All rights reserved. All trademarks are the property of their respective owners.

Similar documents
Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide

All rights reserved. All trademarks are the property of their respective owners.

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Version 11

Integrate Palo Alto Traps. EventTracker v8.x and above

Integrate Microsoft ATP. EventTracker v8.x and above

5nine Cloud Security for Hyper-V. Version 6.0

Integrate Barracuda Spam Firewall

How to Configure ASA 5500-X Series Firewall to send logs to EventTracker. EventTracker

Veeam Universal Application Item Recovery

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Silver Peak EC-V and Microsoft Azure Deployment Guide

Integrate Symantec Messaging Gateway. EventTracker v9.x and above

Integrate Sophos Enterprise Console. EventTracker v8.x and above

Integrate Microsoft Office 365. EventTracker v8.x and above

MarkLogic Server. MarkLogic Server on Microsoft Azure Guide. MarkLogic 9 January, 2018

EASYSECURITY SYMANTEC V1.0

Veeam Cloud Connect. Version 8.0. Administrator Guide

Aimetis Symphony Mobile Bridge. 2.7 Installation Guide

PHD Virtual Backup Exporter. version 6.5 Users Guide. Document Release Date: August 26,

McAfee Cloud Workload Security Product Guide

Integrate Bluecoat Content Analysis. EventTracker v9.x and above

Veeam Backup & Replication

Integrate pfsense EventTracker Enterprise

Integrate Fortinet Firewall. EventTracker v8.x and above

Assessment - OMS Gateway and Data Collection Machine Setup. Prerequisites

Integrate TippingPoint EventTracker Enterprise

Integrate Akamai Web Application Firewall EventTracker v8.x and above

Veeam ONE. Version 8.0. User Guide for VMware vsphere Environments

HYCU SCOM Management Pack for F5 BIG-IP

5nine V2V Easy Converter Version 8

Integrate NGINX. EventTracker v8.x and above

Integrate Sophos Appliance. EventTracker v8.x and above

Integrate Microsoft Antimalware. EventTracker v8.x and above

Integrate Meraki WAP. EventTracker Enterprise. EventTracker 8815 Centre Park Drive Columbia MD

Receive and Forward syslog events through EventTracker Agent. EventTracker v9.0

Integrate Salesforce. EventTracker v8.x and above

Cloud Workload Discovery 4.5.1

SECURE FILE TRANSFER PROTOCOL. EventTracker v8.x and above

Quick Start Guide For Ipswitch Failover v9.0.1

A: SETTING UP VMware Horizon

Integrate Apache Web Server

Getting Started with Tally.Developer 9 Alpha

5nine Manager Datacenter. Version 2.1

Migration WordPress to Azure using Azure Site Recovery (ASR)

Veeam Backup & Replication. Version 9.0

EASYHA SQL SERVER V1.0

Integrate Malwarebytes EventTracker Enterprise

Netwrix Auditor. Virtual Appliance and Cloud Deployment Guide. Version: /25/2017

vcloud Director User's Guide 04 OCT 2018 vcloud Director 9.5

RAP as a Service for Exchange Server: Prerequisites

Integrate VMware ESX/ESXi and vcenter Server

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Integrate WatchGuard XTM. EventTracker Enterprise

Integrate F5 BIG-IP LTM

vcloud Director User's Guide

Integrating Cyberoam UTM

IaaS Integration for Multi- Machine Services. vrealize Automation 6.2

x10data Smart Client 6.5 for Windows Mobile Installation Guide

SIEM Tool Plugin Installation and Administration

Integrate MySQL Server EventTracker Enterprise

Integrate IIS SMTP server. EventTracker v8.x and above

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Integrate Check Point Firewall. EventTracker v8.x and above

NetApp Cloud Volumes Service for AWS

Exam : Implementing Microsoft Azure Infrastructure Solutions

Integrate Cisco IronPort Security Appliance (ESA)

Integrating Microsoft Forefront Threat Management Gateway (TMG)

Integrate Cisco Sourcefire

EventTracker v8.2. Install Guide for EventTracker Log Manager. EventTracker 8815 Centre Park Drive Columbia MD

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

Integrate Veeam Backup and Replication. EventTracker v9.x and above

Configuring AWS for Zerto Virtual Replication

Forescout. eyeextend for Splunk. Configuration Guide. Version 2.9

Integrate Aventail SSL VPN

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide

ForeScout Extended Module for Qualys VM

Version: Shoper 9 LiveUpdate/1.21/March 2011

A Quick start Guide. Version General Information: Online Support:

Virtual Recovery Assistant user s guide

Aimetis Symphony. VE510 Metadata Analytic Setup

Bomgar SIEM Tool Plugin Installation and Administration

Intel Unite. Intel Unite Firewall Help Guide

Integrate Citrix NetScaler

Integrate EMC Isilon. EventTracker v8.x and above

Implementing and Supporting Windows Intune

FortiMail AWS Deployment Guide

HP Intelligent Management Center

efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM

Course AZ-100T01-A: Manage Subscriptions and Resources

EXPRESSCLUSTER X 4.0. HA Cluster Configuration Guide for Microsoft Azure (Windows) April 17, st Edition

SMB Live. Modernize with Hybrid Cloud. Lab 1: Exploring Windows Server 2012 R2 & Hyper-V

Virtual Private Cloud. User Guide. Issue 21 Date HUAWEI TECHNOLOGIES CO., LTD.

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Amazon Virtual Private Cloud. Getting Started Guide

Microsoft Exchange Server SMTPDiag

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

Upgrade Guide. Upgrading to EventTracker v6.4 b50. Upgrade Guide Centre Park Drive Publication Date: Feb 17, 2010.

CounterACT Syslog Plugin

Dell EMC Avamar Virtual Edition for Azure

RAP as a Service Active Directory Security: Prerequisites

Transcription:

2017 5nine Software Inc. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form by any means, without written permission from 5nine Software Inc. (5nine). The information contained in this document represents the current view of 5nine on the issue discussed as of the date of publication and is subject to change without notice. 5nine shall not be liable for technical or editorial errors or omissions contained herein. 5nine makes no warranties, expressed or implied, in this document. 5nine may have patents, patent applications, trademark, copyright or other intellectual property rights covering the subject matter of this document. All other trademarks mentioned herein are the property of their respective owners. Except as expressly provided in any written license agreement from 5nine, the furnishing of this document does not give you any license to these patents, trademarks, copyrights or other intellectual property. Important! Please read the Software License Agreement before using the accompanying software program(s). Using any part of the software indicates that you accept the terms of the Software License Agreement. https://www.5nine.com/docs/5nine_sla.pdf 2009-2017 5nine Software, Inc. All rights reserved. 1

Table of Contents Summary... 3 System Requirements... 4 Supported Operating Systems:... 4 Software Prerequisites:... 4 Communications... 4 Installation... 5 Configuring Firewall Rules... 7 Security Templates... 11 Azure Firewall Logs... 13 Azure Billing... 15 OMS Alerts... 16 2009-2017 5nine Software, Inc. All rights reserved. 2

Summary VMs in public clouds should be isolated by a firewall to protect from hacker attacks and other network threats. 5nine AzSec is an intuitive application that creates, maintains and manages inbound/outbound traffic rules for virtual machines in Azure. Firewall log data is collected, displayed and managed in a central console. 5nine AzSec is offered as a standalone application or comes bundled as an integrated solution with 5nine Cloud Security. The bundled offering enables hybrid cloud administrators to manage firewall rules and logs across Azure and Hyper-V from a single access point. These events can also be forwarded to SIEM and UEBA systems, which includes SPLUNK and Microsoft Operations Management Suite (OMS). 2009-2017 5nine Software, Inc. All rights reserved. 3

System Requirements Supported Operating Systems: Microsoft Windows Server 2016 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2012 Microsoft Windows Server 2008 R2 Microsoft Windows 7 64-bit Editions Microsoft Windows 8 64-bit Editions Microsoft Windows 10 64-bit Editions Software Prerequisites:.NET Framework 4.5 or higher Note: Log Forwarding to Microsoft Operations Management Suite (OMS) from 5nine Cloud Security o Requires setting Syslog server name or IP Address in Cloud Security o Target Syslog server requires OMS agent configured to forward syslog messages to the OMS Log Analytics platform o See the following link for more information: Syslog Collection in Operations Management Suite Communications 5nine AzSec requires communication outbound on ports 80 and 13 to Azure in order to function. 2009-2017 5nine Software, Inc. All rights reserved. 4

Installation 1. Run Installer Launch 5nine AzSec setup from standalone AzSec MSI setup: 2. Destination Folder Click Next and specify the Destination Folder for the AzSec Application: 2009-2017 5nine Software, Inc. All rights reserved. 5

3. License File Then click Next, and when prompted, specify the location of the AzSec license file that you received from 5nine Software via email. If you are installing AzSec as a part of 5nine Cloud Security, you will need to input licenses for both Cloud Security and the AzSec Addon: 4. After the license is entered, proceed with installation. You can choose to launch AzSec after installation, or launch it thereafter from the status bar or application list. 2009-2017 5nine Software, Inc. All rights reserved. 6

Configuring Firewall Rules Configuring a firewall rule is as simple as setting the desired options in a single popup window. 1. Launch the 5nine AzSec executable from the desktop icon or from 5nine Cloud Security 10. You will see your subscriptions and resources in Azure after you log in with your Live ID: If you are launching AzSec for the first time, or have not saved the credentials previously, you will be asked to put in your Azure profile Tenant ID, User ID and password. Then your profile resources will load in AzSec Console. 2009-2017 5nine Software, Inc. All rights reserved. 7

2. Select the desired virtual machine and click Add Rule : 2009-2017 5nine Software, Inc. All rights reserved. 8

Adapter The rule will be bound to the selected adapter for the VM. Priority Azure firewall rules are processed in order of priority. Rules with a higher priority (lower number) take precedence over rules with a lower priority (higher number). Rule Name A description name of your choice for the rule. Description A field for additional details to further describe the rule. Action Choose to allow or deny traffic that matches the criteria defined in the rule. Direction Specify the direction of traffic, inbound or outbound, that the rule applies to. Source Port Range One or more source ports the rule will apply to. Single port number from 1 to 65535, port range (example: 1-65635), or * (for all ports). Destination Port Range One or more destination ports the rule will apply to. Single port number from 1 to 65535, port range (example: 1-65635), or * (for all ports). Protocol The protocol TCP, UDP or both (*) that the rule applies to. RemoteIPs Single IP address (example: 10.10.10.10), IP subnet (example: 192.168.1.0/24), default tag, or * (for all addresses). 2009-2017 5nine Software, Inc. All rights reserved. 9

Default tags are system-provided identifiers to address a category of IP addresses. You can use default tags in the source address prefix and destination address prefix properties of any rule. There are three default tags you can use: o VirtualNetwork (Resource Manager) (VIRTUAL_NETWORK for classic): This tag includes the virtual network address space (CIDR ranges defined in Azure), all connected on-premises address spaces, and connected Azure VNets (local networks). o AzureLoadBalancer (Resource Manager) (AZURE_LOADBALANCER for classic): This tag denotes Azure s infrastructure load balancer. The tag translates to an Azure datacenter IP where Azure s health probes originate. o Internet (Resource Manager) (INTERNET for classic): This tag denotes the IP address space that is outside the virtual network and reachable by public Internet. The range includes the Azure owned public IP space. Set template button, see next section for a description on use. Once the desired configurations are set, select the OK to finish creating the rule and you are done. This is as simple as it is in the 5nine Cloud Security standalone version. The above example was to enable web server traffic (port 80). 2009-2017 5nine Software, Inc. All rights reserved. 10

Security Templates Templates are provided to simplify rule creation for common workloads and network traffic scenarios. 1. Set template Select the Set template button in the bottom left side of the rule window: 2. Select template Choose the desired template and traffic direction: 2009-2017 5nine Software, Inc. All rights reserved. 11

3. Rule settings The rule is prepopulated with the appropriate settings. Review and modify any of the settings such as name or description and select OK to save and implement the rule. 2009-2017 5nine Software, Inc. All rights reserved. 12

Azure Firewall Logs To examine an attack or identify suspicious activities in the Azure environment, you need to analyze the Azure firewall log events. By collecting and analyzing the logs, you can understand what transpires within your VMs in Azure. On the first launch of the program the user will be prompted to configure logging. You can also open this dialog manually through the Settings menu of 5nine AzSec. 1. Enable Logging The Settings / Set resource settings menu item is used to configure the logging. Select the subscription and resources to enable logging: Note that the log data retention configured here is subject to log availability in Azure. Select OK to enable logging. AzSec will register the providers for the selected resources. 2. View Logs Logs are now viewable in the console in the bottom panel. Select the VM s adapter to see the associated logs: 2009-2017 5nine Software, Inc. All rights reserved. 13

3. Save Logs Logs can be saved in several different formats by selecting the menu item. 2009-2017 5nine Software, Inc. All rights reserved. 14

Azure Billing The Azure Billing feature provides you with a convenient way to review your Azure subscription usage. 1. Select the Azure Billing / View Bill menu item: 2. Select the desired date range from the drop down menus and then click on View bill button to see an itemized list of resources and their associated costs: 2009-2017 5nine Software, Inc. All rights reserved. 15

OMS Alerts Microsoft Operations Management Suite (OMS) alerts can be configured from within the 5nine AzSec console. Open the OMS Alerts / Alert settings menu item: 1. Create Search In the Search field specify the desired name for the search. In the Query field enter the query to be associated with the search. More information regarding the OMS query syntax can be found here: https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-search-reference 2. Save the configured search, which will then appear in the list on the left side of the window. 3. Add alert With the appropriate search highlighted, select the menu item to configure email alert settings. 4. Alert Properties 2009-2017 5nine Software, Inc. All rights reserved. 16

a. Name Specify a name for the alert. b. Query results amount Set the threshold for an alert to be triggered. c. Check interval Configure the number of minutes between checks if the alert criteria is met. d. Email subject The subject line for the email generated by the alert. e. Recipients Recipient email address that will receive the alert email (separate multiple email addresses with a semi-colon.) f. Save alert Select OK to save the configured alert. You can create more than 1 alert for a search so they can be triggered when different conditions are met in the search. The alerts can be edited or deleted, as can the searches. 2009-2017 5nine Software, Inc. All rights reserved. 17