Skip to main content

Atlassian Support

  • Apps
  • Documentation
  • Resources
  • Contact us
  • Sign in
  • Sign in
Security and access policies
Security and access policies

Documentation

  • Learn about security solutions and standards
    • How to keep my organization secure?
    • Understand Atlassian Guard
    • Atlassian Guard app and plan availability
    • Supported security protocols for Atlassian cloud apps
  • Configure authentication policies for your organization
    • Understand authentication policies
    • What is a default authentication policy?
    • What is a non-billable policy?
    • Edit authentication settings and members
    • Authentication policy settings for your organizations
    • Automation for authentication policies
      • What is automation for authentication policies?
      • Available automation components for authentication policies
      • Create automation rules for authentication policies
      • Manage automation rules for authentication policies
      • Smart values for authentication policies
      • Available smart values for authentication policies
  • Configure single sign-on for your organization
    • Configure SAML single sign-on
      • Configure SAML single sign-on with an identity provider
      • Configure SAML single sign-on for Okta
      • Configure SAML single sign-on with AD FS
      • Configure SAML single sign-on for portal-only customers
      • Configure SAML single logout for Okta
      • What is SAML single logout?
    • Require users to log in with Google
  • Configure settings for secure user login
    • Manage your password policy
    • Enforce two-step verification
    • Update idle session duration
    • Configure your organization’s login page
    • Set mobile app session expiration
    • Report and track data across your organization
      • Gain insights into app usage and security practices
      • Track storage and move data across apps
      • Export user accounts
        • Export users from a site
        • Export managed accounts
        • Export accounts from domains
      • Track user API tokens in your organization
        • Understand user API tokens
        • View API token activity
        • Revoke user API tokens
    • Manage data residency
      • Understand data residency
      • Move Atlassian app data to another location
      • Moving your Marketplace apps data to another location
    • Maintain secure access to apps
      • Specify IP addresses for app access
      • Manage your organization's Marketplace and third-party apps
      • Manage third-party contacts
      • Monitor MCP server activity
      • Mobile App Management for Atlassian mobile apps
        • Security settings in a mobile app policy
        • Create a mobile app policy
        • Edit a mobile app policy
        • Delete a mobile app policy
        • Test a mobile app policy
        • What will my users experience when I set a mobile policy?
      • Mobile Device Management (MDM) for Atlassian mobile apps
        • Create an AppConfig JSON string for iOS
        • What are the AppConfig settings for my MDM?
        • MDM security controls and supported apps
      • What happens when installed apps access third-party websites?
    • Classify your organization’s data
      • What is data classification?
      • What can users classify?
      • Manage classification levels
        • Create a classification level
        • Customize a classification level
        • Publish a classification level
        • Archive a classification level
        • Restore a classification level
      • Understand default classification levels
        • What is a default data classification level?
        • Set a default data classification level
    • Control how users outside your organization access apps
      • Understand external user security
        • Who are external users?
        • What is external user security?
        • What is an external user security policy?
        • What is API token access?
        • Available external user security policy settings
      • Edit external user security settings
        • Add test policy
        • Edit external user policy
        • Apply authorization method
        • Block user API token access
        • Control email content and notifications
        • Reset sessions for external users
        • Export external users
        • Make external user policy non-billable
        • Update session expiration
    • Detect, investigate, and respond to threats
      • What is Guard Detect?
      • Add Guard Detect to your organization
      • Add people to Guard Detect
      • Manage detections
        • What user activity is detected?
        • What sensitive data is detected?
        • Exclude a page from a detection
        • Exclude a user from a detection
        • Create a custom detection
        • Request a new system detection
      • Manage alerts
        • View an alert
        • Get more or fewer alerts
        • Track the status of an alert
      • Send alerts to your own tools
        • Send alerts to Slack
        • Send alerts to Microsoft Teams
        • Send alerts to a SIEM or other tool
        • Send alerts to Jira
        • Send alerts to Opsgenie
        • Send alerts to Splunk
      • Investigate and remediate an alert
      • Respond to alerts
        • Create an automation rule
        • How does automation work with Guard Detect?
        • Redact sensitive data from Confluence
        • Redact sensitive data from Jira
        • What happens when data is redacted?
      • Guard Detect frequently asked questions
    • Manage your encryption
      • Use Customer-managed keys (CMK) encryption
        • What is CMK encryption?
        • Set up AWS account and create a KMS key policy
        • Enroll in CMK encryption policy
        • Set up CMK-enabled Atlassian apps
        • Update AWS KMS key policy for your Atlassian cloud organization
        • Revoke Atlassian access to your KMS encryption keys
        • Restore access to your CMK encryption keys
        • Request CMK re-encryption
      • Use Bring Your Own Key (BYOK) encryption
        • What is BYOK encryption?
        • Set up an AWS account and create an IAM role
        • Set up BYOK encryption
        • Revoke access to your BYOK encryption keys
        • Restore access to your BYOK encryption keys
        • Request BYOK re-encryption
        • BYOK encryption limitations
      • Data managed with encryption
      • Encryption frequently asked questions
    • Monitor and audit activity in your organization
      • What activities does the audit log include?
      • View audit log activities
      • Audit log activities database
      • Export audit log
      • User-created activity settings
      • Send audit log activities to another tool using webhooks
    • Secure your organization's data
      • What is a data security policy?
      • Create a data security policy
      • Edit a data security policy
      • Deactivate or delete a data security policy
      • Manage data security policy rules
        • Prevent data export
        • Prevent public links
        • Prevent anonymous access
        • Block Marketplace and custom app access
        • Marketplace and custom app access rule coverage summary
        • What cannot be blocked by the Marketplace and custom app access rule
        • Marketplace and custom app access rule coverage summary for Confluence Cloud
        • Marketplace and custom app access rule coverage summary for Jira Cloud
    1. Atlassian Support
    2. Security and access policies Resources
    3. Detect, investigate, and respond to threats

    Send alerts to your own tools

    Make alerts available where your team works by integrating Guard Detect with Slack, Microsoft Teams, Splunk, your SIEM, or other tool.

    This can improve the time to investigation for your team members, and reduce the risk that alerts go unseen.

    • Send alerts to Slack

      Send alerts to Slack so your team can react quickly.

    • Send alerts to Microsoft Teams

      Send alerts to Microsoft Teams so your team can react quickly.

    • Send alerts to a SIEM or other tool

      Send alerts to your team’s security information and event management (SIEM) tool.

    • Send alerts to Jira

      Send alerts to Jira or Jira Service Management for action by your team.

    • Send alerts to Opsgenie

      Send alerts to Opsgenie for incident management and on-call rosters.

    • Send alerts to Splunk

      Configure the Splunk app to send alerts directly to Splunk.

    Was this helpful?

    Still need help?

    The Atlassian Community is here for you.
    Ask the Community
    • Explore more
    • Send alerts to Slack
    • Send alerts to Microsoft Teams
    • Send alerts to a SIEM or other tool
    • Send alerts to Jira
    • Send alerts to Opsgenie
    • Detect, investigate, and respond to threats
    • Manage detections
    • Manage alerts
    • Send alerts to your own tools

    • Investigate and remediate an alert
    • Respond to alerts
    CommunityQuestions, discussions, and articles
    Atlassian Logo
    • Accessibility
    • Notice at Collection
    • Privacy Policy
    • Terms of Use
    • Security
    • 2025 Atlassian