This guide will walk you through the process of configuring security monitoring in the Security Center. By following these steps, you can ensure that your system is effectively protected against potential threats.

Step 1: Accessing the Security Center

To begin, you need to access the Security Center. Click on the "Security Center" icon on your dashboard or navigate to /security-center in your web browser.

Step 2: Navigating to the Monitoring Configuration

Once inside the Security Center, locate the "Monitoring" section. Click on it to expand the options, and then select "Configure Security Monitoring".

Step 3: Setting Up Monitoring Policies

Monitoring policies define the rules and settings for how your system will monitor for potential threats. Here's a quick overview:

  • Policy Name: Give your policy a descriptive name.
  • Include: Specify what parts of your system should be monitored.
  • Exclude: If needed, define any components that should be excluded from monitoring.
  • Severity Levels: Set the severity levels for different types of threats.

Step 4: Alert Settings

Alert settings allow you to define how and when you will be notified about potential threats. Here are the key options:

  • Alert Methods: Choose how you want to be notified (e.g., email, SMS).
  • Notification Frequency: Set how often you want to receive alerts.
  • Threshold Levels: Define the thresholds at which an alert will be triggered.

Step 5: Testing and Reviewing

After setting up your monitoring policies and alert settings, it's important to test them. Run a simulation to ensure that everything is working as expected. Additionally, regularly review your monitoring setup to ensure it remains effective.

Security Monitoring Dashboard

For more detailed information on security monitoring and best practices, check out our comprehensive guide on /security-center/docs/security-monitoring-best-practices.


By following these steps, you can effectively configure security monitoring in your Security Center. Remember to regularly review and update your settings to ensure the ongoing security of your system.