Skip to main content
Version: v4.15

Set up data access alert notifications in Microsoft Teams

When Cyral detects suspicious activity or a violation of your data policies, it can broadcast alert notifications via messaging and incident management platforms.

To set this up with Microsoft Teams, open the Cyral management console, click Integrations in the sidebar, and click Configure on the Microsoft Teams card.

Create the webhook

  1. In Microsoft Teams, create a channel that will receive alerts from Cyral.

  2. In Microsoft Teams, configure the connector by navigating to Apps: Connectors: Incoming Webhook.

  3. Click Add to a team, then associate the incoming webhook with the channel you created in step 1 and click Set up a connector.

  4. Now, give the webhook agent a name. Additionally, you can set our owl as the image for this agent. Finally, click Create.

  5. Once the webhook is created, you'll be able to copy the URL from the bottom of the same window.

Configure the sidecar with the webhook

  1. Add the webhook retrieved in the previous steps. In the Cyral Management Console, click Integrations and click Configure on the Microsoft Teams card.

  2. Configure the repo of interest to send alerts when accesses to it trigger a policy violation, replacing $CYRAL_CONTROL_PLANE_DOMAIN and $REPO_ID in the following Cyral API command:

curl -H "Content-Type: application/json" -X POST https://$CYRAL_CONTROL_PLANE_DOMAIN/v1/repos/$REPO_ID/conf/analysis -d '{"alertOnViolation":true}'