🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-104 Domain 5
Domain 5 — Module 2 of 4 50%
25 of 27 overall

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery
Domain 5: Monitor and Maintain Azure Resources Premium ⏱ ~14 min read

Alerts, Insights & Network Watcher

Monitoring data is useless if nobody sees it. Alerts notify the right people when things go wrong. Insights give you pre-built dashboards for VMs and networks. Network Watcher helps you diagnose connectivity issues. Learn to configure all three.

What are Azure Monitor Alerts?

☕ Simple explanation

Alerts are like the smoke detector in your house — they watch for specific conditions and scream when something goes wrong.

You define the condition (“if CPU stays above 90% for 5 minutes”), and Azure Monitor watches for it. When the condition is met, the alert fires and triggers an action group — which is the list of things to do: send an email, call a webhook, create a ticket, or run an Azure Function. You can also create alert processing rules to suppress alerts during maintenance windows.

Azure Monitor alert rules evaluate conditions against monitoring data and trigger notifications or automated responses when conditions are met. Three types exist: metric alerts (threshold-based on numeric metrics), log search alerts (KQL query results), and activity log alerts (subscription-level events). Each alert rule targets a scope (resource, resource group, or subscription) and references an action group for notifications.

Alert processing rules (formerly action rules) modify the behaviour of fired alerts — suppressing notifications during planned maintenance or routing specific alerts to different action groups based on filters.

Types of alert rules

Three alert types for three data sources
Alert TypeData SourceUse Case
Metric alertAzure Monitor metricsCPU above 90%, disk space below 10%, response time above 2 seconds
Log search alertLog Analytics (KQL query)More than 50 failed logins in 1 hour, error count by type, custom patterns
Activity log alertAzure Activity LogVM deleted, resource group created, role assignment changed, service health issue

Alert severity levels:

SeverityLabelTypical Use
Sev 0CriticalProduction down, data loss imminent
Sev 1ErrorFunctionality impacted
Sev 2WarningPotential issue, not yet impacting
Sev 3InformationalNormal but noteworthy event
Sev 4VerboseDetailed diagnostics

Action groups

An action group defines WHO gets notified and HOW. A single action group can have multiple actions:

Action TypeWhat It Does
Email/SMS/Push/VoiceSends notification to a person
Azure FunctionRuns a serverless function
Logic AppTriggers a Logic App workflow
WebhookCalls an external HTTP endpoint
ITSMCreates a ticket in ServiceNow or similar
Automation RunbookRuns an Azure Automation script
Event HubStreams alert data to Event Hubs

An action group can be shared across multiple alert rules. For example, a “Critical Operations Team” action group used by all severity 0 and 1 alerts.

💡 Exam tip: Action groups vs alert processing rules

Action groups define WHO gets notified and HOW (email, SMS, webhook). Alert processing rules control WHEN and WHERE — they can suppress alerts during a maintenance window or add additional action groups based on resource group, severity, or other filters.

Key distinction: action groups are referenced BY alert rules at creation. Alert processing rules are applied AFTER an alert fires and can override the action group behaviour.

Alert processing rules

Alert processing rules (formerly called action rules) let you modify alert behaviour after the alert fires:

Common uses:

  • Suppress alerts during a scheduled maintenance window (e.g., every Saturday 2-6am)
  • Route alerts from a specific resource group to a different action group
  • Add action groups to existing alerts without modifying each alert rule
Real-world: TechCorp's maintenance windows

TechCorp Solutions runs weekly patching every Saturday night. During the 4-hour maintenance window, VMs restart and health probes fail — triggering dozens of alerts. Alex creates an alert processing rule:

  • Scope: Production resource group
  • Filter: Severity 2 and above (Warning, Informational)
  • Action: Suppress notifications
  • Schedule: Every Saturday, 22:00 to 02:00

Critical alerts (Sev 0, Sev 1) still fire and notify the team, but routine warnings during patching are suppressed.

Azure Monitor Insights

Insights are pre-built monitoring experiences for specific resource types:

VM Insights

VM Insights provides:

  • Performance dashboards — CPU, memory, disk, and network trends for individual VMs or across all VMs
  • Dependency mapping — visual map of processes running on VMs and their network connections to other systems
  • Requires: Log Analytics agent or Azure Monitor Agent installed on VMs

Network Insights

Network Insights provides a topology view of your network resources — VNets, subnets, NSGs, load balancers — with health status and metrics overlaid.

Storage Insights

Storage Insights shows performance, capacity, and availability across all storage accounts in a unified view — helping identify accounts approaching limits.

Network Watcher

Network Watcher is a suite of tools for diagnosing Azure networking issues. It must be enabled per region where you have resources.

ToolPurpose
IP flow verifyTests if a packet is allowed or denied by NSG rules between two endpoints
Next hopShows which route table entry a packet will follow
Connection troubleshootTests end-to-end TCP/ICMP connectivity and reports latency
Packet captureCaptures packets on a VM NIC for deep analysis
NSG diagnosticsShows effective NSG rules and whether they allow/deny specific traffic
Connection MonitorOngoing monitoring of connectivity between endpoints (replaces Network Performance Monitor)
TopologyVisual diagram of your network resources
💡 Exam tip: Network Watcher must be enabled per region

Network Watcher is automatically enabled when you create a VNet in a region, but you should verify it exists. It creates a resource group called “NetworkWatcherRG” with a Network Watcher resource per region. Connection Monitor is the replacement for the deprecated Network Performance Monitor — if the exam mentions “continuous monitoring of connectivity between VMs,” the answer is Connection Monitor.

Real-world: Alex uses Connection Monitor

CloudFirst Labs has web servers in East US and a database in West US. Alex sets up Connection Monitor to continuously test TCP connectivity from web servers to the database on port 1433. It runs checks every 30 seconds and alerts via the Operations action group if latency exceeds 100ms or connectivity drops.

When a peering misconfiguration broke connectivity for 5 minutes, Connection Monitor detected it immediately — before any users reported issues.

Question

What is the difference between action groups and alert processing rules?

Click or press Enter to reveal answer

Answer

Action groups define WHO gets notified and HOW (email, SMS, webhook, Azure Function). Alert processing rules control WHEN alerts behave differently — they can suppress alerts during maintenance windows, route alerts to different action groups, or add additional action groups based on filters like resource group or severity.

Click to flip back

Question

What are the three types of Azure Monitor alert rules?

Click or press Enter to reveal answer

Answer

Metric alerts (numeric threshold on Azure metrics), log search alerts (KQL query against Log Analytics), and activity log alerts (subscription-level events like resource creation or deletion). Each type monitors a different data source.

Click to flip back

Question

Which Network Watcher tool tests if traffic between two endpoints is allowed or denied by NSG rules?

Click or press Enter to reveal answer

Answer

IP flow verify. You provide a source VM, destination IP, port, and protocol — it tells you which NSG rule allows or denies the traffic. It's the first tool to use when you suspect NSG rules are blocking traffic.

Click to flip back

Question

What replaced Network Performance Monitor for continuous connectivity monitoring?

Click or press Enter to reveal answer

Answer

Connection Monitor (part of Network Watcher). It provides ongoing monitoring of connectivity between Azure VMs, on-premises machines, and external endpoints. It tests reachability, latency, and topology changes at configurable intervals.

Click to flip back

Knowledge check

Knowledge Check

TechCorp Solutions needs an alert that fires when more than 100 failed login attempts occur in any 1-hour window. Which alert type should Alex create?

Knowledge Check

Meridian Financial needs to suppress all non-critical alerts every Sunday from 00:00 to 06:00 during their maintenance window. What should Alex configure?

Knowledge Check

Alex suspects an NSG rule is blocking traffic from a web server VM to a database VM. Which Network Watcher tool should he use first?

🎬 Video coming soon

← Previous

Azure Monitor: Metrics & Logs

Next →

Azure Backup & Vaults

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.