Duration: 40 minutes
Please make sure that you successfully completed Challenge 5 before continuing with this challenge.
In Challenge 5 we migrated two servers to Azure. The servers are already protected by the basic services of Defender for Cloud. In this challenge, we'll improve significantly the protection level by activating advanced services such as "Cloud Security Posture Management (CSPM)" and "Cloud Workload Protection (CWP)" (Defender for Server).
To enable the advanced Defender for Cloud components, open the portal and select Defender for Cloud. Under Management, select the Environment Settings to define the Defender for Cloud setting for the subscription.
In the settings, enable Defender CSPM and Defender for Server plans to better protect the migrated servers from threats. After enabling the plans, use the "Settings" link for both plans and verify that all features are enabled. Finally Save the new configuration.
Verify the Defender CSPM Settings & monitoring details
Verify the Defender for Server Settings & monitoring details
Note
It takes a few minutes for the new settings to be applied and for more agents to be installed on the servers.
To check if Defender for Server was successfully activated on the virtual machines, open the portal and select Virtual Machines and select a Windows Server. Under Operations' select to run a command and chose to run a PowerShell script/command.
Run the Get-MpComputerStatus cmdlet to get the status of antimalware software installed on the virtual machine.
On a Linux machine you run a shell script instead of PowerShell - the commandline mdatp health will return the health of the Defender for Endpoint on a Linux box.
In the next step, we check whether the infection with malware is reported to Azure, so that appropriate reactions can be triggered based on an alert - e.g. inform administrators, open an incident or follow up on the problem and initiate appropriate measures or react to such incidents with automatic rules.
Open the portal and select Virtual Machines and select a Windows Server. Select Connect and establish a connection with the virtual machines using Bastion.
The European Institute for Computer Antivirus Research (EICAR) and Computer Antivirus Research Organization (CARO), provide a harmless test file to test the response of computer antivirus programs. Instead of using real malware, which could cause real damage, this test file allows people to test anti-virus software without having to use a real computer virus. Open the following UIRL in a browser in the virtual machine: https://www.eicar.org/download-anti-malware-testfile/
Scroll down a bit until you can see the 68 character long EICAR string.
We will not try to download a test-file from the website, because this will be blocked by the browser already. Instead, we will create a new file on the virtual machine and paste the EICAR string into and try to safe the file.
Select the EICAR String and copy it into the clipboard. Create a new file on the desktop and paste the EICAR string into the file.
Try to safe the file. Defender for Endpoint will trigger - it'll quarantine the file and and display a warning on the local server.
Next, we will double-check if this alert was forwarded to Azure. Open the portal and select Defender for Cloud and select Security Alerts. EICAR malware detections are reported with severity "Informational" - to include these alerts in the view you need to change the filter: Add severity "informational" in the filter settings - and the security alerts will be displayed.
The challenges in this Microhack were designed to be simple and implemented straight forward as virtual machines in a single subscription. The implementation of a secure and scalable landing zone according to the best practices from the Cloud Adaption Framework (What is an Azure landing zone? - Cloud Adoption Framework | Microsoft Learn) was waived for the sake of simplicity.
On the other hand, this now causes Defender for Cloud making a number of recommendations on how to proactively improve the security of the environment. To view general security recommendations for the managed virtual machines, please open the portal and select Defender for Cloud. Under Security Posture, you can view the recommendations in detail.
Click on Security Posture to view a list of recommendations for the various resource being used.
The list of recommendations for your environment will look slightly different than in this screenshot, because the resource that you've installed might experience different vulnerabilities. Review the recommendations and click them to view the details. In the details for each recommendation, you'll find a description, you can assign the recommendation to a user for implementation or you can create an exempt.
Go back to Defender for Cloud and click on Attack path analysis - this will provide you an overview about specific vulnerabilities in your environment and how they can be utilized by attackers to compromise your environment.
In this Microhack, we deployed virtual machines that use public IP addresses and are directly exposed to the internet - this is straight forward, but for sure not a best practice. Click on one of the Attack paths to learn more about the details of this attack vector.
Sign in to Copilot for Security (https://securitycopilot.microsoft.com).
You successfully completed challenge 6! 🚀🚀🚀
🚀🚀🚀 !!!Congratulations!!! - You successfully completed the MicroHack. You can now safley remove the source-rg and destination-rg Resource Groups. 🚀🚀🚀















