日防夜防,家賊難防
如何防止內部攻擊與資料失竊
System Consultant Hong Kong, Macau and Taiwan
Welcome
陳健亮 Eric Chan
Eric Chan System - - PowerPoint PPT Presentation
Welcome Eric Chan System Consultant Hong Kong, Macau and Taiwan Hybrid Active Directory Environment Office 365 requires an Azure AD instance Azure AD
如何防止內部攻擊與資料失竊
System Consultant Hong Kong, Macau and Taiwan
Welcome
陳健亮 Eric Chan
Hybrid Active Directory Environment
AD instance
Directory Service for Office 365 applications
premise AD creating a Hybrid Directory environment
What does AD have to do with Office 365 Security?
95 Million
AD authentications are under attack daily
90%
Of companies use on- premises AD
70%
YoY growth for Office 365 adoption
1 Million
Subscribers a month moving to Office 365
700 Million
Azure AD accounts
10 Billion
On-prem AD authentications per day
1.3 Billion
MS cloud login attempts per day
75%
Of enterprises with more than 500 employees sync on
10 Million
Daily MS Cloud logins are cyber-attacks
Active Directory Security is Critical
On-premises AD remains the core of security even in a cloud/hybrid environment On-prem is authoritative source and will replicate to Azure AD & Office 365 With security, you are only as secure as your weakest link
1 2 3
We have invested a lot on preventing attacks from
most harmful one is from
INSIDE……
Who is Hank?
How Hank Gets In?
What will Hank do?
Challenges – On Premises
from all native log sources
logs and avoid loss of historical data
unwanted changes to the most sensitive objects, even from privileged users
events
Challenges – On Azure
30 days depending on platform
– Audit data is very raw (contains SIDs, GUIDs and other IDs), lacks friendly display names and format is constantly changing
Change Auditor
forensics and comprehensive reporting on all key configuration, user and administrator changes.
Who Made the change? Where Was the change made from? What Object was changed? When Was the change made? Why Was the change made (comment)? Workstation Where the change
Change Auditor – Supported Platforms
Services
Object protection
Hybrid Directory Management
Consolidates event data from on premises and from cloud targets Correlates identities across on premises and cloud Searching and reporting in simple ways Proactive protect important
Easy to read, normalized 5W events
Change Auditor for Active Directory: GPO Settings
Protect Important Objects and Settings
Exchange and Windows File Servers objects and settings
admin credentials have been stolen
User Threat Detection for your Windows environment
Behavior Analysis
multiple vectors:
– Time based modeling (e.g. logon at an abnormal time for that user) – Categorical modeling (e.g. accessed a machine they don’t typically access) – Continuous modeling (e.g. accessed an abnormal number of files)
events
quest.com | confidential 22
A pattern of suspicious activity leads to higher user risk scores
Confidential 24
User Threat Detection Alerts
387 Million Raw events 1,153* Threat indicators
(from 109,600 raw events)
304 SMART alerts 180 Risky users 80,600 users Analysis over 60 days
*Tens of thousands of additional indicators were discarded as they were not scored high or correlated with related suspicious behavior
That’s 5 alerts a day!
Change Auditor Threat Detection
potential incidents
prioritization
in context for accelerated investigation
Why Change Auditor Threat Detection?
– Plug-and-play AD and Windows security solution for AD admins
– No gaps in critical AD changes and file activity
– By using dynamically adapting unsupervised machine learning
– Administrator input, alert definition and model tuning is unnecessary
– Existing customers only require a single, additional server
quest.com | confidential 26
Use Cases
quest.com | confidential 28
Brute force attack Data exfiltration Snooping user Abnormal AD activity Malware Scripted account use Privilege elevation Lateral movement Abnormal system access
Abnormal AD activity
quest.com | confidential 29
Use Case
credentials
corrupt or destroy critical directory data
run scripts
Indicators
their standard routine
privileged AD groups
Abnormal activity in Active Directory puts your entire forest at risk. First-level helpdesk representative normally is only responsible for unlocking disabled user accounts and resetting their passwords but who has suddenly begun creating new user accounts in AD
CATD License
Abnormal AD Activity
Snooping User
quest.com | confidential 31
Use Case
that aren’t appropriate for their role, even though permissions aren’t necessarily locked down
malicious but inappropriately curious
Indicators
attempts in a short period of time
events
folders the user has never, or rarely, accessed in the past
An internal user who is inappropriately curious might attempt to browse servers and folders that they shouldn’t be accessing, such as salary information or reorg plans. Change Auditor Threat Detection alerts you to users attempting to access data they shouldn’t access.
CATD License
Snooping User
Data exfiltration or destruction
quest.com | confidential 33
Use Case
data from a computer using any of multiple techniques
destruction of data
Indicators
events
Could be perpetrated by cybercriminals or rogue employees Change Auditor Threat Detection identifies users who might be attempting to steal or destroy your data.
CATD License
Data exfiltration or destruction
Brute-force attack
quest.com | confidential 35
Use Case
user’s password
identify user accounts and attempt to crack their passwords using password dictionaries
Indicators
attempts
By correlating failed logons with other user actions, Change Auditor Threat Detection can alert you to true brute-force attacks without drowning you in false positives. Traditionally, 44% of alerts go unexplored
Too many alerts
CATD License
Brute-force attack
Malware example from Quest
Malware example from Quest
Malware example from Quest
Malware example from Quest
Malware example from Quest
Abnormal system access
quest.com | confidential 42
Use case
an abnormal workstation, it could be a sign that an external attacker has been able to compromise the account
abnormal access events would quickly drown you in a sea of dead-end alerts Indicators
User logon to abnormal host
quest.com | confidential 43
Use Cases
quest.com | confidential 44
File Activity
quest.com | confidential
Privilege elevation
privileged groups
Abnormal AD activity
Lateral movement
privileged groups
Scripted use of privileged acct
changes/attempted changes to groups
Active Directory Brute-force attempt
successful one
Suspicious access
Abnormal system access
workstation
they’ve never accessed
Lateral movement
servers
Potential malware
accounts from same server
Snooping user
Data exfiltration
in a short period of time
Data destruction
files
Potential malware
Logon Activity
Keeping track of user and privileged account activity, especially on workstations, is at the heart of keeping your environment secure.
InTrust refresher
An elegant and efficient event log framework for all log data
in the business
& normalization
Does anyone know what this is?
There was a report that just came out that highlighted five publicly available tools frequently observed in cyber attacks this year. Mimikatz was one of the 5. It’s essentially a PowerShell tool that can be used to steal credentials. In 2017, this tool was used in combination with the NotPetya malware to cause
script is used, its activity is difficult to isolate and identify and that’s what makes it so dangerous That’s just one example ….
Automated responses to PowerShell attacks
We want to set up alerts and emergency response actions for whenever someone uses fishy PowerShell commands. But the lack of real-time alerting and visibility puts us in a reactive state
InTrust Value
activity
actions
Imagine……
accidentally
your vCenter and the whole AD forest gone
attributes in your AD or Azure AD
What…
Active Directory incidents and disasters: more common than you might think
Active Directory is a mature product and pretty stable, right?
Recovery challenges organizations face today
Native tools do not offer granular recovery Objects get modified or deleted, attributes get
Compliance regulations require proof of disaster recovery and backup plans T esting disaster recovery plans is resource-intensive Native recovery tools are manual, time-intensive (in the case of AD often require that AD be taken offline) Not knowing which object or attributes have been changed or deleted Can’t delegate restore functions to non- administrators to lighten the load of my more experienced admins Need to document details of how the disaster recovery plan/process will work including timeframes
Cost when AD goes down……
What’s the financial hit if Active Directory went down – any idea?
AD to provide single sign-
disrupted
EXPENSIVE!
Recovery Manager for Active Directory
Recovery Manager for Active Directory + On Demand Recovery for Azure AD
Recovery Manager for Active Directory Forest Edition + On Demand Recovery for Azure AD
Comparing Quest with AD Recycle Bin
Recovery Manager for Active Directory Recycle Bin Bulk restore of multiple attributes Restore modified user attributes Restore Group Policies Comparison reporting Compare and restore group membership Restore delegation (non-Admin role)
Management concerns with Active Directory
tools
consuming and error prone user and group creation and modification
Without Active Roles
services
Access
AD Architect
Exchange Admin OU Admin/ Help Desk Application/ Data Owners
applications databases directories distributions lists network resources groups files shares
Solution: “least privilege” delegation
certain roles
specific OUs only
functionalities to the user granularly, e.g. only allow to create/edit user objects but not delete
Domain Admin View Regional Admin View
Reduce most of the Domain Admins
The Problems with Unix/Linux Security
Privileged Access Suite for Unix
applications
Management Console for Unix AD Bridge Unix Delegation Replace Sudo Enhance Sudo
Privileged Access Suite for Unix Components
AD Bridge
Authentication Services
Membership
– Extend AD password policies – Eliminate redundant, inconsistent, and non-secure passwords – Extend AD-based self-service password reset capabilities – Unix access is locked with AD account
Manage Unix users and access from AD
Enhance Sudo
accounts
Playback Keystroke
We stop Hank by:
Go-to experience you can rely on
DOUBLE
# of mailboxes migrated to Exchange over competition
95M
AD accounts migrated
Or more than 10X the number of people living in NYC!
166M
If 1 user = 1 mile, then that’s 347 trips to the moon…and back! user accounts audited
5X
More Exchange mailboxes managed than folks visiting the Eiffel T
99PB
Of SharePoint data supported Or more than 7x the number
Active Directory accounts managed
184M
Do you like my hat? Non!Wait, did you say Petabytes?!!
Change Auditor
Software Winner
Silver
Bronze
Solution
Enterprise Reporter Suite
Governance/Risk/Compliance Solution
Bronze
IT Security Search
Silver
On Demand Migration for Email
Migration as a Service– Gold
Metalogix Migration solutions
Content Services Partner Program
Services
Quest On Demand
Cloud Applications/Services
Cloud Application/Service – Bronze
Quest On Demand Recovery
Cloud Storage & Backup Solution – Silver
ZeroIMPACT Migration solutions
Messaging
Go-to, award-winning products
Go-to products – the full list!