eric chan system consultant
play

Eric Chan System - PowerPoint PPT Presentation

Welcome Eric Chan System Consultant Hong Kong, Macau and Taiwan Hybrid Active Directory Environment Office 365 requires an Azure AD instance Azure AD


  1. Welcome 日防夜防,家賊難防 陳健亮 Eric Chan 如何防止內部攻擊與資料失竊 System Consultant Hong Kong, Macau and Taiwan

  2. Hybrid Active Directory Environment • Office 365 requires an Azure AD instance • Azure AD provides the Directory Service for Office 365 applications • Azure AD integrates with On- premise AD creating a Hybrid Directory environment

  3. What does AD have to do with Office 365 Security? 90% 10 Billion 95 Million Of companies use on- On-prem AD authentications per AD authentications are under premises AD day attack daily 1 Million 70% 75% Subscribers a month YoY growth for Office 365 adoption Of enterprises with more moving to Office 365 than 500 employees sync on prem. AD to Azure AD 700 Million 1.3 Billion 10 Million Azure AD accounts MS cloud login attempts per day Daily MS Cloud logins are cyber-attacks

  4. Active Directory Security is Critical On-premises AD remains the core of security even in a 1 cloud/hybrid environment On-prem is authoritative source and will replicate to Azure AD & 2 Office 365 3 With security, you are only as secure as your weakest link

  5. We have invested a lot on preventing attacks from outside, but usually the most harmful one is from INSIDE……

  6. Who is Hank the Hacker?

  7. Who is Hank? • Organized criminal groups • State-affiliated actors • Disgruntled employees • Rouge administrators • Contractors • Etc.

  8. How Hank Gets In? • Malware • Ransomware • Pass-the-hash • Weak passwords • Social engineering • Authorization creep • Spear Phishing • Etc.

  9. What will Hank do? • Try to logon to your critical systems • Snooping your data: • File servers • Databases • PCs • Pretend the VIP users • Change your important AD settings: • Elevate privileges • Deploy malware via GPO • Execute PowerShell attacks (e.g. Mimikatz)

  10. How Quest Stops Hank?

  11. Detect and Alert

  12. Challenges – On Premises • No comprehensive view of all changes from all native log sources • Very difficult to consolidate native audit logs and avoid loss of historical data • No protection exists to prevent unwanted changes to the most sensitive objects, even from privileged users • No proactive alerting on suspicious events

  13. Challenges – On Azure • Alerting is not real time • Audit data only retained for 7 days or 30 days depending on platform • Difficult to interpret events – Audit data is very raw (contains SIDs, GUIDs and other IDs), lacks friendly display names and format is constantly changing

  14. Change Auditor • Change Auditor provides complete, real-time change auditing, in-depth forensics and comprehensive reporting on all key configuration, user and administrator changes. Who Where Made the change? Was the change made from? What Why Object was Was the change Real-time changed? made (comment)? smart alerts to any device When Workstation Was the change Where the change made? originated from

  15. Change Auditor – Supported Platforms • Active Directory / LDS • Exchange • Azure Active Directory • O365 Exchange Online • Active Directory Queries • SQL Server • Logon, Logoff, User Sessions • SharePoint • O365 SharePoint Online • Skype for Business • Windows File Servers • Quest Active Roles • EMC Celerra, Isilon • Quest Authentication Services • NetApp • Quest Defender • Dell Fluid File System • One Drive Object protection

  16. Hybrid Directory Management • With Change Auditor, you can: Consolidates event data from on premises and from cloud targets Correlates identities across on premises and cloud Searching and reporting in simple ways Proactive protect important objects and settings

  17. Easy to read, normalized 5W events

  18. Change Auditor for Active Directory: GPO Settings

  19. Protect Important Objects and Settings • Protect your important AD, Exchange and Windows File Servers objects and settings • Prevent operation mistakes • Last protection shield even admin credentials have been stolen

  20. How can you identify THREATS in millions of events?

  21. User Threat Detection for your Windows environment

  22. Behavior Analysis • Unsupervised machine learning models individual user behavior on multiple vectors: – Time based modeling (e.g. logon at an abnormal time for that user) – Categorical modeling (e.g. accessed a machine they don’t typically access) – Continuous modeling (e.g. accessed an abnormal number of files) • Multivariate risk scoring ensures that only a suspicious combination of activities raises an alert • Comparison with global activity reduces false positives on new events 22 quest.com | confidential

  23. A pattern of suspicious activity leads to higher user risk scores

  24. User Threat Detection Alerts 80,600 users Analysis over 60 days 387 Million Raw events 1,153* Threat indicators (from 109,600 raw events) That’s 304 5 alerts SMART alerts a day! 180 Risky users *Tens of thousands of additional indicators were discarded as they were not scored high or correlated 24 Confidential with related suspicious behavior

  25. Change Auditor Threat Detection • Identifies real-time risk level of user activity • Drastically consolidates potential incidents • Automates alert prioritization • Reduces false positives • Highlights actionable alerts in context for accelerated investigation

  26. Why Change Auditor Threat Detection? • Optimized for Change Auditor modules out-of-the-box – Plug-and-play AD and Windows security solution for AD admins • Does not rely on native Windows logs – No gaps in critical AD changes and file activity • Reduces the sea of noise from false positive alerts – By using dynamically adapting unsupervised machine learning • No configuration required – Administrator input, alert definition and model tuning is unnecessary • Minimal infrastructure for existing Change Auditor customers – Existing customers only require a single, additional server 26 quest.com | confidential

  27. Use Cases

  28. Use Cases Brute force attack Data exfiltration Snooping user Abnormal AD Malware activity Abnormal system Scripted account Privilege elevation Lateral movement access use 28 quest.com | confidential

  29. Abnormal AD activity First-level helpdesk representative normally is only responsible for Use Case unlocking disabled user accounts • Attempting to exploit compromised and resetting their passwords but who has suddenly begun creating credentials new user accounts in AD • Compromised account is being used to corrupt or destroy critical directory data • Interactive privileged account being used to run scripts Abnormal activity in Active Indicators Directory puts your entire forest at risk. • Spike in the volume of changes to AD • User performing actions that are not part of their standard routine • Users making membership changes to privileged AD groups • Abnormal number of failed AD changes CATD License 29 quest.com | confidential

  30. Abnormal AD Activity • Abnormal AD activity

  31. Snooping User An internal user who is inappropriately curious might attempt to browse Use Case servers and folders that they shouldn’t be • A user accessing resources and files accessing, such as salary that aren’t appropriate for their role, information or reorg plans. even though permissions aren’t necessarily locked down • Could be a user that is not actively malicious but inappropriately curious Change Auditor Threat Detection alerts you to users Indicators attempting to access data they shouldn’t access. • A high number of file access attempts in a short period of time • A high number of failed file access events • Attempts to access file servers and folders the user has never, or rarely, accessed in the past CATD License 31 quest.com | confidential

  32. Snooping User

  33. Data exfiltration or destruction Use Case Could be perpetrated by • Unauthorized copying or transfer of cybercriminals or rogue employees data from a computer using any of multiple techniques • User is attempting the malicious destruction of data Indicators Change Auditor Threat Detection identifies users • who might be attempting to An excessive number of file access steal or destroy your data. or file move events • An excessive number of file delete events CATD License 33 quest.com | confidential

  34. Data exfiltration or destruction • Data exfiltration

  35. Brute-force attack By correlating failed logons with other user actions, Change Auditor Threat Use Case Detection can alert you to true brute-force attacks • Attackers repeatedly try to guess a without drowning you in user’s password false positives. • Worms or other malware designed to identify user accounts and attempt to crack their passwords using password dictionaries Indicators Traditionally, 44% of alerts go unexplored • Abnormal failed authentication attempts Too many alerts CATD License 35 quest.com | confidential

  36. Brute-force attack • Brute force authentication

  37. Malware example from Quest

  38. Malware example from Quest

  39. Malware example from Quest

  40. Malware example from Quest

  41. Malware example from Quest

Recommend


More recommend