Sysmon 12.03, SDelete v2.04, WinObj v2.23 and ARM64 releases
This article is contributed. See the original author and article here.
This article is contributed. See the original author and article here.
This article is contributed. See the original author and article here.
In this installment of the weekly discussion revolving around the latest news and topics on Microsoft 365, hosts – Vesa Juvonen (Microsoft) | @vesajuvonen, Waldek Mastykarz (Microsoft) | @waldekm, are joined by Business Apps MVP Serge Luca (a.k.a., Dr. Flow) (Power Platform Associates) | @sergeluca.
Discussed in this session – Serge’s interest in Power Platform, growth in the number of available connectors – application integration, and data storage options. As well, the need for more developer focused patterns and practices was called out.
Regarding data storage, the group more-or-less defined a decision tree. There is product – CDS (free or paid), SQL/Azure, SharePoint, or Hybrid and there are other considerations – licensing, app types, security/permission requirements, data storage costs, and database management. Finally, Serge gives viewers a quick tour of the workflow companion tool he has been developing called BPM.
This episode was recorded on Monday, November 23, 2020.
Did we miss your article? Please use #PnPWeekly hashtag in the Twitter for letting us know the content which you have created.
As always, if you need help on an issue, want to share a discovery, or just want to say: “Job well done”, please reach out to Vesa, to Waldek or to your PnP Community.
Sharing is caring!
This article is contributed. See the original author and article here.
This week, Tiberiu Radu (Azure Stack Hub PM) and I, had the chance to speak with Microsoft MVP Dino Bordonaro from Azure Stack Hub Partner BORDONARO IT. BORDONARO IT is an Azure Stack Hub partner and Preferred SI that focuses on managed services. They are lead by Dino Bordonaro, who is an Azure Stack Hub MVP, and together with his team, they are delivering value to their customers by creating hybrid solutions on Azure and Azure Stack. BORDONARO IT runs the Center of Excellence where they offer Validation as a Service and PoC environments that partners and customers can use.
We created this new Azure Stack Hub Partner solution video series to show how our customers and partners use Azure Stack Hub in their Hybrid Cloud environment. In this series, as we will meet customers that are deploying Azure Stack Hub for their own internal departments, partners that run managed services on behalf of their customers, and a wide range of in-between as we look at how our various partners are using Azure Stack Hub to bring the power of the cloud on-premises.
Links mentioned through the video:
I hope this video was helpful and you enjoyed watching it. If you have any questions, feel free to leave a comment below. If you want to learn more about the Microsoft Azure Stack portfolio, check out my blog post.
This article is contributed. See the original author and article here.
Hi IT Pros,
As you knew it, Ransomware is in aggravated assault mode at this time of year 2020, the joint cybersecurity advisory comes from the Cybersecurity Infrastructure and Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) have just given a serious warning about Ransomware Threat as shown in the following announcement:
Debut in August of 2018, the Ransomware Ryuk gained shocking attention in 2019, Ryuk gangs demanded multi-million-dollar ransoms from victims, among them are companies, hospitals, and local governments. The actors be able to pocket over $61 million just in the US alone, according to FBI’s report.
Check Point, a security software vendor also noted that the gang was attacking on an average of 20 companies every week in the third quarter of 2020.
Sean Gallagher from Sophos Lab, gave us the story about a typical Ryuk and Conti Ransomeware attack.
Multiple instances of the malicious attachment were detected and blocked. But there was one employee who clicked on the link in the email that afternoon, allowing the document to execute print_document.exe—a malicious executable identified as Buer Loader.
By Wednesday morning the actors had obtained administrative credentials and had connected to a domain controller, where they performed a data dump of Active Directory details.
Data dump to an Admin User directory was most likely accomplished using SharpHound, a Microsoft C#-based data “injestor” tool for BloodHound (an open-source Active Directory analysis tool used to identify attack paths in AD environments).
Ryuk ransomware was redeployed and re-launched three more times in short order after each failed attempt, no files were encrypted.
Lesson Learn
You may be worried and wonder how good the MD for Endpoint and MD for Identity could protect your systems from ransomware.
Well, let us bring MD to the test. The most trusted industry test could be AV-Test from the Independent IT-Security Institute, who has been known as the owner of the largest malware database in the world.
The test result table for all products based on protection, performance, usability scores is shown here, value of 6 is the highest score:
https://www.av-test.org/en/antivirus/business-windows-client/windows-10/june-2020/
Now, let us conduct our own test using the MD for Endpoint – Evaluation Lab feature:
with ” known ransomware infection” attack simulation , the following ransomware names are detected and alerted on test machine1:
Click on WannaCrypt ransomware to show the details about malicious file named Llac.exe and how long it stayed before being quarantined (3 minutes and 15 seconds):
Click on Petya ransomware to show detail of malicious file named bdata.bin, it was existed within only 5 seconds and been quarantined:
The ransomware attack overview and its entities are shown in the incident named “Multi-stage incident involving Initial access & Discovery including Ransomware on multiple Endpoints” tree graph,
|
Ransomware Action
|
MD for Endpoint and MD for Identity Alert |
| Malicious services were created on remote servers using the same admin credentials, using WMI Event to drop command payload. | MD for Endpoint Alert: WMI suspicious Event
|
| PowerShell is used to download more malicious payloads.
|
MD for Endpoint Alert |
| Credential theft activity | MD for Identity Alert about overpass the hash attack:
|
| Impersonate action on privilege account and privilege group membership by PowerShell script. | Alert by MD for Identity and displayed in Cloud App Security Portal:
|
| Keyboard hijack activity | Alert by Defender for Endpoint:
|
| Fileless attacks with memory payload. | These activities could be detected by AMSI, Microsoft’s Anti-Malware Scanning Interface, when it inspects the in-memory process. MD for Endpoint raised the alert, details as follow:
|
| Mimikatz was used as a credential theft tool, It was detected and blocked from installation.
Mimikatz files were quarantined. |
Alert by MD for Endpoint
|
| Backdoor activity detected | Alerted by MD for Endpoint:
|
| Ransomware Payload and encryption activities are prevented beforehand. | There is no domain dominant – alert event.
There is no encryption – alert event. |
Ryuk Ransomware Prevention and Protection strategy provided by MD for Endpoint – Threat Analytics.
Microsoft Defender for Endpoint Analytics proposed an analyst report and mitigation (plan) against the Ryuk ransomware. Each of the attack step in Ryuk’s killing chain is mapped to the protection measures which include Antivirus-EDR (MD for Endpoint), Azure ATP (MD for Identity), Multi Factors Authentication MFA, Attack Surface Reduction rules for Office Macro, Windows Host Firewall, and Tamper Protection Security Policy.
The detail of Ryuk attack based on MITRE ATT&CK process is shown in the following image, each Ransomware action step of the attack sequence was mapped to one or multiple counter attack measure:
Mitigations provided by MD for Endpoint – Threat Analytics
If Security Administrators enable EDR and all features of Defender, setup alert notification and completely finish all of the Defender Endpoint and Defender Identity’s remediation plans against each ransomware and malware, then, I guess, our colleagues may have a much better sleep at night, knowing that their systems are safe and well protected from ransomware and other malware threats.
To get to the 100% level of protection your defender strategy should always include Windows 10 Defender Guard (Application Guard, Credential Guard, Exploit Guard with Attack Surface Reduction rules, System Guard, …) together with MD for Endpoint deployed on workstations and servers and MD for Identity applied to all domain controllers.
I hope the info is useful,
Have a valuable time with your Defender!
___________________________________
Reference:
This article is contributed. See the original author and article here.
DigiCert introduced a new CA which reuses the signing key of an existing and still-valid CA. This means there are 2 different CA certificates in circulation, and either can be included in the chain built for a certificate signed by this shared key. Existing certificates declared in Service Fabric clusters by subject with issuer pinning are at risk of spontaneously failing validation.
This issue affects any SF cluster that uses a Cluster certificate that is a DigiCert-issued X509 certificate(s), declared by common name with issuer pinning with the following configuration:
If your cluster is not configured using the above properties, you may disregard the rest of this post.
If you have any questions or concerns, please contact us by opening a support request. In addition, here are your general support options for Service Fabric: Learn about Azure Service Fabric Support options – Azure Service Fabric | Microsoft Docs.
Recent Comments