Skip to content

Commit d7ae69b

Browse files
committed
acrolinx
1 parent bf36910 commit d7ae69b

23 files changed

+202
-202
lines changed

ATADocs/ata-prerequisites.md

Lines changed: 27 additions & 27 deletions
Large diffs are not rendered by default.

ATADocs/ata-privacy-compliance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ ms.suite: ems
3030

3131
All data in ATA that relates to entities is derived from Active Directory (AD) and replicated to ATA from there. When searching for personal data, the first place you should consider searching is AD.
3232

33-
From the ATA Center, use the search bar to view the identifiable personal data that is stored in the database. Users can search for a specific user or device. Selecting the entity will open the user or device profile page. The profile provides you with the comprehensive details about the entity, it's history, and related network activity derived from AD.
33+
From the ATA Center, use the search bar to view the identifiable personal data that is stored in the database. Users can search for a specific user or device. Selecting the entity opens the user or device profile page. The profile provides you with the comprehensive details about the entity, its history, and related network activity derived from AD.
3434

3535
## Updating personal data
3636

@@ -58,7 +58,7 @@ Running this completely removes the entity with the UPN [email protected] from
5858

5959
### Delete entity activity data
6060

61-
This action permanently deletes an entity's activities data from the ATA database. All entities will are unchanged but the activities and security alerts related to them for the specified timeframe are deleted.
61+
This action permanently deletes an entity's activities data from the ATA database. All entities are unchanged but the activities and security alerts related to them for the specified timeframe are deleted.
6262

6363
To run this command, provide the command name `deleteOldData`, and the number of days of data you want to keep in the database.
6464

ATADocs/ata-resources.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
# required metadata
33

44
title: Advanced Threat Analytics resources and readiness roadmap
5-
description: Provides a list of ATA resources, videos, getting started, deployment and readiness roadmap links.
5+
description: Provides a list of ATA resources, videos, getting started, deployment, and readiness roadmap links.
66
ms.date: 01/10/2023
77
ms.topic: conceptual
88
ms.service: advanced-threat-analytics
@@ -24,7 +24,7 @@ ms.suite: ems
2424

2525
[!INCLUDE [Banner for top of topics](includes/banner.md)]
2626

27-
This article provides you a readiness roadmap that will assist you to get started with Advanced Threat Analytics.
27+
This article provides you with a readiness roadmap that assists you to get started with Advanced Threat Analytics.
2828

2929
## Understanding ATA
3030

@@ -47,31 +47,31 @@ ATA is composed of the ATA Center, which you can install on a server, and ATA Ga
4747
|Gateway sizing|Full Gateway, Lightweight Gateway|
4848
|Certificates|PKI, self-signed|
4949

50-
If you are using physical servers, you should plan capacity. You can get help from the sizing tool to allocate space for ATA:
50+
If you're using physical servers, you should plan capacity. You can get help from the sizing tool to allocate space for ATA:
5151

5252
[ATA sizing tool](ata-capacity-planning.md) - The sizing tool automates the collection of the amount of traffic ATA needs. It automatically provides supportability and resource recommendations for both the ATA Center and ATA Lightweight Gateways.
5353

5454
[ATA capacity planning](ata-capacity-planning.md)
5555

5656
## Deploy ATA
5757

58-
These resources will help you download and install the ATA Center, connect to Active Directory, download the ATA Gateway package, set up event collection, and optionally integrate with your VPN and set up honeytoken accounts and exclusions.
58+
These resources help you download and install the ATA Center, connect to Active Directory, download the ATA Gateway package, set up event collection, and optionally integrate with your VPN and set up honeytoken accounts and exclusions.
5959

6060
[Download ATA](install-ata-step1.md#step-1-download-and-install-the-ata-center)
6161

6262
[ATA POC playbook](https://aka.ms/ataplaybook) - Guide to all the steps necessary to do a successful POC deployment of ATA.
6363

6464
## ATA settings
6565

66-
The basic necessary settings in ATA are configured as part of the installation wizard. However, there are a number of other settings that you can configure to fine-tune ATA that makes detections more accurate for your environment, such as SIEM integration and audit settings.
66+
The basic necessary settings in ATA are configured as part of the installation wizard. However, there are many other settings that you can configure to fine-tune ATA that makes detections more accurate for your environment, such as SIEM integration and audit settings.
6767

6868
[Audit settings](https://github.com/microsoft/Azure-Advanced-Threat-Protection/tree/master/Auditing) – Audit your domain controller health before and after an ATA deployment.
6969

7070
[ATA general documentation](index.yml)
7171

7272
## Work with ATA
7373

74-
After ATA is up and running, you can view suspicious activities that are detected in the Attack timeline. This is the default landing page you are taken to when you log in to the ATA Console. By default, all open suspicious activities are shown on the attack time line. You can also see the severity assigned to each activity. Investigate each suspicious activity by drilling down into the entities (computers, devices, users) to open their profile pages that provide more information. These resources will help you work with ATA's suspicious activities:
74+
After ATA is up and running, you can view suspicious activities that are detected in the Attack timeline. This is the default landing page you're taken to when you sign in to the ATA Console. By default, all open suspicious activities are shown on the attack time line. You can also see the severity assigned to each activity. Investigate each suspicious activity by drilling down into the entities (computers, devices, users) to open their profile pages that provide more information. These resources help you work with ATA's suspicious activities:
7575

7676
[ATA suspicious activity playbook](/samples/browse/?redirectedfrom=TechNet-Gallery) - This article walks you through credential theft attack techniques using readily available research tools on the internet. At each point of the attack, you can see how ATA helps you gain visibility into these threats.
7777

ATADocs/ata-technical-faq.yml

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ sections:
3232
answer: |
3333
If you have an active Enterprise Agreement, you can download the software from the Microsoft Volume Licensing Center (VLSC).
3434
35-
If you acquired a license for Enterprise Mobility + Security (EMS) directly via the Microsoft 365 portal or through the Cloud Solution Partner (CSP) licensing model and you do not have access to ATA through the Microsoft Volume Licensing Center (VLSC), contact Microsoft Customer Support to obtain the process to activate Advanced Threat Analytics (ATA).
35+
If you acquired a license for Enterprise Mobility + Security (EMS) directly via the Microsoft 365 portal or through the Cloud Solution Partner (CSP) licensing model and you don't have access to ATA through the Microsoft Volume Licensing Center (VLSC), contact Microsoft Customer Support to obtain the process to activate Advanced Threat Analytics (ATA).
3636
3737
- question: |
3838
What should I do if the ATA Gateway won't start?
@@ -84,12 +84,12 @@ sections:
8484
- question: |
8585
Does ATA work with encrypted traffic?
8686
answer: |
87-
ATA relies on analyzing multiple network protocols, as well as events collected from the SIEM or via Windows Event Forwarding. Detections based on network protocols with encrypted traffic (for example, LDAPS and IPSEC) will not be analyzed.
87+
ATA relies on analyzing multiple network protocols, and events collected from the SIEM or via Windows Event Forwarding. Detections based on network protocols with encrypted traffic (for example, LDAPS and IPSEC) won't be analyzed.
8888
8989
- question: |
9090
Does ATA work with Kerberos Armoring?
9191
answer: |
92-
Enabling Kerberos Armoring, also known as Flexible Authentication Secure Tunneling (FAST), is supported by ATA, with the exception of over-pass the hash detection which will not work.
92+
Enabling Kerberos Armoring, also known as Flexible Authentication Secure Tunneling (FAST), is supported by ATA, with the exception of over-pass the hash detection which won't work.
9393
9494
- question: |
9595
How many ATA Gateways do I need?
@@ -99,7 +99,7 @@ sections:
9999
- question: |
100100
How much storage do I need for ATA?
101101
answer: |
102-
For every one full day with an average of 1000 packets/sec you need 0.3 GB of storage. For more information about ATA Center sizing see, [ATA Capacity Planning](ata-capacity-planning.md).
102+
For every one full day with an average of 1000 packets/sec you need 0.3 GB of storage. For more information about ATA Center sizing, see, [ATA Capacity Planning](ata-capacity-planning.md).
103103
104104
- question: |
105105
Why are certain accounts considered sensitive?
@@ -108,7 +108,7 @@ sections:
108108
109109
To understand why an account is sensitive you can review its group membership to understand which sensitive groups it belongs to (the group that it belongs to can also be sensitive due to another group, so the same process should be performed until you locate the highest level sensitive group).
110110
111-
In addition, you can manually tag a user, group or computer as sensitive. For more information, see [Tag sensitive accounts](tag-sensitive-accounts.md).
111+
In addition, you can manually tag a user, group, or computer as sensitive. For more information, see [Tag sensitive accounts](tag-sensitive-accounts.md).
112112
113113
- question: |
114114
How do I monitor a virtual domain controller using ATA?
@@ -120,7 +120,7 @@ sections:
120120
The easiest way is to have a virtual ATA Gateway on every host where a virtual domain controller exists. If your virtual domain controllers move between hosts, you need to perform one of the following steps:
121121
122122
- When the virtual domain controller moves to another host, preconfigure the ATA Gateway in that host to receive the traffic from the recently moved virtual domain controller.
123-
- Make sure that you affiliate the virtual ATA Gateway with the virtual domain controller so that if it is moved, the ATA Gateway moves with it.
123+
- Make sure that you affiliate the virtual ATA Gateway with the virtual domain controller so that if it's moved, the ATA Gateway moves with it.
124124
- There are some virtual switches that can send traffic between hosts.
125125
126126
- question: |
@@ -137,12 +137,12 @@ sections:
137137
- question: |
138138
What kind of storage do I need for ATA?
139139
answer: |
140-
We recommend fast storage (7200-RPM disks are not recommended) with low latency disk access (less than 10 ms). The RAID configuration should support heavy write loads (RAID-5/6 and their derivatives are not recommended).
140+
We recommend fast storage (7200-RPM disks aren't recommended) with low latency disk access (less than 10 ms). The RAID configuration should support heavy write loads (RAID-5/6 and their derivatives aren't recommended).
141141
142142
- question: |
143143
How many NICs does the ATA Gateway require?
144144
answer: |
145-
The ATA Gateway needs a minimum of two network adapters:<br>1. A NIC to connect to the internal network and the ATA Center<br>2. A NIC that is used to capture the domain controller network traffic via port mirroring.<br>* This does not apply to the ATA Lightweight Gateway, which natively uses all of the network adapters that the domain controller uses.
145+
The ATA Gateway needs a minimum of two network adapters:<br>1. A NIC to connect to the internal network and the ATA Center<br>2. A NIC that is used to capture the domain controller network traffic via port mirroring.<br>* This doesn't apply to the ATA Lightweight Gateway, which natively uses all of the network adapters that the domain controller uses.
146146
147147
- question: |
148148
What kind of integration does ATA have with SIEMs?
@@ -165,20 +165,20 @@ sections:
165165
- question: |
166166
Is this going to be a part of Microsoft Entra ID or on-premises Active Directory?
167167
answer: |
168-
This solution is currently a standalone offering—it is not a part of Microsoft Entra ID or on-premises Active Directory.
168+
This solution is currently a standalone offering—it isn't a part of Microsoft Entra ID or on-premises Active Directory.
169169
170170
- question: |
171171
Do you have to write your own rules and create a threshold/baseline?
172172
answer: |
173-
With Microsoft Advanced Threat Analytics, there is no need to create rules, thresholds, or baselines and then fine-tune. ATA analyzes the behaviors among users, devices, and resources—as well as their relationship to one another—and can detect suspicious activity and known attacks fast. Three weeks after deployment, ATA starts to detect behavioral suspicious activities. On the other hand, ATA will start detecting known malicious attacks and security issues immediately after deployment.
173+
With Microsoft Advanced Threat Analytics, there's no need to create rules, thresholds, or baselines and then fine-tune. ATA analyzes the behaviors among users, devices, and resources—as well as their relationship to one another—and can detect suspicious activity and known attacks fast. Three weeks after deployment, ATA starts to detect behavioral suspicious activities. On the other hand, ATA will start detecting known malicious attacks and security issues immediately after deployment.
174174
175175
- question: |
176-
If you are already breached, can Microsoft Advanced Threat Analytics identify abnormal behavior?
176+
If you're already breached, can Microsoft Advanced Threat Analytics identify abnormal behavior?
177177
answer: |
178-
Yes, even when ATA is installed after you have been breached, ATA can still detect suspicious activities of the hacker. ATA is not only looking at the user's behavior but also against the other users in the organization security map. During the initial analysis time, if the attacker's behavior is abnormal, then it is identified as an "outlier" and ATA keeps reporting on the abnormal behavior. Additionally ATA can detect the suspicious activity if the hacker attempts to steal another users credentials, such as Pass-the-Ticket, or attempts to perform a remote execution on one of the domain controllers.
178+
Yes, even when ATA is installed after you have been breached, ATA can still detect suspicious activities of the hacker. ATA isn't only looking at the user's behavior but also against the other users in the organization security map. During the initial analysis time, if the attacker's behavior is abnormal, then it's identified as an "outlier" and ATA keeps reporting on the abnormal behavior. Additionally ATA can detect the suspicious activity if the hacker attempts to steal another user's credentials, such as Pass-the-Ticket, or attempts to perform a remote execution on one of the domain controllers.
179179
180180
- question: |
181-
Does this only leverage traffic from Active Directory?
181+
Does this only use traffic from Active Directory?
182182
answer: |
183183
In addition to analyzing Active Directory traffic using deep packet inspection technology, ATA can also collect relevant events from your Security Information and Event Management (SIEM) and create entity profiles based on information from Active Directory Domain Services. ATA can also collect events from the event logs if the organization configures Windows Event Log forwarding.
184184
@@ -193,9 +193,9 @@ sections:
193193
No. ATA monitors all devices in the network performing authentication and authorization requests against Active Directory, including non-Windows and mobile devices.
194194
195195
- question: |
196-
Does ATA monitor computer accounts as well as user accounts?
196+
Does ATA monitor computer accounts and user accounts?
197197
answer: |
198-
Yes. Since computer accounts (as well as any other entities) can be used to perform malicious activities, ATA monitors all computer accounts behavior and all other entities in the environment.
198+
Yes. Since computer accounts (and any other entities) can be used to perform malicious activities, ATA monitors all computer accounts behavior and all other entities in the environment.
199199
200200
- question: |
201201
Can ATA support multi-domain and multi-forest?
@@ -205,7 +205,7 @@ sections:
205205
- question: |
206206
Can you see the overall health of the deployment?
207207
answer: |
208-
Yes, you can view the overall health of the deployment as well as specific issues related to configuration, connectivity etc., and you are alerted as they occur.
208+
Yes, you can view the overall health of the deployment and specific issues related to configuration, connectivity, etc., and you're alerted as they occur.
209209
210210
additionalContent: |
211211

0 commit comments

Comments
 (0)