You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATADocs/ata-privacy-compliance.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ ms.suite: ems
30
30
31
31
All data in ATA that relates to entities is derived from Active Directory (AD) and replicated to ATA from there. When searching for personal data, the first place you should consider searching is AD.
32
32
33
-
From the ATA Center, use the search bar to view the identifiable personal data that is stored in the database. Users can search for a specific user or device. Selecting the entity will open the user or device profile page. The profile provides you with the comprehensive details about the entity, it's history, and related network activity derived from AD.
33
+
From the ATA Center, use the search bar to view the identifiable personal data that is stored in the database. Users can search for a specific user or device. Selecting the entity opens the user or device profile page. The profile provides you with the comprehensive details about the entity, its history, and related network activity derived from AD.
34
34
35
35
## Updating personal data
36
36
@@ -58,7 +58,7 @@ Running this completely removes the entity with the UPN [email protected] from
58
58
59
59
### Delete entity activity data
60
60
61
-
This action permanently deletes an entity's activities data from the ATA database. All entities will are unchanged but the activities and security alerts related to them for the specified timeframe are deleted.
61
+
This action permanently deletes an entity's activities data from the ATA database. All entities are unchanged but the activities and security alerts related to them for the specified timeframe are deleted.
62
62
63
63
To run this command, provide the command name `deleteOldData`, and the number of days of data you want to keep in the database.
If you are using physical servers, you should plan capacity. You can get help from the sizing tool to allocate space for ATA:
50
+
If you're using physical servers, you should plan capacity. You can get help from the sizing tool to allocate space for ATA:
51
51
52
52
[ATA sizing tool](ata-capacity-planning.md) - The sizing tool automates the collection of the amount of traffic ATA needs. It automatically provides supportability and resource recommendations for both the ATA Center and ATA Lightweight Gateways.
53
53
54
54
[ATA capacity planning](ata-capacity-planning.md)
55
55
56
56
## Deploy ATA
57
57
58
-
These resources will help you download and install the ATA Center, connect to Active Directory, download the ATA Gateway package, set up event collection, and optionally integrate with your VPN and set up honeytoken accounts and exclusions.
58
+
These resources help you download and install the ATA Center, connect to Active Directory, download the ATA Gateway package, set up event collection, and optionally integrate with your VPN and set up honeytoken accounts and exclusions.
[ATA POC playbook](https://aka.ms/ataplaybook) - Guide to all the steps necessary to do a successful POC deployment of ATA.
63
63
64
64
## ATA settings
65
65
66
-
The basic necessary settings in ATA are configured as part of the installation wizard. However, there are a number of other settings that you can configure to fine-tune ATA that makes detections more accurate for your environment, such as SIEM integration and audit settings.
66
+
The basic necessary settings in ATA are configured as part of the installation wizard. However, there are many other settings that you can configure to fine-tune ATA that makes detections more accurate for your environment, such as SIEM integration and audit settings.
67
67
68
68
[Audit settings](https://github.com/microsoft/Azure-Advanced-Threat-Protection/tree/master/Auditing) – Audit your domain controller health before and after an ATA deployment.
69
69
70
70
[ATA general documentation](index.yml)
71
71
72
72
## Work with ATA
73
73
74
-
After ATA is up and running, you can view suspicious activities that are detected in the Attack timeline. This is the default landing page you are taken to when you log in to the ATA Console. By default, all open suspicious activities are shown on the attack time line. You can also see the severity assigned to each activity. Investigate each suspicious activity by drilling down into the entities (computers, devices, users) to open their profile pages that provide more information. These resources will help you work with ATA's suspicious activities:
74
+
After ATA is up and running, you can view suspicious activities that are detected in the Attack timeline. This is the default landing page you're taken to when you sign in to the ATA Console. By default, all open suspicious activities are shown on the attack time line. You can also see the severity assigned to each activity. Investigate each suspicious activity by drilling down into the entities (computers, devices, users) to open their profile pages that provide more information. These resources help you work with ATA's suspicious activities:
75
75
76
76
[ATA suspicious activity playbook](/samples/browse/?redirectedfrom=TechNet-Gallery) - This article walks you through credential theft attack techniques using readily available research tools on the internet. At each point of the attack, you can see how ATA helps you gain visibility into these threats.
Copy file name to clipboardExpand all lines: ATADocs/ata-technical-faq.yml
+16-16Lines changed: 16 additions & 16 deletions
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ sections:
32
32
answer: |
33
33
If you have an active Enterprise Agreement, you can download the software from the Microsoft Volume Licensing Center (VLSC).
34
34
35
-
If you acquired a license for Enterprise Mobility + Security (EMS) directly via the Microsoft 365 portal or through the Cloud Solution Partner (CSP) licensing model and you do not have access to ATA through the Microsoft Volume Licensing Center (VLSC), contact Microsoft Customer Support to obtain the process to activate Advanced Threat Analytics (ATA).
35
+
If you acquired a license for Enterprise Mobility + Security (EMS) directly via the Microsoft 365 portal or through the Cloud Solution Partner (CSP) licensing model and you don't have access to ATA through the Microsoft Volume Licensing Center (VLSC), contact Microsoft Customer Support to obtain the process to activate Advanced Threat Analytics (ATA).
36
36
37
37
- question: |
38
38
What should I do if the ATA Gateway won't start?
@@ -84,12 +84,12 @@ sections:
84
84
- question: |
85
85
Does ATA work with encrypted traffic?
86
86
answer: |
87
-
ATA relies on analyzing multiple network protocols, as well as events collected from the SIEM or via Windows Event Forwarding. Detections based on network protocols with encrypted traffic (for example, LDAPS and IPSEC) will not be analyzed.
87
+
ATA relies on analyzing multiple network protocols, and events collected from the SIEM or via Windows Event Forwarding. Detections based on network protocols with encrypted traffic (for example, LDAPS and IPSEC) won't be analyzed.
88
88
89
89
- question: |
90
90
Does ATA work with Kerberos Armoring?
91
91
answer: |
92
-
Enabling Kerberos Armoring, also known as Flexible Authentication Secure Tunneling (FAST), is supported by ATA, with the exception of over-pass the hash detection which will not work.
92
+
Enabling Kerberos Armoring, also known as Flexible Authentication Secure Tunneling (FAST), is supported by ATA, with the exception of over-pass the hash detection which won't work.
93
93
94
94
- question: |
95
95
How many ATA Gateways do I need?
@@ -99,7 +99,7 @@ sections:
99
99
- question: |
100
100
How much storage do I need for ATA?
101
101
answer: |
102
-
For every one full day with an average of 1000 packets/sec you need 0.3 GB of storage. For more information about ATA Center sizing see, [ATA Capacity Planning](ata-capacity-planning.md).
102
+
For every one full day with an average of 1000 packets/sec you need 0.3 GB of storage. For more information about ATA Center sizing, see, [ATA Capacity Planning](ata-capacity-planning.md).
103
103
104
104
- question: |
105
105
Why are certain accounts considered sensitive?
@@ -108,7 +108,7 @@ sections:
108
108
109
109
To understand why an account is sensitive you can review its group membership to understand which sensitive groups it belongs to (the group that it belongs to can also be sensitive due to another group, so the same process should be performed until you locate the highest level sensitive group).
110
110
111
-
In addition, you can manually tag a user, group or computer as sensitive. For more information, see [Tag sensitive accounts](tag-sensitive-accounts.md).
111
+
In addition, you can manually tag a user, group, or computer as sensitive. For more information, see [Tag sensitive accounts](tag-sensitive-accounts.md).
112
112
113
113
- question: |
114
114
How do I monitor a virtual domain controller using ATA?
@@ -120,7 +120,7 @@ sections:
120
120
The easiest way is to have a virtual ATA Gateway on every host where a virtual domain controller exists. If your virtual domain controllers move between hosts, you need to perform one of the following steps:
121
121
122
122
- When the virtual domain controller moves to another host, preconfigure the ATA Gateway in that host to receive the traffic from the recently moved virtual domain controller.
123
-
- Make sure that you affiliate the virtual ATA Gateway with the virtual domain controller so that if it is moved, the ATA Gateway moves with it.
123
+
- Make sure that you affiliate the virtual ATA Gateway with the virtual domain controller so that if it's moved, the ATA Gateway moves with it.
124
124
- There are some virtual switches that can send traffic between hosts.
125
125
126
126
- question: |
@@ -137,12 +137,12 @@ sections:
137
137
- question: |
138
138
What kind of storage do I need for ATA?
139
139
answer: |
140
-
We recommend fast storage (7200-RPM disks are not recommended) with low latency disk access (less than 10 ms). The RAID configuration should support heavy write loads (RAID-5/6 and their derivatives are not recommended).
140
+
We recommend fast storage (7200-RPM disks aren't recommended) with low latency disk access (less than 10 ms). The RAID configuration should support heavy write loads (RAID-5/6 and their derivatives aren't recommended).
141
141
142
142
- question: |
143
143
How many NICs does the ATA Gateway require?
144
144
answer: |
145
-
The ATA Gateway needs a minimum of two network adapters:<br>1. A NIC to connect to the internal network and the ATA Center<br>2. A NIC that is used to capture the domain controller network traffic via port mirroring.<br>* This does not apply to the ATA Lightweight Gateway, which natively uses all of the network adapters that the domain controller uses.
145
+
The ATA Gateway needs a minimum of two network adapters:<br>1. A NIC to connect to the internal network and the ATA Center<br>2. A NIC that is used to capture the domain controller network traffic via port mirroring.<br>* This doesn't apply to the ATA Lightweight Gateway, which natively uses all of the network adapters that the domain controller uses.
146
146
147
147
- question: |
148
148
What kind of integration does ATA have with SIEMs?
@@ -165,20 +165,20 @@ sections:
165
165
- question: |
166
166
Is this going to be a part of Microsoft Entra ID or on-premises Active Directory?
167
167
answer: |
168
-
This solution is currently a standalone offering—it is not a part of Microsoft Entra ID or on-premises Active Directory.
168
+
This solution is currently a standalone offering—it isn't a part of Microsoft Entra ID or on-premises Active Directory.
169
169
170
170
- question: |
171
171
Do you have to write your own rules and create a threshold/baseline?
172
172
answer: |
173
-
With Microsoft Advanced Threat Analytics, there is no need to create rules, thresholds, or baselines and then fine-tune. ATA analyzes the behaviors among users, devices, and resources—as well as their relationship to one another—and can detect suspicious activity and known attacks fast. Three weeks after deployment, ATA starts to detect behavioral suspicious activities. On the other hand, ATA will start detecting known malicious attacks and security issues immediately after deployment.
173
+
With Microsoft Advanced Threat Analytics, there's no need to create rules, thresholds, or baselines and then fine-tune. ATA analyzes the behaviors among users, devices, and resources—as well as their relationship to one another—and can detect suspicious activity and known attacks fast. Three weeks after deployment, ATA starts to detect behavioral suspicious activities. On the other hand, ATA will start detecting known malicious attacks and security issues immediately after deployment.
174
174
175
175
- question: |
176
-
If you are already breached, can Microsoft Advanced Threat Analytics identify abnormal behavior?
176
+
If you're already breached, can Microsoft Advanced Threat Analytics identify abnormal behavior?
177
177
answer: |
178
-
Yes, even when ATA is installed after you have been breached, ATA can still detect suspicious activities of the hacker. ATA is not only looking at the user's behavior but also against the other users in the organization security map. During the initial analysis time, if the attacker's behavior is abnormal, then it is identified as an "outlier" and ATA keeps reporting on the abnormal behavior. Additionally ATA can detect the suspicious activity if the hacker attempts to steal another users credentials, such as Pass-the-Ticket, or attempts to perform a remote execution on one of the domain controllers.
178
+
Yes, even when ATA is installed after you have been breached, ATA can still detect suspicious activities of the hacker. ATA isn't only looking at the user's behavior but also against the other users in the organization security map. During the initial analysis time, if the attacker's behavior is abnormal, then it's identified as an "outlier" and ATA keeps reporting on the abnormal behavior. Additionally ATA can detect the suspicious activity if the hacker attempts to steal another user's credentials, such as Pass-the-Ticket, or attempts to perform a remote execution on one of the domain controllers.
179
179
180
180
- question: |
181
-
Does this only leverage traffic from Active Directory?
181
+
Does this only use traffic from Active Directory?
182
182
answer: |
183
183
In addition to analyzing Active Directory traffic using deep packet inspection technology, ATA can also collect relevant events from your Security Information and Event Management (SIEM) and create entity profiles based on information from Active Directory Domain Services. ATA can also collect events from the event logs if the organization configures Windows Event Log forwarding.
184
184
@@ -193,9 +193,9 @@ sections:
193
193
No. ATA monitors all devices in the network performing authentication and authorization requests against Active Directory, including non-Windows and mobile devices.
194
194
195
195
- question: |
196
-
Does ATA monitor computer accounts as well as user accounts?
196
+
Does ATA monitor computer accounts and user accounts?
197
197
answer: |
198
-
Yes. Since computer accounts (as well as any other entities) can be used to perform malicious activities, ATA monitors all computer accounts behavior and all other entities in the environment.
198
+
Yes. Since computer accounts (and any other entities) can be used to perform malicious activities, ATA monitors all computer accounts behavior and all other entities in the environment.
199
199
200
200
- question: |
201
201
Can ATA support multi-domain and multi-forest?
@@ -205,7 +205,7 @@ sections:
205
205
- question: |
206
206
Can you see the overall health of the deployment?
207
207
answer: |
208
-
Yes, you can view the overall health of the deployment as well as specific issues related to configuration, connectivity etc., and you are alerted as they occur.
208
+
Yes, you can view the overall health of the deployment and specific issues related to configuration, connectivity, etc., and you're alerted as they occur.
0 commit comments