Your First Deployment

A deployment is a set of assets from your appliances, agents, hosts, and collectors from your environments. The Deployments page under the Configuration tab in the Alert Logic console allows you to create deployments to monitor and protect your assets. You can create deployments for assets found in your Amazon Web Services and Microsoft Azure cloud platforms, and from other cloud-based or physical Data Centers.

Alert Logic discovers and organizes deployments into a visual topology where you can select the desired levels of protection for your assets. You must choose one of the following levels of coverage for each asset:

  • Unprotected
  • Alert Logic Essentials coverage
  • Alert Logic Professional coverage

Coverage protection levels

Alert Logic Essentials

Alert Logic Essentials coverage provides deployment automation for assets in your AWS or Azure environments, access to continuous asset discovery, and asset visibility for your deployments. Alert Logic continuously tests your environments with vulnerability scanning and cloud configuration scanning to help you detect and remediate exposures.

Alert Logic Professional

Alert Logic Professional coverage provides the capabilities from Essentials, plus access to network intrusion detection, and log and security analytics.

Deployment types

AWS Deployments

Alert Logic supports integrations with several AWS security services. To protect your AWS deployment, you must set up an AWS cross-account role to allow Alert Logic access to your AWS account. The Alert Logic console steps you through IAM role creation. If you have additional requirements for granting third-party access, see AWS Cross-account Role Setup.

For information about AWS deployment configuration, see Amazon Web Services (AWS) Deployment Configuration.

Azure Deployments

Alert Logic supports integration with several Azure services. To protect your Azure deployment, you must create an Role-Based Access Control (RBAC) role in Azure to allow Alert Logic to access your account. For more information about how to configure Azure RBAC role access, see Configure Role-Based Access Control (RBAC) for Microsoft Azure Resources.

For information about Azure deployment configuration, see Microsoft Azure Deployment Configuration.

Data Center Deployments

The Data Center environments are deployments you manually configure. The Data Center page displays the list of appliances, agents, hosts, and log collectors if subscribed to the Professional coverage.

For more information on Data Center deployment configuration, see Data Center Deployment Configuration.

Deployment Creation Overview

After you click the add icon () and select the deployment type you want to add, the Alert Logic console prompts you through the following steps:

  1. Configure third-party access to cloud-based assets (AWS and Azure deployments only)
  2. Discover assets
  3. Add assets
  4. Define the scope of your protection
  5. Schedule scans
  6. Install agents or appliances
  7. Set up log sources

Provide Alert Logic third-party access

When you create an AWS or Azure deployment, you must grant Alert Logic access to your cloud environments for asset discovery and scanning. The access granted Alert Logic provides only the amount of access required to monitor the assets in your cloud environments.

Assets discovery

After you grant Alert Logic access to your cloud account or subscription, Alert Logic automatically discovers its assets. Alert Logic displays the assets discovered in your account in a visual topology diagram. To learn more about topology, see Topology.

If Alert Logic does not discover all your assets, you can add external assets by domain name or IP address.

Add assets

For Data Center deployments, you must manually add assets by network, subnet, domain name, or IP address.

Define your scope of protection

You can define the scope of your protection per network basis. Each network appears within its protected region. Click a region or individual network to set the scan level or leave it unprotected. You also have the option to exclude assets or tags from external scanning, internal scanning, and Network IDS.

Scheduling scans

Alert Logic automatically performs certain scans. You can schedule when and how often you want Alert Logic to scan for new assets or perform vulnerability scans.

Configuration topology overview

This topology diagram provides an overview of your scope of protection. You can see which assets are unprotected, or are scanned at the Essentials or Professional levels.

Installing agents or appliances


Alert Logic provides a single agent that collects data used for analysis, such as log messages and network traffic, metadata, and host identification information. For more information about installing agent installations, see Install the Alert Logic Agent for Linux or Install the Alert Logic Agent for Windows.


If you are configuring a Data Center deployment, you must assign appliances to your networks. Use the Unique Registration Key to assign one or more appliances to each network. For more information about installing a physical appliance or a virtual appliance, see Install and Configure the Alert Logic Virtual Appliance or Install and Configure the Alert Logic Physical Appliance.

Set up log sources

If you have a Professional subscription, you can set up log collection. To add log sources for data you want to collect, see Log Sources.