You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Monitor networks proactively with alerts and Azure Functions by using packet capture
13
13
14
-
Azure Network Watcher packet capture creates capture sessions to track traffic in and out of virtual machines (VMs). The capture file can have a filter that you define to track only the traffic that you want to monitor. This data is stored in a storage blob or locally on the guest machine.
14
+
The packet capture feature of Azure Network Watcher creates capture sessions to track traffic in and out of virtual machines (VMs). The capture file can have a filter that you define to track only the traffic that you want to monitor. This data is stored in a storage blob or locally on the guest machine.
15
15
16
16
You can start this capability remotely from other automation scenarios, such as from Azure Functions. You can run proactive captures based on defined network anomalies. Other uses include gathering network statistics, getting information about network intrusions, and debugging client/server communications.
17
17
18
-
Resources that are deployed in Azure run continuously. It's difficult to actively monitor the status of all resources at all times. For example, what happens if an problem occurs at 2:00 AM?
18
+
Resources that are deployed in Azure run continuously. It's difficult to actively monitor the status of all resources at all times. For example, what happens if a problem occurs at 2:00 AM?
19
19
20
20
By using Network Watcher alerts and functions from within the Azure ecosystem, you can proactively respond with the data and tools to solve problems in your network.
21
21
@@ -43,16 +43,16 @@ Here's the workflow for packet capture:
43
43
1. The packet capture runs on the VM and collects data.
44
44
1. The packet capture file is uploaded to a storage account for review and diagnosis.
45
45
46
-
To automate this process, you create and connect an alert on your VM to trigger when the incident occurs. You also create a function to call Network Watcher.
46
+
To automate this process, you create and connect an alert on your VM to be triggered when the incident occurs. You also create a function to call Network Watcher.
47
47
48
48
This scenario:
49
49
50
50
- Creates an Azure function that starts a packet capture.
51
51
- Creates an alert rule on a virtual machine and configures the alert rule to call the Azure function.
52
52
53
-
## Create an Azure function app
53
+
## Create an Azure function
54
54
55
-
To create an Azure function to process the alert and create a packet capture, follow these steps:
55
+
To create an Azure function to process the alert and create a packet capture, you first need to create a function app:
56
56
57
57
1. Sign in to the [Azure portal](https://portal.azure.com).
58
58
@@ -66,7 +66,7 @@ To create an Azure function to process the alert and create a packet capture, fo
66
66
67
67
- Under **Project Details**, select the subscription for which you want to create the function app and the resource group to contain the app.
68
68
- Under **Instance Details**:
69
-
- For **Function app name**, enter the name of the function app. This name is appended by*.azurewebsites.net*.
69
+
- For **Function App name**, enter the name of the function app. This name is appended with*.azurewebsites.net*.
70
70
- For **Do you want to deploy code or container image?**, select the mode of publishing: **Code** or **Container image**.
71
71
- For **Runtime stack**, select a runtime stack.
72
72
- For **Version**, select the version of the runtime stack.
@@ -81,7 +81,7 @@ To create an Azure function to process the alert and create a packet capture, fo
81
81
82
82
1. Select **Review + create** to create the app.
83
83
84
-
### Create an Azure function
84
+
Now you can create a function:
85
85
86
86
1. In the function app that you created, select **Functions**, and then select **Create** to open the **Create function** pane.
87
87
@@ -99,7 +99,7 @@ To create an Azure function to process the alert and create a packet capture, fo
99
99
100
100
7. Update the [script](#add-powershell-to-the-function) and select **Save**.
101
101
102
-
### Authentication
102
+
### Configure authentication
103
103
104
104
To use the PowerShell cmdlets, you must configure authentication in the function app. To configure authentication, you must configure environment variables and upload an encrypted key file to the function app.
105
105
@@ -133,7 +133,7 @@ Set up the following environment variables, which are necessary to access the va
133
133
-`AzureTenant`
134
134
-`AzureCredPassword`
135
135
136
-
If you already have an application ID, use the `AzureClientID`, `AzureTenant`, and `AzureCredPassword` values of that application. If you don't have one, proceed to [Store the environment variables](#store-the-environment-variables).
136
+
If you already have an application ID, use the `AzureClientID`, `AzureTenant`, and `AzureCredPassword` values of that application. If you don't have one, proceed to the [Store the environment variables](#store-the-environment-variables) section.
137
137
138
138
#### AzureClientID
139
139
@@ -165,7 +165,7 @@ Get the tenant ID by running the following PowerShell cmdlet:
165
165
166
166
#### AzureCredPassword
167
167
168
-
The value of the `AzureCredPassword` environment variable is the value that you get from running the following PowerShell sample. This example is the same one that the preceding [Authentication](#authentication) section showed. The value that you need is the output of the `$Encryptedpassword` variable. This is the service principal password that you encrypted by using the PowerShell script.
168
+
The value of the `AzureCredPassword` environment variable is the value that you get from running the following PowerShell sample. This sample is the same one that the preceding [Authentication](#authentication) section showed. The value that you need is the output of the `$Encryptedpassword` variable. This output is the service principal password that you encrypted by using the PowerShell script.
169
169
170
170
```powershell
171
171
#Variables
@@ -316,7 +316,7 @@ if ($requestBody.context.resourceType -eq "Microsoft.Compute/virtualMachines") {
316
316
317
317
## Configure an alert on a VM
318
318
319
-
You can configure alerts to notify individuals when a specific metric crosses a threshold that you assigned to it. In this example, the alert is on the Network Out Total metric that's sent, but you can trigger the alert for many other metrics.
319
+
You can configure alerts to notify individuals when a specific metric crosses a threshold that you assigned to it. In this example, the alert is on the **Network Out Total** metric that's sent, but you can trigger the alert for many other metrics.
Copy file name to clipboardExpand all lines: articles/network-watcher/network-watcher-intrusion-detection-open-source-tools.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ This article explains how to set up your environment to perform network intrusio
22
22
23
23
Network Watcher gives you the packet captures for performing network intrusion detection. Suricata processes the packet captures and triggers alerts based on packets that match its rule set of threats. Suricata stores these alerts in a log file on your local machine.
24
24
25
-
By using the Elastic Stack, you can index the logs that Suricata generates and then use them to create a Kibana dashboard. A dashboard gives a visual representation of the logs and a means to quickly gain insights to potential network vulnerabilities.
25
+
By using the Elastic Stack, you can index the logs that Suricata generates and then use them to create a Kibana dashboard. A dashboard provides a visual representation of the logs and a way to quickly gain insights to potential network vulnerabilities.
26
26
27
27
:::image type="content" source="./media/network-watcher-intrusion-detection-open-source-tools/figure1.png" alt-text="Diagram that shows a simple web application scenario.":::
28
28
@@ -44,7 +44,7 @@ For other methods of installation, see the [Suricata installation quickstart gui
44
44
45
45
## Download the Emerging Threats rule set
46
46
47
-
At this stage, you don't have any rules for Suricata to run. You can create your own rules if there are specific threats to your network that you want to detect. You can also use developed rule sets from various providers, such as Emerging Threats or Talos rules from Snort. In this article, you use the freely available Emerging Threats rule set.
47
+
At this stage, you don't have any rules for Suricata to run. You can create your own rules if you want to detect specific threats to your network. You can also use developed rule sets from various providers, such as Emerging Threats or Talos rules from Snort. In this article, you use the freely available Emerging Threats rule set.
48
48
49
49
Download the rule set and copy it into the directory:
Although logs that Suricata produces contain valuable information about what's happening on your network, these log files aren't the easiest to read and understand. By connecting Suricata with the Elastic Stack, you can create a Kibana dashboard to search, graph, analyze, and derive insights from your logs.
73
+
Logs that Suricata produces contain valuable information about what's happening on your network, but these log files aren't the easiest to read and understand. By connecting Suricata with the Elastic Stack, you can create a Kibana dashboard to search, graph, analyze, and derive insights from your logs.
74
74
75
75
### Install Elasticsearch
76
76
77
-
1. Elastic Stack version 5.0 and later requires Java 8. Run the command `java -version` to check your version. If you don't have Java installed, refer to [documentation on the Azure-supported Java Development Kits](/azure/developer/java/fundamentals/java-support-on-azure).
77
+
1. Elastic Stack version 5.0 and later require Java 8. Run the command `java -version` to check your version. If you don't have Java installed, refer to [documentation on the Azure-supported Java Development Kits](/azure/developer/java/fundamentals/java-support-on-azure).
78
78
79
79
1. Download the correct binary package for your system:
Copy file name to clipboardExpand all lines: articles/network-watcher/network-watcher-using-open-source-tools.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ The resulting URL looks something like the following example: `http://storageacc
45
45
46
46
## Analyze packet captures
47
47
48
-
CapAnalysis offers various options to visualize your packet capture. Each one provides analysis from a different perspective. With these visual summaries, you can understand your network traffic trends and quickly spot any unusual activity.t
48
+
CapAnalysis offers various options to visualize your packet capture. Each one provides analysis from a different perspective. With these visual summaries, you can understand your network traffic trends and quickly spot any unusual activity.
49
49
50
50
The following list describes a few of the CapAnalysis features:
0 commit comments