Azure – Setup Azure Blueprints

Challenge: Separate subscriptions for multiple disciplines under the same Azure Active Directory Tenancy.

Required : Each subscription to have the same role assignments

Solution : Azure Blueprints to define a repeatable set of Azure resources

How ?

Azure Blueprints provides

  • Role & Policy Assignments
  • ARM templates
  • And Resource Groups

Reference guides

Getting Started Azure Blueprints (PREVIEW)

Creating Blueprint Guide – Focused on Roles

Create a blue print, if your new, start with a sample predefined Blueprint.

For this example I have selected Resource Groups with RBAC (Role-based Access Control)

Create blueprint> Enter Name, Description and Definition Location

Next : Artifacts

Click Save Draft


How to Publish Blueprint

Click Blueprints > Blueprint Definitions > Select the version to publish


Click Publish blueprint.

Enter version and change notes > Click Publish

Azure – Advisor

Sample screen shots of Azure Advisor

Recommendations : Cost , Security, High Availability, Performance, Operational Excellence

Example Recommendations report export, output as a PDF or CSV

Azure – AD Identity Protection

This feature looks to identify activity and assign a risk level. Risk detection and remediation”

All features look to be available in Azure AD Premium P2 and restricted number of features in Azure Premium P1 and Basic/Free.

Key differences are the notifications options only in Azure AD Premium P2.

There are three default polices

  1. User Risk
  2. Sign-In Risk
  3. MFA Registration

Example of the Identity Protection Policies

Reference How To Guides :

  1. How To: Configure the Azure Multi-Factor Authentication registration policy
  2. How To: Configure and enable risk policies
  3. How To : Identity protection configure notifications

Azure – Auto Shutdown “Save” Greyed Out

I recently tried to enable auto shutdown on a virtual machine. I wanted to receive a notification before auto-shutdown. But the option was greyed out.

It would appear if send notification is set to yes, then the Save option is greyed out. Set Notification to No and you can save the settings > Set the time and Save.

Is it a feature or a bug, this was my work around.. After you have enabled and set a time. Now edit again and set notifications, add and email address and Save is available.

Azure – Install and Configure Antimalware On A Virtual Machine

A Virtual machine must be running.

If a virtual machine is stopped your deployment will fail

Note a Charge

Steps to Install Extension for Microsoft Antimalware

Select Virtual Machine > Extensions > New Resource > Microsoft Antimalware > Install Extension

  • Set date and Scan time is set in minutes from midnight 60 = 1am, 120 = 2am etc

Deployment in progress

Installed and Configuration completed

Azure – Log Analytics Workspace and Virtual Machine Agent Install

How to prepare to collect security log data from your virtual machines. You require two things:

  1. Log Analystics Workspace to be created
  2. The agent to be installed on the Virtual machine.

This guide shows how to setup the workspace and install the agents on the virtual machine.

Create a Log Analytics Workspace

Pricing is Pay as you go

Next you connect to the data source

Click Virtual Machines > Select Virtual Machine and click Connect.

The Agent is then automatically installed and configured for the log analytics workspace

Azure – Access Control and Role Assignment

This example shows how to assign a user/group a role to admin virtual machines in a resource group.

How to steps..

Select “Resource Group” > IAM > Add > Select user or group and select a role – Ok

Azure – Configure Management Locks – Prevent Accidental Deletion Of Core Resources

Locking prevents the accidental deletion or modifying of critical resources. Example Azure Subscription, Resource Group, Network, Files, VMs.

How to configure Management locks to prevent the accidental deletion of core networks?

In this example we will put a “Delete” lock on a virtual network.

Virtual Network > Select the network > Locks > Add > Name + Set lock type to delete > Ok

Configured

To remove a lock / delete the lock

Simple SQL Injection Example – Review Security and Remediate

Something I regularly do, is review security against attacks and remediate if required.

This example is a simple SQL injection attack.

There is a few things in addition to code which can either prevent, log or alert this activity. Some examples listed below

  • Restrict special characters in usernames ( this wouldn’t pass the “*” )
  • Software Firewalls should block SQL injection ( This blocks the Select statements )
  • ATP (Advanced Threat Protection) monitoring access to the SQL database will alert also. (This can either log or block the traffic)

Example: Web Site – SQL injection in the username of a web portal

Username: “Select * From table 1”

Password : Blank

Result

Access Denied. Potential loophole is blocked.

Reason

One of the many firewall rules in place blocks SQL injection and the platform restricts special characters being used as usernames.