Create an Alert Rule

Use alert rules to define the policy rule violations within specific cloud accounts that trigger alert notifications to a particular destination.
Alert rules enable you to define the policy violations in a selected set of cloud accounts for which you want to trigger alerts. When you create an alert rule, you select the account groups to which the rule applies and the corresponding set of policies for which you want to trigger alerts. You can add more granularity to the rule by excluding some cloud accounts from the selected account groups, by specifying specific regions for which to send alerts, and even by narrowing down the rule to specific cloud resources identified by resource tags. This provides you with flexibility in how you manage alerts and ensures that you can adhere to the administrative boundaries you defined. You can create a single alert rule that alerts on all policy rules or you can define granular alert rules that send very specific sets of alerts for specific cloud accounts, regions, and even resources to specific destinations.
When you create an alert rule, you can Configure Prisma Cloud to Automatically Remediate Alerts, which enables Prisma Cloud to automatically run the CLI command required to remediate the policy violation directly in your cloud environments. Automated remediation is only available for default policies (Config policies only) that are designated as Remediable ( remediable-icon.png ) on the
Policies
page.
In addition, if you Configure External Integrations on Prisma Cloud with third-party tools, defining granular alert rules enables you to send only the alerts you need to enhance your existing operational, ticketing, notification, and escalation workflows with the addition of Prisma Cloud alerts on policy violations in all your cloud environments. To see any existing integrations, click
Settings
( prisma-cloud-settings.png ) and then select
Integrations
.
  1. Select
    Alerts
    Alert Rules
    and
    +Add New
    alert.
    alerts-alert-rules-add-new.png
  2. Enter an
    Alert Rule Name
    and, optionally, a
    Description
    to communicate the purpose of the rule and then click
    Next
    .
  3. Select the
    Account Groups
    to which you want this alert rule to apply and then click
    Next
    .
    1. Toggle
      View Advanced Settings
      to see advanced settings for setting a target.
    2. Exclude Cloud Accounts
      from your selected Account Group.
    3. Choose your
      Region
      .
    4. Add
      Tags
      to easily manage or identify the type of your resources.
      Tags apply only to
      Config
      and
      Network
      policies.
    5. Click
      Next
      .
  4. (
    Optional
    ) If you want to add more granularity for which cloud resources trigger alerts for this alert rule,
    View Advanced Settings
    and then provide more criteria as needed:
    • Exclude Cloud Accounts
      —If there are some cloud accounts in the selected account groups for which you do not want to trigger alerts, select the accounts from the list.
    • Regions
      —To trigger alerts only for specific regions for the cloud accounts in the selected account group, select one or more regions from the list.
    • Resource Tags
      —To trigger alerts only for specific resources in the selected cloud accounts, enter the
      Key
      and
      Value
      of the resource tag you created for the resource in your cloud environment.
      Tags apply only to
      Config
      and
      Network
      policies. When you add multiple resource tags, it uses the boolean logical OR operator.
    When you finish defining the target cloud resources, click
    Next
    .
    alert-rule-target.png
  5. Select the policies for which you want this alert rule to trigger alerts and, optionally, Configure Prisma Cloud to Automatically Remediate Alerts.
    alert-rule-select-policies.png
    1. Either
      Select All Policies
      or select the specific policies for which you want to trigger alerts on this alert rule.
      If you enable
      Automated Remediation
      , the list of policies shows only Remediable ( remediable-icon.png ) policies
      .
      To help you find the specific group of policies for which you want this rule to alert
      • Filter Results
        —Enter a search term to filter the list of policies to those with specific keywords.
      • Column Picker
        —Click
        Edit
        ( column-picker.png ) to modify columns display.
      • Sort
        —lick the corresponding
        Sort
        icon ( sort-column.png )
      • Column Filter
        —Click the corresponding column
        Filter
        icon ( column-filter.png ) to filter on a specific value in a column. For example, to filter on compliance standards related to NIST, click the filter for the Compliance Standard column, select NIST standards, and then
        Set
        that filter.
        column-filter-menu.png
    2. Click
      Next
      .
  6. By default, all alerts triggered by the alert rule display on the
    Alerts
    page. If you Configure External Integrations on Prisma Cloud, you can also send Prisma Cloud alerts triggered by this alert rule to third-party tools. For example, you can Send Alert Notifications to Amazon SQS or Send Alert Notifications to Jira.
    In addition, you can configure the alert rule to Send Alert Notifications Through Email.
  7. (
    Optional
    ) If you want to delay the alert notifications for Config alerts, you can configure the Prisma Cloud to
    Trigger notification for Config Alert only after the Alert is Open for
    a specific number of minutes.
  8. Save
    the alert rule.
  9. To verify that the alert rule triggers the expected alerts, select
    Alerts
    Overview
    and ensure that you see the alerts that you expect to see there.
    If you configured the rule to Send Prisma Cloud Alert Notifications to Third-Party Tools, make sure you also see the alert notifications in those tools.

Recommended For You