Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Investigating Suspicious Activity in a Hybrid Cloud with OMS Security

Monitoring devices in a hybrid environment is imperative to your secure posture. The intent of having a tight secure posture is to close the gap between discovering a threat and take an action to proper add countermeasures in place. Monitoring will play a big role in the detection phase of your secure posture as shown in the following diagram:

Note: It is important to emphasize that you should always leverage your organization’s incident response process to proper handle case by case.

Following the warning sign

When trying to identify a suspicious activity, the first step is to open OMS Security & Audit dashboard, and in there look at the Detection (Preview) tile as shown below:

When reviewing the list of alerts, you should address the issues based on the severity, in other words, high (red) severity first. However, for the purpose of this example we will use the second detection, which is a medium (orange) alert. This detection says: “Executable found running from a suspicious location”. If you click on this alert you will see the search result for this query:

In this case there is a suspicious executable file (suchost.exe) located at c:windowsfonts folder. The query result also shows the user that ran this executable, the time that was detected and the computer’s information. At this point you have enough information to perform your investigation at the target host and verify if this is a legitimate process or not.

As a further measure, you can also configure OMS Security to send an email to you if this process is executed again, in any computer monitored by OMS. To do that click in the Alert button in the same search page that you found the suspicious activity.

The Add Alert Rule page will open and you can customize the fields according to your need. Below you have an example of a rule for this suspicious process:

Once you finish customizing the options, click Save.

More information

For more information (and demonstration) about how to use OMS Security for Incident Response scenarios, watch this presentation from Ignite 2016:

Stay alert!

Yuri Diogenes
Senior Content Developer, CSI Enterprise Mobility + Security (Azure Security and OMS Security)
@yuridiogenes

Share the post

Investigating Suspicious Activity in a Hybrid Cloud with OMS Security

×

Subscribe to Msdn Blogs | Get The Latest Information, Insights, Announcements, And News From Microsoft Experts And Developers In The Msdn Blogs.

Get updates delivered right to your inbox!

Thank you for your subscription

×