Security Alerts For Synapse Analytics In Azure Security Center

Security Alerts For Synapse Analytics In Azure Security Center

This article is contributed. See the original author and article here.

What do you do when you receive alert message in Azure Security Center?

 

You can find details about Advanced Threat Protection alerts in following reference document.

https://docs.microsoft.com/en-us/azure/security-center/threat-protection

Following are list of alerts

https://docs.microsoft.com/en-us/azure/security-center/alerts-reference#alerts-sql-db-and-warehouse

 

Background

Azure threat detection is a feature that monitors detects anomalous activities such as unusual successful logins and warns if an unknown or new client IP address is used. Login warning will generate an email and appear on the DW instance Portal.  The unfamiliar login feature uses a two month sliding window looking for unknown IPs.  When a new IP is found, the warning email and portal threat is generated.  The minimal learning period on a new instance, before the first alert is 14 days. 

  • For alerts e.g. Log on by an unfamiliar principal, Log on from an unusual Azure Data Center, Log on from an unusual location, Potential SQL Brute Force attempt

Alert1.png

 

 

Following are some mitigation steps to investigate the access and block it, if it is unauthorized. 

 

  1. You can take immediate action by changing the account password or blocking the IP via the DW server’s firewall rules.  However, this may not be the ideal step if IP address is from azure services or recently configured IP, this may block the service. Azure IP addresses keep frequently changes for security reason. You can get information from following URL.

https://www.microsoft.com/en-us/download/details.aspx?id=41653

 

  1. If the you don’t recognize the IP address, you should check the ISP that owns the IP address via any tool which is allowed to use in your organization. e.g. you can get information of as follows.

 IPLocation.PNG

  1. If the IP address is still unknown, the you can enable Audit Logging, to see the details about queries that IP is submitting. Ref document https://docs.microsoft.com/en-us/azure/sql-data-warehouse/sql-data-warehouse-auditing-overview 

   

  1. If a threat is found, changing the password is required, in addition to adding more restrictive via firewall rules.   
  • For alerts e.g. A possible vulnerability to SQL Injection, Potential SQL injection.

Alert2.png

Following are some steps to investigate which will be helpful to mitigate the alert.

 

  1. You can review auditing logs to understand which query was executed from that IP
  2. Check the queries which were executed near to the time of the alert with query text that appears as parse error.
  3. Application name is displayed in alert, review the code that can cause SQL injection.

Cloud Adoption Framework

This article is contributed. See the original author and article here.

The Cloud Adoption Framework is proven guidance that’s designed to help you create and implement the business and technology strategies necessary for your organization to succeed in the cloud. It provides best practices, documentation, and tools that cloud architects, IT professionals, and business decision makers need to successfully achieve their short- and long-term objectives. https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/overview

 

Also check “Azure Cloud Adoption Framework landing zones for Terraform” https://github.com/Azure/caf-terraform-landingzones

Azure Windows Virtual Desktop Architecture

This article is contributed. See the original author and article here.

This is must to read for everybody who needs to understand WVD – https://www.jasonsamuel.com/2020/03/02/how-to-use-microsoft-wvd-windows-10-multi-session-fslogix-msix-app-attach-to-build-an-azure-powered-virtual-desktop-experience/
Here is also nice infographics about Azure WVD – https://getnerdio.com/wp-content/uploads/2019/05/WVD-Architecture-V2.1.pdf

 

Video Tutorial: Task Sequences Integration – Application Deployment Part 18

This article is contributed. See the original author and article here.

Hello everyone, here is part 18 of a series focusing on Application Deployment in Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer.

 

This session focuses on the new Task Sequence Deployment Type introduced in Configuration Manager current branch 2002.  Demonstrations include how to use the task sequence in various scenarios and demonstrates its use with a basic task sequence example.

 

 

Posts in the series

Go straight to the playlist

Experiencing Data Access and alerting issues for Appplication Insights and Log Analytics

This article is contributed. See the original author and article here.

Initial Update: Monday, 07 September 2020 17:59 UTC

We are aware of issues within Application Insights and Log Analytics and are actively investigating. Some customers may experience Data Access issues, alerting failures or missed alerts and UI loading issues when querying from portal.

  • Next Update: Before 09/07 22:00 UTC

We are working hard to resolve this issue and apologize for any inconvenience.
-Jayadev