Create rule” page, click on the “Select” option under the “Resources” and search for “Virtual Network” from the “Filter by resource type” and select the “Resource” accordingly.Step

  8. On the “Create rule” page, click on the “Add” option under the “Condition” and select “All Administrative operations” from the options and click on the “Done” option at the bottom of the tab.Step

  9. Under the “Actions”, select the “Action group” or “Create action group” accordingly.Step

  10. Enter the “Alert rule name” and “Description” under the “Alert Details” and click on the “Yes” button under the “Enable rule upon creation” to quickly enable the “Virtual Network Alerts Monitor”. Click on the “Create alert rule” button at the bottom to create a rule.Step

  11. Repeat steps number 6 - 10 to add a new log alert to the Alerts service that monitors for Virtual Networks create or update and delete events.