Monitor Activity Log Alert should exist for Delete Network Security Group Rule


Create an activity log alert for the Delete Network Security Group Rule event. Monitoring for Delete Network Security Group Rule events gives insight into network access changes and may reduce the time it takes to detect suspicious activity.

Portal Remediation Steps

  • Navigate to Monitor > Alerts.

  • Select New alert rule.

  • Under Scope, click Select Resource.

  • Select your subscription and click Done.

  • Under Condition, click Select Condition.

  • In the search, enter the term “Delete Security Rule” and select “Delete Security Rule (Microsoft.Network/networkSecurityGroups/securityRules).”

  • Select Done.

  • Under Action group, click Select action group.

  • Select the desired action group to attach to the alert rule, or create one if needed, and click Select.

  • Enter an alert rule name and description.

  • Select a resource group.

  • Click Create alert rule.

CLI Remediation Steps

  • Create a Monitor Activity Log Alert for Delete Network Security Rule, replacing <resource_group_name>, <subscription_id>, and <action_group> with your own values:

az monitor activity-log alert create --name deleteSecurityRule \
  --resource-group <resource_group_name> \
  --condition category="Administrative" and \
  operationName="Microsoft.Network/networkSecurityGroups/securityRules/delete" \
  --scope "/subscriptions/<subscription_id>" \
  --action-group <action_group>