Create an Alert Rule

Before you begin

In order to send alerts to Datadog, the following information is required:

  • Datadog account

  • API Key

Tip

Procedure


Step 1

In the Security Cloud Control platform menu, choose Products > Multicloud Defense .

Step 2

Navigate to System and Accounts > Service Alerts > Alert Rules.

Step 3

Click Create.

Step 4

Profile Name - Enter unique name for the integration. Example multicloud defense-Datadog-alert-rule.

Step 5

Description (optional) - Enter a description for the alert rule.

Step 6

Alert Profile - Using the pulldown, choose a PagerDuty Alert Profile. As example, select profile created above multicloud defense-Datadog-profile.

Step 7

(Optional)Description - Enter a description for the aler trule.

Step 8

Alert Profile - Expand the drop-down menu and select a Microsoft Teams alert profile.

Step 9

Type - Expand the drop-down menu and select one of the following types:

  • System Logs

  • Audit Logs

  • Discovery

If you select Audit Logs, there are no other configurable items. Click Save to finalize the rule.

Step 10

If you select either System Logs or Discovery as your Type, then expand the Sub Type drp-down menu and select one of the following options:

  • Gateway

  • Account

  • Controller

Step 11

Expand the Severitydrop-down menu and select one of the following labels. Note that the options below are dependent on the Type you selected in step 7.

  • Info

  • Warning

  • Medium

  • High

  • Critical

Step 12

Enabled - This option is checked by default to enable and implement this alert immediately after saving. Unceck this box if you do not to immediately apply the rule to your environment.

Step 13

Click Save.