Azure Arc for Security Engineers

Azure Arc for Security Engineers

This article is contributed. See the original author and article here.

Azure Arc and the Azure control plane enables Security Engineers to take care of Cloud Governance and make sure that their hybrid and multi cloud environment are configured in a secure and compliant state. 
In this blog post, we are going to have a look at Azure Arc for Security Engineers. Azure Arc allows you to extend Azure management and Azure services to anywhere. Meaning that you can manage and govern resources running across hybrid and multi cloud environments, and bring services such as Azure SQL Database and Azure PostgreSQL Hyperscale to your on-premise datacenter, edge location, or other cloud providers. Since Azure Arc can help in many different scenarios. I wanted to summarize how Security Engineers, IT Administrators, IT Operators can take advantage of Azure Arc.


 


Azure Arc


Azure Arc simplifies governance and management by delivering a consistent multi-cloud and on-premises management platform. Azure Arc enables you to manage your entire environment, with a single pane of glass, by projecting your existing resources into Azure Resource Manager. You can now manage virtual machines, Kubernetes clusters, and databases as if they are running in Azure. Regardless of where they live, you can use familiar Azure services and management capabilities. Azure Arc enables you to continue using traditional ITOps, while introducing DevOps practices to support new cloud-native patterns in your environment.


Azure Arc Management OverviewAzure Arc Management Overview


This provides you with a single control plane for your hybrid and multicloud environment.


 


Azure Arc for Security Engineers


Let’s have a look at some key Azure Arc scenarios for Security Engineers.


 


Use the Azure Portal to gain central visibility


In hybrid and multicloud environments, it can be difficult for Security Engineers to get a central view of all the resources they need to manage. Some of these resources are running in Azure, some on-premises, at branch offices, or even at other cloud providers. By connecting resources to the Azure Resource Manager using Azure Arc, Security Engineers can get central visibility of a wide range of resources including Windows and Linux servers, SQL server, Kubernetes clusters, and Azure services running in Azure and outside of Azure.


Azure Arc and Azure resources in the Azure PortalAzure Arc and Azure resources in the Azure Portal


Organization and Inventory


The single control plane using Azure Resource Manager lets you organize and inventory assets through a variety of Azure scopes, such as management groups, subscriptions, resource groups, and tags.


Azure Arc TaggingAzure Arc Tagging


 


Azure Resource Graph


Establish central visibility in the Azure portal and enable multi-environment search with Azure Resource Graph. This allows you to run queries against the Azure resource graph and provide you with a centralized view of all your resources running in Azure and outside of Azure.


 


Manage Access


As a Security Engineer, you want to make sure that only people who need to have access can access to these systems. You can delegate access and manage security policies for resources using role-based access control (RBAC) in Azure. With Azure Arc enabled servers, we are seeing customers removing the local access for administrators and only provide them access to the system in the Azure portal using Azure Arc and Azure Management services. If you run in multiple environments and tenants, Azure Arc also integrated perfectly in Azure Lighthouse. Azure Lighthouse is especially interesting for managed services providers.


Role-based Access ControlRole-based Access Control


 


Update Management


As a Security Engineer, one of your jobs is to make sure that all the systems have the latest updates and patches installed to protect against vulnerabilities. Often customers spend hours orchestrating or deploying patched or building automation for their patch management. With Update Management you can manage operating system updates for your Windows and Linux servers. It allows you to schedule and automate patching for your servers.


Update ManagementUpdate Management


 


Monitoring


You do not just want to manage your systems; you also want to monitor them and make sure that you get alerted in case anything is happening which you disrupted your environment and applications. You can monitor your Kubernetes clusters and containers, Linux, and Windows Servers. Azure Monitor provides you with monitoring guest operating system performance and discover application components to monitor their processes and dependencies with other resources the application communicates using VM insights.


MonitoringMonitoring


One of the great features in Azure Monitor which can help Security Engineers is the Microsoft Dependency agent. This provides you with information about the incoming and outgoing connections to a specific server.


 


Azure Monitor MapAzure Monitor Map


 


Log collection and analytics


Log collection and analytics can be very helpful to a Security Engineer in many ways. With Azure Log Analytics you can collect, sort, filter, and analyze your logs centrally. It allows Security Engineers to get a central view of all the security logs of the systems they manage. These logs can also be used for thread hunting using Azure Sentinel.


Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution. Azure Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response.


 


Change Tracking and Inventory


With change tracking and inventory, you can get an overview of the changes happening in your environment and get an inventory of software installed on your Windows and Linux servers.


Change Tracking and InventoryChange Tracking and Inventory


 


Certificate Management


You might have managed certificates on your servers using Active Directory and Group Policies for your local environment. In hybrid cloud or mutlicloud environments, servers are often not even domain joined. That can make managing certificates a challenge. With a combination of the Azure AD Managed Identity assigned by the Azure Arc agent and Azure Key Vault you can easily and securely deploy and manage certificates to your Windows and Linux servers.


 


Security Center


Making sure that your servers and Kubernetes clusters are secured is often a challenging task, especially in a hybrid or multicloud environment. With Azure Security Center you get threat detection and proactively monitor for potential security threats for your Azure Arc resources. It allows you to deploy Azure Defender for servers and Azure Defender for Kubernetes to your hybrid and multicloud resources.


Security CenterSecurity Center


 


Get compliance state


As an IT Pro you want to know if your servers or Kubernetes clusters are compliant with the company policies. Or you are even in charge to make sure that all your systems are configured correctly and secure. This is where Azure Policy Guest Configuration on your Azure Arc enabled servers can help you to make sure that everything is compliant.


Azure PolicyAzure Policy


 


Next steps




  • Learn more about Arc enabled servers, see the following overview




  • Learn more about Arc enabled Kubernetes, see the following overview




  • Learn more about Arc enabled data services, see the following overview




  • Experience Arc enabled services from the Jumpstart proof of concept




Also, check out my video on how to manage your hybrid cloud using Azure Arc on Microsoft Channel 9.


 


https://channel9.msdn.com/Shows/IT-Ops-Talk/Manage-your-hybrid-cloud-environment-using-Azure-Arc/player?WT.mc_id=modinfra-23498-thmaure


 


Conclusion


Azure Arc enables Security Engineers and others with the right tooling to manage and operate hybrid and multicloud resources such as Windows and Linux servers, Kubernetes clusters, and other resources. If you have any questions, feel free to leave a comment below.


 

New alert page for Microsoft 365 Defender incident detections!

New alert page for Microsoft 365 Defender incident detections!

This article is contributed. See the original author and article here.

Microsoft 365 Defender automatically expands incidents to tell the full story of an attack.


 


It does this by leveraging the unique position which enables it to look across workloads and automatically expand the incident story, after all malicious activities are not generated in a void – there is something out there, logged by another workload, which can add insights. And this is exactly what we are doing in Microsoft 365 Defender; generating incidents based on other alerts that are triggered from the different detection sources, like, MDE, MDO, MDI and MCAS.


 


We are excited to introduce a new alert page for these detections. The new page provides additional, enriched information providing greater context into an attack. Security professionals can now see which other triggered alert caused the current alert and all the affected entities and activities involved in the attack, including files, users and mailboxes.


Idan_Pelleg_1-1620894127026.png


 


For example; an alert from Microsoft Defender for Office 365 might imply that a user’s credentials have been stolen. Once the alert is triggered, Microsoft 365 Defender will automatically search for other activities within the organization that are related to this user. This could include a mass data read event within several minutes of the credentials being breached.


 


Opening or viewing a large number of files may not be an indicator of a breach on its own but with the context of the credential theft alert it becomes a major concern. Microsoft 365 Defender recognizes the related context of these activities and the risk that an attacker is accessing large amounts of user data.


Using these alerts, the security analyst can see which files have been accessed, and in which applications and directories. They can also see the alerts and the relevant context. All of this information is correlated into a single incident that would also include other relevant alerts showing lateral movement, persistence, or further infiltration related to the same attack. With this breadth and depth of visibility the SOC can respond quickly and holistically across the entire attack from a single dashboard.


Microsoft 365 Defender leverages AI to automatically expand an investigation, just like an experienced analyst would. This allows your SOC team to focus on what matters: keeping your organization safe.


 


To learn more about incident in Microsoft Threat Protection go to the following links:



 

Microsoft Teams Community Call – May 2021

Microsoft Teams Community Call – May 2021

This article is contributed. See the original author and article here.

Recording of the Microsoft Teams monthly community call from May 18, 2021.


 


teams-18th-recording-promo.png


 


Call Summary


Latest news from Microsoft engineering on Microsoft Teams updates and community assets.     


 


Register for Microsoft Build.   Sign up for May trainings on Sharing-is-caring.   Visit the Microsoft Teams samples gallery to get started with Microsoft Teams development.  See the new Microsoft 365 Extensibility look book gallery co-developed by Microsoft Teams and Sharepoint engineering.  Get the Microsoft Teams Toolkit (Controls) – “Designing your Microsoft Teams app” with layout guidance and reusable assets.   Three great demos delivered during this session.  The host of this call was Vesa Juvonen (Microsoft) | @vesajuvonen. Q&A takes place in chat throughout the call.


 


 


Actions:  


 



  • Register for Microsoft Build, May 25 – 27, 2021 – https://build.microsoft.com

  • Register for Sharing is Caring Events:

    • First Time Contributor Session – May 24th (EMEA, APAC & US friendly times available)

    • Community Docs Session – May

    • PnP – SPFx Developer Workstation Setup – June 

    • PnP SPFx Samples – Solving SPFx version differences using Node Version Manager – May 20th

    • AMA (Ask Me Anything) – Microsoft Graph & MGT – June 8

    • AMA (Ask Me Anything) – Teams Dev – June

    • First Time Presenter – May 25th

    • More than Code with VSCode – May 27th  

    • PnP Office Hours – 1:1 session – Register



  • Download the recurrent invite for this call – https://aka.ms/microsoftteamscommunitycall

  • Call attention to your great work by using the #PnPWeekly on Twitter.


 


Microsoft Teams Development Samples:  (https://aka.ms/teams-samples)




  • Your community is looking for Samples!  Please share your good work  




 


210518-together-mode.gif


 


Always a highlight to see you here.  Enjoy Microsoft Build.  Looking forward to seeing you in person at an event one day.           


 


Demos delivered in this session




  • Introduction to Microsoft Teams Developer Portal – Meet the new and improved app management console for developers.  Access the tools portal from a browser and from within Microsoft Teams client.   This is the place to add – register and configure your Teams apps.  New safeguards to prevent apps from having same app IDs.   Key areas differentiating portal from App Studio called out.  Access App Source from portal. 




  • Elevate user experiences with Universal Actions on Teams and Outlook – deck, demo and documentation about consistent message (action) handling across apps (Teams, Outlook and more) using Adaptive Cards with the new Action.Execute action type.  User takes action on either Teams or Outlook and action is reflected on the other platform.    Vacation approval scenario shows contextual views and sequential workflows on Teams.  Excellent documentation, quick start guide and code samples.  




  • Getting started on building Microsoft Teams meeting apps – step through meeting extensions – pre-meeting (tab – a poll), in-meeting (side panel tab, pop-up, extension, and bot) and post-meeting (tab).   Understand needed manifest updates.   Microsoft Forms is a great meeting extension.  Demo – create a meeting, add the Forms app to it and observe how Forms does configuration.   Meeting extensions are built on top of tabs, bots and messaging extensions.       




Thank you for your work. Samples are often showcased in Demos.


 


Topics covered in this call



  • News and updates – Vesa Juvonen (Microsoft) | @vesajuvonen – 3:35


  • Demo:  Introduction to Microsoft Teams Developer Portal – Karthig Balendran (Microsoft) | @KarthigBalendr1 – 10:20


    Demo:  Elevate user experiences with Universal Actions on Teams and Outlook – Shiladitya Saha (Microsoft) – 23:30


    Demo:  Getting started on building Microsoft Teams meeting apps – Rick van Rousselt (Advantive) |  @RickVanRousselt – 36:54




 


Resources:


Additional resources around the covered topics and links from the slides.



 


General resources:



Upcoming Calls | Recurrent Invites:


 



 


Microsoft Teams monthly community calls are targeted at anyone who’s interested in Microsoft Teams development topics. This includes Microsoft Teams, Bots, App templates, Samples, and more.  Details on the Microsoft 365 community from http://aka.ms/m365pnp. We also welcome community demos, if you are interested in doing a live demo in these calls!


 


You can download recurrent invite from https://aka.ms/microsoftteamscommunitycall. Welcome and join in the discussion. If you have any questions, comments, or feedback, feel free to provide your input as comments to this post as well. More details on the Microsoft 365 community and options to get involved are available from http://aka.ms/m365pnp.


 


“Sharing is caring”




Microsoft 365 PnP team, Microsoft – 19th of May 2021

[Customer story] PolyU CPCE and Microsoft Hong Kong Launch Virtual Labs for Limitless Learning

This article is contributed. See the original author and article here.

A nice customer success story from Hong Kong.


 


“Azure Lab Services provides more flexibility in classes and allows the faculty to engage better with students. We spoke to students and found they enjoyed their freedom to access hands-on practical experiences more frequently, and they value the time they save by not needing to visit the campus to test or finish their homework. Overall, our students and faculty members are happy with this seamless transition between the physical and virtual learning environments provided by Azure Lab Services.”


 


https://news.microsoft.com/en-hk/2021/04/13/polyu-cpce-and-microsoft-hong-kong-launch-virtual-labs-for-limitless-learning/

How to retrieve analytics information for Pages in the “Site Pages”? using Graph Get itemAnalytics?

This article is contributed. See the original author and article here.

Step 1: Retrieve all the internal SharePoint ids of the all Pages in the “Site Pages” 

 

https://graph.microsoft.com/v1.0/sites('spotenant.sharepoint.com,df6ba610-0000-0000-0000-ba2733d0182e,e0dbcdc6-0637-0000-0000-49aaa1ce4d37')/lists('190b9516-0000-0000-0000-90fe7360d416')/items?select=sharepointids


 


Note: ‘190b9516-0000-0000-0000-90fe7360d416 This is the actual list GUID of your “Site Pages” library.

 

Sample Output:

{


            “@odata.etag”: “”6967cfed-0000-0000-0000-b480c1764375,3″”,

            “sharepointIds”: {

                “listId”: “190b9516-0000-0000-0000-90fe7360d416“,

                “listItemId”: “1”,

                “listItemUniqueId”: “6967cfed-0000-0000-0000-b480c1764375“,

                “siteId”: “df6ba610-0000-0000-0000-ba2733d0182e”,

                “siteUrl”: “https://spotenant.sharepoint.com/sites/TestSite105“,

                “tenantId”: “d6f932a7-0000-00000-0000-b27004970776”,

                “webId”: “e0dbcdc6-0000-0000-0000-49aaa1ce4d37”

            }

        },

 

Step 2: Select any Pages “listItemUniqueId” retrieved in Step 1 and make following call:

 

Note: You need to make sure the site you are requesting has the “Sharepoint Viewers” feature enabled: https://support.microsoft.com/en-us/office/allow-people-to-see-who-views-their-files-or-pages-ee26dde0-c30e-4eca-b1c3-38922c450967. This is required to give you expanded actors or users information. Please see sample out put below:

 

https://graph.microsoft.com/v1.0/sites('spotenant.sharepoint.com,df6ba610-0000-0000-0000-ba2733d0182e,e0dbcdc6-0637-0000-0000-49aaa1ce4d37')/lists('190b9516-0000-0000-0000-90fe7360d416')/items('6967cfed-0000-0000-0000-b480c1764375')/analytics/alltime?$expand=activities


 

Data returned below:

 



{


    “aggregationInterval”“None”,

    “startDateTime”“0001-01-01T00:00:00Z”,

    “endDateTime”“0001-01-01T00:00:00Z”,

    “isTrending”false,

    “access”: {

        actionCount345,

        actorCount6,

        “timeSpentInSeconds”0

    },

    “incompleteData”: {

        “missingDataBeforeDateTime”“2018-09-21T19:20:43Z”,

        “wasThrottled”false,

        “resultsPending”false,

        “notSupported”false

    },

    “activities”: [

        {

            “id”“00000”,

            “activityDateTime”“2021-04-12T17:59:12Z”,

            “location”: {

                “address”: {

                    “city”“”,

                    “countryOrRegion”“”,

                    “postalCode”“”,

                    “state”“”,

                    “street”“”

                }

            },

            “access”: {},

            “actor”: {

                “user”: {

                    “displayName”“Admin SPOTenant”,

                    “email”“admin@spotenant.onmicrosoft.com”,

                    “id”“faaa2e55-0000-0000-0000-c774a83bbbde”,

                    “userType”“Internal”

                }

            }

        },

       
{

            “id”“00001”,

            “activityDateTime”“2020-12-12T01:03:30Z”,

            “location”: {

                “address”: {

                    “city”“”,

                    “countryOrRegion”“”,

                    “postalCode”“”,

                    “state”“”,

                    “street”“”

                }

            },

            “access”: {},

            “actor”: {

                “user”: {

                    “displayName”“Alex Darrow”,

                    “email”“alexd@spotenant.onmicrosoft.com”,

                    “id”“e81cac19-0000-0000-0000-4c938b101a33”,

                    “userType”“Internal”

                }

            }

        }


    ]

}