Microsoft Advanced Threat Analytics tool analyze data from three data sources (Active Directory Database, Active Directory Traffic and SIEM solutions) and learn about the entities in your organization and their behavior and then start to detect suspicious events.
Microsoft ATA targets three categories of Risks
- Security Issues and Risks (Broken Trust, Weak Protocols and known Protocol vulnerabilities)
- Malicious Attacks (Pass the Hash, Pass the Ticket, BruteForce........etc)
- Abnormal Behavior (Suspicious activities, Password sharing, lateral movement.......etc)
Microsoft Recommends around 3-4 weeks for the ATA engine to learn about your environment and start detecting abnormal behavior, this is for the 3rd category (abnormal Behavior), as for the first and second category (Security Risk and Malicious attacks) this will be done instantly after installation of ATA (Real time)
There are two components in ATA (Gateway and Center), Gateway collects all data using port mirroring and its sent to the Center where all processing occurs.
- Capture Data from DCs via Port Mirroring
- Listen to Multiple DCs from Multiple Domains
- Receive Event from SIEM
- Retrieve data from entities in domain
- Perform name resolution of network entities
- Transfer Relevant data to ATA Center
Center
- Manage ATA Gateway Configuration Setting
- Receive data from ATA Gateway and store in DB
- Detect Suspicious activity and abnormal behavior (Machine Learning)
- Provide Web Management Interface
- Support Multiple Gateways
What is the ATA Pre-deployment Checklist ?
- Configure Port Mirroring from DCs (Domain Controllers) to ATA Gateway.
- Create domain User (Read only)
- KB2919355/KB2919442 installed on the Gateway machine or VM
- ATA Center has 2 static IP addresses
- Optional - Deploy Certificates from your internal PKI. For demo only you can use self signed certificates.
- ATA Gateway has 2 NICs (Network Cards)
- ATA Gateway Account either Local admin account on the ATA Gateway server or member of the ATA built-in Group
In Part 2 I will start deploying ATA and configuring both Gateway and Center machines/VMs.
You can check part 2 from the following link
http://itcalls.blogspot.com.eg/2016/04/microsoft-advanced-threat-analytics-ata_19.html
You can check part 2 from the following link
http://itcalls.blogspot.com.eg/2016/04/microsoft-advanced-threat-analytics-ata_19.html