SlideShare a Scribd company logo
A DEMONSTRATION
OF OMS AND
AZURE SECURITY
CENTER
© 2023 StoneFly, Inc. | All rights reserved.
Security in the Cloud OMS Demonstration
How many of you have a centralized pane of glass that tell you, you have
malicious traffic attacks, you have identity and access information that is
there? You have computers with security updates that are missing?. Do you
have all of this in a centralized pane of glass? Or do you have different tools
that you use to find out what’s what? Those are the benefits that you have
with Microsoft’s Operations Management Suite (OMS). We are going
to jump right into a demo, and we are going to go right into Microsoft’s OMS
(Operations Management Suit).
Operations Management Suite (OMS)
Inside of here you have different assessments and analysis that are running
for your organization. Now, because you are using this primarily for cloud
services, you can see that you have preventions and things like that, that are
here to assess your environment. But you also see that you have had a brute
force attack.
Page 1
Security in the Cloud OMS Demonstration
So, you can see that we have a brute force attack, and we also have double
extension files being executed and things like that. So, you have your systems
being attacked at your organization. Now, if we look at the process of how to
diagnose, assess, and things like that, this system, or this platform, is already
starting to diagnose intelligently in the background across all these different
assessments that you see here. So, you have your malware assessment that is
running, you have an update assessment that is running, you have network
security and distinct IP address assessment that is running. You also have
a threat intelligence assessment that is running. This is where it is going to
start to say, here are the malicious IPs in your organization, here is where
they are coming from, here is where you are, and here is where somebody
else is actually controlling your server and that is where we see the malicious
IP coming from. We will walk through this a little bit more in depth.
What To Do Once You Are Breached?
Now that you have been breached, you see that there is a brute force at-
tack or you see that there is a double extension on file. You have to click
into the attack link to find out what is going on, and what server has been
compromised and where things are happening. So, you can clearly see that
you have a domain controller that has been compromised. What happens
when a domain controller is compromised? Or is starting to have brute force
attacks on it? They take control of your entire environment. Right now it is
a warning, but before it becomes compromised, let us go ahead and fix this.
Page 2
Security in the Cloud OMS Demonstration
How Can You Fix It?
What you are going to do here is look at your query and your search results
where it tells you the type of alert and the severity. You want to go ahead
and setup an alert for your entire security team or for your IT team or for
your help desk team. This allows them to know what is happening to your
organization so that they can start to remediate it.
So, you have to click up at the “Alert” tap and you are going to add a
Page 3
Security in the Cloud OMS Demonstration
roll. Then you are going to say, ”We have a brute force attack in play” in
the Name box. Insert in the severity of the attack, then the description and
the time window (How often do I want this to run?). So for example you
want this to run every five minutes, or every two minutes, or wherever you
want that to be. You want the threshold to be greater than zero. So, even if
it happens once where you are being brute forced attacked and it is starting
to hit the system significantly, it lets you know. You also want to setup
an email notification, and this is where you would put your distribution list
of your help desk, of your security team, of your server team, etc. under
”Recipients”. Next you would put in a Webhook and a Webhook can be
used for things like Slack or ServiceNow if you have a help desk. Webhook
will translate and open up an incident, or open up a security incident within
your ITSM solution. What that means is any time you have this as a security
incident, it is recorded and if there is a change that is executed against it that
goes through your change management and service request process. So, you
actually have something that goes and tracks this as a postmortem closed
process as well. Once you have that, then you can also execute a Runbook
behind it. Now this Runbook would give you the automation to go ahead
and fix the issue. Now you have the ability to execute this in Azure only or to
execute this on-premise as well with your hybrid worker. In this demo we are
going to execute this across environments with a hybrid worker. Now in your
”Service Desk Actions”, what this is going to do is give you a connection to
your ServiceNow or your ITSM based solution that will automatically open
up an incident for you.
Page 4
Security in the Cloud OMS Demonstration
So you choose a ”Work Item” and you will choose a security incident.
And as you choose a security incident, you will say hey, how did you find out
about this in the ”Contact Type”. You will select ”the impact, the risk, the
severity, the priority and the category”. This is exactly what has happened,
is that confidential personal data loss, or was it a policy violation, was it a
rogue server or service, things like that. That is when you would go ahead
and save this. Once you save it, it now will tell you any time that there is
a brute force attack that is happening from that environment, you will get a
notification on it.
Now, the other thing that you also have is the ability to go ahead and
look at ”threat intelligence”. So as you are detecting, and as you are going
through your organization, you want to know where malicious traffic events
are. So you are looking at malicious traffic events, and you can see that there
are five botnets that are sitting within your organization, that are coming
from China.
Let’s See How This is Happening
You can see the computer. So, your SharePoint web front end has been
compromised. You can see your local IP, the malicious IP that is controlling
it and then the member of the botnet. You have the ability to set up a rule
on this as well, and then export that to see where things are coming from.
The idea is for you to be able to take different sources of information from
your Security and Audit.
Page 5
Security in the Cloud OMS Demonstration
Page 6
Security in the Cloud OMS Demonstration
Page 7
Security in the Cloud OMS Demonstration
Generally, most environments have separate disparate systems that don’t
have log analytics across the board. This is what gives you that capability
to centralize a lot of those things that you are having multiple people look
at, multiple very smart people look at, from different sources of technology.
It is actually combining that for you so that you have a single common pane
of glass. So that’s the idea.
Azure Security Center
In Azure Security Center, you have the ability to turn on security monitoring
for every single one of your virtual machines, your storage accounts, your
databases, whatever you have. And that will start to tell you, hey, your disk
is not encrypted, so go ahead and take this remediation action. The other
thing that you have in Azure Security Center is you also have the ability to
use third party technologies that are integrated for more protection or for
a remediation of a solution that you have. Those are the things that you
have with Operations Management Suite and Azure Security Center
combined.
Page 8
www.stonefly.com
2865, 2869 and 2879 Grove Way,
Castro Valley, CA 94546 USA.
+1 (510) 265-1616
Ad

More Related Content

Similar to Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azure Security Center (18)

10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
SofiaCarter4
 
Security Hands-On - Splunklive! Houston
Security Hands-On - Splunklive! HoustonSecurity Hands-On - Splunklive! Houston
Security Hands-On - Splunklive! Houston
Splunk
 
Real-time fallacy: how real-time your security really is?
Real-time fallacy: how real-time your security really is?Real-time fallacy: how real-time your security really is?
Real-time fallacy: how real-time your security really is?
Anton Chuvakin
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
SOCVault
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and Compliance
Anton Chuvakin
 
Cyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.comCyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.com
amaranthbeg95
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.com
amaranthbeg55
 
Running Head MALWARE1MALWARE2MalwareName.docx
Running Head MALWARE1MALWARE2MalwareName.docxRunning Head MALWARE1MALWARE2MalwareName.docx
Running Head MALWARE1MALWARE2MalwareName.docx
cowinhelen
 
The 15 best cloud security practices
The 15 best cloud security practices The 15 best cloud security practices
The 15 best cloud security practices
Cloudride LTD
 
The Ultimate Guide For Cloud Penetration Testing.pdf
The Ultimate Guide For Cloud Penetration Testing.pdfThe Ultimate Guide For Cloud Penetration Testing.pdf
The Ultimate Guide For Cloud Penetration Testing.pdf
Craw Cyber Security
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
Acodez IT Solutions
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
IJNSA Journal
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
Dana Gardner
 
SCGOV Report
SCGOV ReportSCGOV Report
SCGOV Report
Colin Harvey
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
Boris Loukanov
 
Recognizing security threats
Recognizing security threatsRecognizing security threats
Recognizing security threats
Kishore Kumar
 
How to recover from your next data breach
How to recover from your next data breachHow to recover from your next data breach
How to recover from your next data breach
SILO Compliance Systems
 
Alienvault how to build a security operations center (on a budget) (2017, a...
Alienvault   how to build a security operations center (on a budget) (2017, a...Alienvault   how to build a security operations center (on a budget) (2017, a...
Alienvault how to build a security operations center (on a budget) (2017, a...
Al Syihab
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
SofiaCarter4
 
Security Hands-On - Splunklive! Houston
Security Hands-On - Splunklive! HoustonSecurity Hands-On - Splunklive! Houston
Security Hands-On - Splunklive! Houston
Splunk
 
Real-time fallacy: how real-time your security really is?
Real-time fallacy: how real-time your security really is?Real-time fallacy: how real-time your security really is?
Real-time fallacy: how real-time your security really is?
Anton Chuvakin
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
SOCVault
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and Compliance
Anton Chuvakin
 
Cyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.comCyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.com
amaranthbeg95
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.com
amaranthbeg55
 
Running Head MALWARE1MALWARE2MalwareName.docx
Running Head MALWARE1MALWARE2MalwareName.docxRunning Head MALWARE1MALWARE2MalwareName.docx
Running Head MALWARE1MALWARE2MalwareName.docx
cowinhelen
 
The 15 best cloud security practices
The 15 best cloud security practices The 15 best cloud security practices
The 15 best cloud security practices
Cloudride LTD
 
The Ultimate Guide For Cloud Penetration Testing.pdf
The Ultimate Guide For Cloud Penetration Testing.pdfThe Ultimate Guide For Cloud Penetration Testing.pdf
The Ultimate Guide For Cloud Penetration Testing.pdf
Craw Cyber Security
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
Acodez IT Solutions
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
IJNSA Journal
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
Dana Gardner
 
SCGOV Report
SCGOV ReportSCGOV Report
SCGOV Report
Colin Harvey
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
Boris Loukanov
 
Recognizing security threats
Recognizing security threatsRecognizing security threats
Recognizing security threats
Kishore Kumar
 
How to recover from your next data breach
How to recover from your next data breachHow to recover from your next data breach
How to recover from your next data breach
SILO Compliance Systems
 
Alienvault how to build a security operations center (on a budget) (2017, a...
Alienvault   how to build a security operations center (on a budget) (2017, a...Alienvault   how to build a security operations center (on a budget) (2017, a...
Alienvault how to build a security operations center (on a budget) (2017, a...
Al Syihab
 

More from MaryJWilliams2 (20)

Veeam Replication in Azure Cloud: Ensuring Business Continuity and Data Prote...
Veeam Replication in Azure Cloud: Ensuring Business Continuity and Data Prote...Veeam Replication in Azure Cloud: Ensuring Business Continuity and Data Prote...
Veeam Replication in Azure Cloud: Ensuring Business Continuity and Data Prote...
MaryJWilliams2
 
Eyes Everywhere: The Power of Body-Worn and Dashboard Cameras
Eyes Everywhere: The Power of Body-Worn and Dashboard CamerasEyes Everywhere: The Power of Body-Worn and Dashboard Cameras
Eyes Everywhere: The Power of Body-Worn and Dashboard Cameras
MaryJWilliams2
 
Guarding Against Ransomware: Strategies for Robust Data Protection
Guarding Against Ransomware: Strategies for Robust Data ProtectionGuarding Against Ransomware: Strategies for Robust Data Protection
Guarding Against Ransomware: Strategies for Robust Data Protection
MaryJWilliams2
 
Data Protection and Disaster Recovery Solutions: Ensuring Business Continuity
Data Protection and Disaster Recovery Solutions: Ensuring Business ContinuityData Protection and Disaster Recovery Solutions: Ensuring Business Continuity
Data Protection and Disaster Recovery Solutions: Ensuring Business Continuity
MaryJWilliams2
 
Exploring Change Block Tracking (CBT): A Game Changer for IT Professionals
Exploring Change Block Tracking (CBT): A Game Changer for IT ProfessionalsExploring Change Block Tracking (CBT): A Game Changer for IT Professionals
Exploring Change Block Tracking (CBT): A Game Changer for IT Professionals
MaryJWilliams2
 
Securing Your Future: Cloud-Based Data Protection Solutions
Securing Your Future: Cloud-Based Data Protection SolutionsSecuring Your Future: Cloud-Based Data Protection Solutions
Securing Your Future: Cloud-Based Data Protection Solutions
MaryJWilliams2
 
Securing the Future: A Guide to Cloud-Based Data Protection
Securing the Future: A Guide to Cloud-Based Data ProtectionSecuring the Future: A Guide to Cloud-Based Data Protection
Securing the Future: A Guide to Cloud-Based Data Protection
MaryJWilliams2
 
Exploring Veeam Backup & Replication for Seamless Business Continuity
Exploring Veeam Backup & Replication for Seamless Business ContinuityExploring Veeam Backup & Replication for Seamless Business Continuity
Exploring Veeam Backup & Replication for Seamless Business Continuity
MaryJWilliams2
 
Integrating OMS and Azure Security Center for Enhanced Cloud Security
Integrating OMS and Azure Security Center for Enhanced Cloud SecurityIntegrating OMS and Azure Security Center for Enhanced Cloud Security
Integrating OMS and Azure Security Center for Enhanced Cloud Security
MaryJWilliams2
 
Erasure Coding: Revolutionizing Data Durability and Storage Efficiency
Erasure Coding: Revolutionizing Data Durability and Storage EfficiencyErasure Coding: Revolutionizing Data Durability and Storage Efficiency
Erasure Coding: Revolutionizing Data Durability and Storage Efficiency
MaryJWilliams2
 
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
MaryJWilliams2
 
Unlocking Efficiency: Exploring Change Block Tracking in Data Management
Unlocking Efficiency: Exploring Change Block Tracking in Data ManagementUnlocking Efficiency: Exploring Change Block Tracking in Data Management
Unlocking Efficiency: Exploring Change Block Tracking in Data Management
MaryJWilliams2
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
MaryJWilliams2
 
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup Appliances
MaryJWilliams2
 
Navigating the Cloud: Empowering Enterprises with Cloud Solutions
Navigating the Cloud: Empowering Enterprises with Cloud SolutionsNavigating the Cloud: Empowering Enterprises with Cloud Solutions
Navigating the Cloud: Empowering Enterprises with Cloud Solutions
MaryJWilliams2
 
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
MaryJWilliams2
 
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
MaryJWilliams2
 
Exploring Software-Defined Storage in Digital Transformation
Exploring Software-Defined Storage in Digital TransformationExploring Software-Defined Storage in Digital Transformation
Exploring Software-Defined Storage in Digital Transformation
MaryJWilliams2
 
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
MaryJWilliams2
 
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
MaryJWilliams2
 
Veeam Replication in Azure Cloud: Ensuring Business Continuity and Data Prote...
Veeam Replication in Azure Cloud: Ensuring Business Continuity and Data Prote...Veeam Replication in Azure Cloud: Ensuring Business Continuity and Data Prote...
Veeam Replication in Azure Cloud: Ensuring Business Continuity and Data Prote...
MaryJWilliams2
 
Eyes Everywhere: The Power of Body-Worn and Dashboard Cameras
Eyes Everywhere: The Power of Body-Worn and Dashboard CamerasEyes Everywhere: The Power of Body-Worn and Dashboard Cameras
Eyes Everywhere: The Power of Body-Worn and Dashboard Cameras
MaryJWilliams2
 
Guarding Against Ransomware: Strategies for Robust Data Protection
Guarding Against Ransomware: Strategies for Robust Data ProtectionGuarding Against Ransomware: Strategies for Robust Data Protection
Guarding Against Ransomware: Strategies for Robust Data Protection
MaryJWilliams2
 
Data Protection and Disaster Recovery Solutions: Ensuring Business Continuity
Data Protection and Disaster Recovery Solutions: Ensuring Business ContinuityData Protection and Disaster Recovery Solutions: Ensuring Business Continuity
Data Protection and Disaster Recovery Solutions: Ensuring Business Continuity
MaryJWilliams2
 
Exploring Change Block Tracking (CBT): A Game Changer for IT Professionals
Exploring Change Block Tracking (CBT): A Game Changer for IT ProfessionalsExploring Change Block Tracking (CBT): A Game Changer for IT Professionals
Exploring Change Block Tracking (CBT): A Game Changer for IT Professionals
MaryJWilliams2
 
Securing Your Future: Cloud-Based Data Protection Solutions
Securing Your Future: Cloud-Based Data Protection SolutionsSecuring Your Future: Cloud-Based Data Protection Solutions
Securing Your Future: Cloud-Based Data Protection Solutions
MaryJWilliams2
 
Securing the Future: A Guide to Cloud-Based Data Protection
Securing the Future: A Guide to Cloud-Based Data ProtectionSecuring the Future: A Guide to Cloud-Based Data Protection
Securing the Future: A Guide to Cloud-Based Data Protection
MaryJWilliams2
 
Exploring Veeam Backup & Replication for Seamless Business Continuity
Exploring Veeam Backup & Replication for Seamless Business ContinuityExploring Veeam Backup & Replication for Seamless Business Continuity
Exploring Veeam Backup & Replication for Seamless Business Continuity
MaryJWilliams2
 
Integrating OMS and Azure Security Center for Enhanced Cloud Security
Integrating OMS and Azure Security Center for Enhanced Cloud SecurityIntegrating OMS and Azure Security Center for Enhanced Cloud Security
Integrating OMS and Azure Security Center for Enhanced Cloud Security
MaryJWilliams2
 
Erasure Coding: Revolutionizing Data Durability and Storage Efficiency
Erasure Coding: Revolutionizing Data Durability and Storage EfficiencyErasure Coding: Revolutionizing Data Durability and Storage Efficiency
Erasure Coding: Revolutionizing Data Durability and Storage Efficiency
MaryJWilliams2
 
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
MaryJWilliams2
 
Unlocking Efficiency: Exploring Change Block Tracking in Data Management
Unlocking Efficiency: Exploring Change Block Tracking in Data ManagementUnlocking Efficiency: Exploring Change Block Tracking in Data Management
Unlocking Efficiency: Exploring Change Block Tracking in Data Management
MaryJWilliams2
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
MaryJWilliams2
 
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup Appliances
MaryJWilliams2
 
Navigating the Cloud: Empowering Enterprises with Cloud Solutions
Navigating the Cloud: Empowering Enterprises with Cloud SolutionsNavigating the Cloud: Empowering Enterprises with Cloud Solutions
Navigating the Cloud: Empowering Enterprises with Cloud Solutions
MaryJWilliams2
 
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
MaryJWilliams2
 
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
MaryJWilliams2
 
Exploring Software-Defined Storage in Digital Transformation
Exploring Software-Defined Storage in Digital TransformationExploring Software-Defined Storage in Digital Transformation
Exploring Software-Defined Storage in Digital Transformation
MaryJWilliams2
 
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
MaryJWilliams2
 
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
MaryJWilliams2
 
Ad

Recently uploaded (20)

UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Ad

Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azure Security Center

  • 1. A DEMONSTRATION OF OMS AND AZURE SECURITY CENTER © 2023 StoneFly, Inc. | All rights reserved.
  • 2. Security in the Cloud OMS Demonstration How many of you have a centralized pane of glass that tell you, you have malicious traffic attacks, you have identity and access information that is there? You have computers with security updates that are missing?. Do you have all of this in a centralized pane of glass? Or do you have different tools that you use to find out what’s what? Those are the benefits that you have with Microsoft’s Operations Management Suite (OMS). We are going to jump right into a demo, and we are going to go right into Microsoft’s OMS (Operations Management Suit). Operations Management Suite (OMS) Inside of here you have different assessments and analysis that are running for your organization. Now, because you are using this primarily for cloud services, you can see that you have preventions and things like that, that are here to assess your environment. But you also see that you have had a brute force attack. Page 1
  • 3. Security in the Cloud OMS Demonstration So, you can see that we have a brute force attack, and we also have double extension files being executed and things like that. So, you have your systems being attacked at your organization. Now, if we look at the process of how to diagnose, assess, and things like that, this system, or this platform, is already starting to diagnose intelligently in the background across all these different assessments that you see here. So, you have your malware assessment that is running, you have an update assessment that is running, you have network security and distinct IP address assessment that is running. You also have a threat intelligence assessment that is running. This is where it is going to start to say, here are the malicious IPs in your organization, here is where they are coming from, here is where you are, and here is where somebody else is actually controlling your server and that is where we see the malicious IP coming from. We will walk through this a little bit more in depth. What To Do Once You Are Breached? Now that you have been breached, you see that there is a brute force at- tack or you see that there is a double extension on file. You have to click into the attack link to find out what is going on, and what server has been compromised and where things are happening. So, you can clearly see that you have a domain controller that has been compromised. What happens when a domain controller is compromised? Or is starting to have brute force attacks on it? They take control of your entire environment. Right now it is a warning, but before it becomes compromised, let us go ahead and fix this. Page 2
  • 4. Security in the Cloud OMS Demonstration How Can You Fix It? What you are going to do here is look at your query and your search results where it tells you the type of alert and the severity. You want to go ahead and setup an alert for your entire security team or for your IT team or for your help desk team. This allows them to know what is happening to your organization so that they can start to remediate it. So, you have to click up at the “Alert” tap and you are going to add a Page 3
  • 5. Security in the Cloud OMS Demonstration roll. Then you are going to say, ”We have a brute force attack in play” in the Name box. Insert in the severity of the attack, then the description and the time window (How often do I want this to run?). So for example you want this to run every five minutes, or every two minutes, or wherever you want that to be. You want the threshold to be greater than zero. So, even if it happens once where you are being brute forced attacked and it is starting to hit the system significantly, it lets you know. You also want to setup an email notification, and this is where you would put your distribution list of your help desk, of your security team, of your server team, etc. under ”Recipients”. Next you would put in a Webhook and a Webhook can be used for things like Slack or ServiceNow if you have a help desk. Webhook will translate and open up an incident, or open up a security incident within your ITSM solution. What that means is any time you have this as a security incident, it is recorded and if there is a change that is executed against it that goes through your change management and service request process. So, you actually have something that goes and tracks this as a postmortem closed process as well. Once you have that, then you can also execute a Runbook behind it. Now this Runbook would give you the automation to go ahead and fix the issue. Now you have the ability to execute this in Azure only or to execute this on-premise as well with your hybrid worker. In this demo we are going to execute this across environments with a hybrid worker. Now in your ”Service Desk Actions”, what this is going to do is give you a connection to your ServiceNow or your ITSM based solution that will automatically open up an incident for you. Page 4
  • 6. Security in the Cloud OMS Demonstration So you choose a ”Work Item” and you will choose a security incident. And as you choose a security incident, you will say hey, how did you find out about this in the ”Contact Type”. You will select ”the impact, the risk, the severity, the priority and the category”. This is exactly what has happened, is that confidential personal data loss, or was it a policy violation, was it a rogue server or service, things like that. That is when you would go ahead and save this. Once you save it, it now will tell you any time that there is a brute force attack that is happening from that environment, you will get a notification on it. Now, the other thing that you also have is the ability to go ahead and look at ”threat intelligence”. So as you are detecting, and as you are going through your organization, you want to know where malicious traffic events are. So you are looking at malicious traffic events, and you can see that there are five botnets that are sitting within your organization, that are coming from China. Let’s See How This is Happening You can see the computer. So, your SharePoint web front end has been compromised. You can see your local IP, the malicious IP that is controlling it and then the member of the botnet. You have the ability to set up a rule on this as well, and then export that to see where things are coming from. The idea is for you to be able to take different sources of information from your Security and Audit. Page 5
  • 7. Security in the Cloud OMS Demonstration Page 6
  • 8. Security in the Cloud OMS Demonstration Page 7
  • 9. Security in the Cloud OMS Demonstration Generally, most environments have separate disparate systems that don’t have log analytics across the board. This is what gives you that capability to centralize a lot of those things that you are having multiple people look at, multiple very smart people look at, from different sources of technology. It is actually combining that for you so that you have a single common pane of glass. So that’s the idea. Azure Security Center In Azure Security Center, you have the ability to turn on security monitoring for every single one of your virtual machines, your storage accounts, your databases, whatever you have. And that will start to tell you, hey, your disk is not encrypted, so go ahead and take this remediation action. The other thing that you have in Azure Security Center is you also have the ability to use third party technologies that are integrated for more protection or for a remediation of a solution that you have. Those are the things that you have with Operations Management Suite and Azure Security Center combined. Page 8
  • 10. www.stonefly.com 2865, 2869 and 2879 Grove Way, Castro Valley, CA 94546 USA. +1 (510) 265-1616