microsoft advanced threat analytics · • use ata sizing tool – don’t guess • traffic drives...

37
MICROSOFT ADVANCED THREAT ANALYTICS #LSS35

Upload: others

Post on 13-Jul-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

MICROSOFT ADVANCED THREAT ANALYTICS

#LSS35

Page 2: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

ABOUT THE PANEL

Akin GumpJeremy Phelps - Direction of Information Security

Brian Cooke - Enterprise Applications Manager Bob Davis - Information Security Manager

Kraft & Kennedy, Inc.Dominick Ciacciarelli - Practice Architect

Page 3: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

POLL

• How many people are familiar with Microsoft Advanced Threat Analytics?

• How many people have installed Microsoft Advanced Threat Analytics?

Page 4: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

AGENDA

• Quick Overview• Deployment Considerations• Akin Gump’s ATA Story

– Deployment, Tuning & Threat Detection

Page 5: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

ATA OVERVIEW

• What is Microsoft Advanced Threat Analytics?• What benefits can it provide?• What is so Analytical about ATA?

Page 6: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

ATA IS NOT

• Border/Perimeter Security• Anti Virus/Malware Scanning• Network Protection Device• Silver Bullet

Page 7: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

WHY ATA?

Page 8: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

ANALYTICS???

Page 9: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

BENEFITS OF ATA

Page 10: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

DEPLOYMENT CONSIDERATIONS

• Licensing• Sizing• Deployment Models• Integration Considerations

Page 11: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

LICENSING

• Per User/Device• Via Enterprise CAL suite• Through EMS or ECS Suites*

*You May Already Own It – Check your EA.

Page 12: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

SIZING

• Use ATA Sizing tool – Don’t Guess• Traffic Drives Sizing• Traffic Influenced by AD Topology

Page 13: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

DEPLOYMENT

Page 14: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

DEPLOYMENT

Page 15: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

AKIN’S ATA STORY

• 2016 – We passed• 2017 – Incorporated ATA into AD Redesign

Page 16: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

INSTALLATION OVERVIEW

If you started installing ATA when this presentation began, you might be done by now.

• Preparation• Installation & Configuration• Console Layout

Page 17: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

ATA ACTION CENTER CONSOLE

Page 18: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

ATA HEALTH CENTER CONSOLE

Page 19: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

ATA ALERTS

• System Health Alerts• Security Events

Page 20: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

ATA SUSPICIOUS ACTIVITY ALERT

Page 21: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

ATA SUSPICIOUS ACTIVITY ALERT

Page 22: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

ATA HEALTH ALERT

Page 23: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

TUNING – WEEK 1

High Alert “Malicious replication of directory services”

Medium Alerts“Reconnaissance using account enumeration”

“Unusual protocol implementation”“Reconnaissance using directory services enumeration”

“Sensitive account credentials exposed”

Page 24: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

OVERALL IMPRESSIONS?

• Worth implementation, especially if you already own it.

• Can help clean up your AD environment and identify misconfigurations that could lead to compromise.

• Can potentially identify serious breaches including Golden / Silver tickets, that would be difficult to detect otherwise.

Page 25: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

WEEK 1 - ACTIONABLE FINDINGS?

• Reconnaissance using account enumeration –Check with system owners, whitelist in ATA

• Unusual protocol implementation – Check with NAC vendor and verify traffic was expected, whitelist in ATA.

• Sensitive account credentials exposed –Configure applications to use secure LDAP

Page 26: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

GREAT FOR AD QUERIES

Quick Search for AD User, Computers & Groups• General Account Information • Computers Recently Logged Onto • Recently Accessed Resources• Password Activity • Suspicious Activity• Recent Changes

Page 27: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

ATA AS A RESEARCH TOOL

Page 28: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

ATA AS A RESEARCH TOOL

Page 29: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S
Page 30: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S
Page 31: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

Why are certain accounts considered sensitive?

This happens when an account is a member of certain groups which we designate as sensitive (for example: "Domain Admins").

Page 32: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

WHAT THREATS DOES ATA LOOK FOR?

Page 33: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

WHAT DOES MICROSOFT SAY?

ReconnaissanceReconnaissance using account enumeration

Net Session Enumeration Reconnaissance using DNS

Reconnaissance using directory services enumeration

Compromised CredentialsBrute force

Sensitive account exposed in plain text authenticationService exposing accounts in plain text authentication

Honey Token account suspicious activitiesUnusual protocol implementation

Malicious Data Protection Private Information RequestAbnormal Behavior

Lateral MovementPass the ticket / Pass the hash

Over-pass the hash Abnormal behavior

Privilege EscalationMS14-068 exploit (Forged PAC) MS11-013 exploit (Silver PAC)

Domain DominanceSkeleton key malware

Golden ticketRemote execution

Malicious replication requests

Page 34: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

EXAMPLE 1

• Scenario – Reconnaissance using directory services enumeration

• Test – Use of “Net User /Domain” and “Net Group /Domain” commands to enumerate users and groups.

• Result - ATA picks up on the activity and alerts with PC name and User that ran the command.

Page 35: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

EXAMPLE 2

• Scenario – Reconnaissance using SMB Session Enumeration

• Test – Run the Netsess tool against a domain controller to enumerate all NetBIOS sessions

• Result - ATA correctly identifies the machine and user running the command as well as all accounts that were potentially exposed.

Page 36: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

EXAMPLE 3

• Scenario – Pass the hash exploits• Test – Use of Keimpx and Metasploit SMB

Login Check to spray hashes and open remote terminals.

• Result - Neither tool was identified by ATA. Local and Domain hashes were successfully and unsuccessfully passed without ATA alerting.

Page 37: MICROSOFT ADVANCED THREAT ANALYTICS · • Use ATA Sizing tool – Don’t Guess • Traffic Drives Sizing • Traffic Influenced by AD Topology. DEPLOYMENT. DEPLOYMENT. AKIN’S

OUR TAKE ALWAYS

• Low TOC• Helpful Tool• Can Identify Noisy Events

– Configuration errors or – Rogue administrators or curios users

• Targeted Attacks?