Skip to main content
Skip table of contents

Server Alert Policies

Overview

It offers alerts regarding system access, detecting instances of server access behavior or the execution of prohibited commands, and delivering real-time alerts. By pre-configuring notification targets (Connections), trigger conditions, and other parameters for each notification type, users can promptly receive notifications for all access behaviors and violations. These alerts can be received through designated channels like Slack, webhooks, and others.

Before subscribing to notifications, we recommend registering the channels you wish to receive notifications in the menu below

  1. Settings > General Settings > Company Management > Channels

QueryPie SAC offers the following six notification types:

  • Server Connection Attempt: Detects server access behavior and sends notifications regarding whether the connection succeeds or fails.

  • Restrict Command: Sends a notification when a predefined restrict command is executed from the server or server group.

  • Specific Command: Sends a notification when a defined specific command is executed.

  • File Transfer (SFTP): Sends a notification when file transfer behavior is detected via SFTP.

  • New Request: Sends an alert when a new approval request is registered.

  • Unusual Login Attempt: Sends a notification when a user login attempt is detected based on the IP band.

Set Up Alert Policies

General Settings > Company Management > Alerts > Create Alert

  1. Navigate to General Settings > Company Management > Alerts menu.

  2. Click the Create Alert button in the upper right corner.

  3. Enter the following information to create an alert:

    1. Name : Provide a name to identify the alert on the screen.

    2. Alert Type : Select the type of alert you wish to create.

    3. Alert Detail : Specify the conditions for the alert to occur. Different trigger conditions can be set for each type.

      1. Alert Trigger Condition : This option is only applicable for Server Connection Attempt and File Transfer (SFTP) types. It enables you to set the conditions for the alert to activate.

      2. Connection : Select a server or server group to receive notifications. Notifications will be dispatched when the specified triggers occur on the selected server or server group. Multiple servers can be selected. If both a specific server and the server group it belongs to are chosen, duplicates will be removed from the notification list.

      3. Command : This setting is exclusively available for the Specific Command type. It allows notifications to be triggered when the specified command is executed. Commands can be entered as keywords or regular expressions.

      4. Message Template : Customize the message content that administrators will receive with the notification. While each type has a default template, you can personalize it using Message Template Variables as needed.

    4. Channel: Select the channel to which notifications should be sent when an event is triggered by the defined condition.

  4. Save your settings by clicking the Ok button.

You will then observe that a new alert has been registered. Henceforth, whenever the trigger conditions defined in the alert are met, a notification will be dispatched to the designated channel.

Alert Policy Example

You can configure alerts to be sent when predefined actions occur, such as server access and command execution. On the Create Alert screen, set up an alert policy with the following conditions:

  • Alert when a user attempts to connect to your server and fails:

    • Alert Type : Server Connection Attempt

    • Alert Trigger Condition : Failure Check Only

  • Alert when users execute certain predefined commands:

    • Alert Type : Specific Command

    • Command : Specify the commands (e.g., rm, ls)

  • Alert when a user downloads a file via SFTP:

    • Alert Type : File Transfer (SFTP)

    • Alert Trigger Condition : File Download Only

  • Alert for unusual login attempts (e.g., 3 failed authentication attempts in 5 minutes):

    • Alert Type : Unusual Login Attempt

    • Action Count : 3

    • Specific Time Interval (Minutes) : 5

Alert Logs

General Settings > Company Management > Alerts > Logs

  1. From the Settings menu, navigate to General Settings > Company Management > Alerts menu.

  2. Select the specific alert for which you want to view the history of sent alerts.

  3. Navigate to the Details tab to access the alert history.

  4. Alternatively, you can check the Logs tab to review the history of alerts sent.

Related Topics

 

Back to Server Access Policies

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.