AZ-304 Microsoft Azure Architect Design – Design a Monitoring Strategy for Identity and Security

  • By
  • January 17, 2023
0 Comment

1. Using Privileged Identity Management Alerts

So let’s wrap up the discussion of identity and security with a discussion of monitoring identity and security. Now monitoring is always going to be a key feature. We’ll talk about it when we’re talking about data. We’re going to talk about it in other sections of this course. But monitoring identity is something that some people don’t even think to do. They set up the security, they make their Azure ad managing the user and passwords, and maybe they use Privilege Identity Management to add additional layer security for administrators.

They use conditional access to prevent some of those obvious attacks. And it would be good to be able to set up a type of monitoring or reporting for some of these things. Now you can set up alerts. Azure’s privileged identity management module does have an alert feature. If we go into it, we can see under PIM, under roles, you can see alerts and there’s some predefined alerts. So you don’t even have to sort of dream up what it is that you want to be alerted about. If there are too many administrators, that’s an alert. If there is roles that are being assigned outside of privileged identity management, that could be an alert, et cetera.

And so setting up the security such that if people are doing things that you want to be notified about, there’s five of them on screen that you predefined that you can choose from. Those are basically a predefined set of potential policy violations and so you can just sort of choose from that list. Now under each of those, like it says, too many administrators.

Well, what is too many? You can go into each of those alerts and there’s going to be settings and you can say, okay, I want to be notified if there’s more than ten global administrators on my account. And for your organization, that would be like an excessive number for other organizations that might not be. So for instance, one of the alerts says administrators aren’t using their privileged roles. So if you are given administrator permissions, but you haven’t actually used an administrator permission in 30 days, well that could be something that needs to be alerted about. So in this case you can just set that and you see you the slider looks like it can probably go up to six months or more. So you can just basically choose what is an appropriate amount.

2. Other Ways to Monitor the Security of Identity

So we’re talking about monitoring of identity and security. And what is basically our approach to monitoring identity security? Well, our approach is basically to start from the beginning. You know, if we look at identity, the fact that you’ve got maybe tens of thousands of users in your organization and they’ve all got various levels of permission, it’s a very daunting task to try to ensure that everyone’s got the right levels of permission and that unauthorized people are not getting in. And we can really look at identity as being this sort of the doorway, right? There’s probably other ways to hack into your system that is not relating to identity.

But if someone can get that working, administrator, user ID, and password, and that’s all they need to get into your application, well, it’s like having the key to your house. So identity is the door and you want to secure that door. What I would suggest is that we start when we’re doing auditing and monitoring, is we want to start from the very beginning. A lot of companies have an on premises Active Directory and are using a synchronization tool to synchronize that into Azure ad. Well, if your on premises ad is not secure, well, then those people are going to be able to get into your Azure Accounts and your Azure Ads. So security is going to start with your on premises ad. Who has access to that and how is that controlled outside that? The scope of this course obviously talk about securing on premises Active Directory, but that’s where it starts.

So your security of your entire system is the root, the seed, if you will, is the on premises Active Directory. We use Ad Connect to get from our on premises Active Directory users into Azure Active Directory. We already talked about Ad Connect health to make sure that is working and secure, getting various reports about how the synchronization is going. You can monitor Ad Connect in order to monitor the health of the connection. When you go into Azure, you can go into Log Analytics. Now, Log Analytics allows you access to various security logs. So Log Analytics has a back end connection into subscriptions and resource groups and IAM itself.

And so if you want to see who’s getting access, who’s denied access, you can set up and run reports within Log Analytics. Another policy and strategy, of course, is to make sure your systems are up to date. We’ve seen examples in the past few years of companies who didn’t have a patching strategy or let some of their Java struts versions get out of date and there becomes a known exploit and those systems can basically be hacked. And so making sure that you’re running Firewalls Antivirus and all your OS is making sure that all of your software that you’re being used is up to date in terms of the latest patches. Pay attention when the companies are coming out and saying patch. Now we’ve got a vulnerability that is now a zero day exploit. Get that updated. That’s part of the policy. And you’re going to have to ensure as the security part make sure the people that are running those systems are not falling.

Comments
* The most recent comment are at the top

Interesting posts

Preparing for Juniper Networks JNCIA-Junos Exam: Key Topics and Mock Exam Resources

So, you’ve decided to take the plunge and go for the Juniper Networks JNCIA-Junos certification, huh? Great choice! This certification serves as a robust foundation for anyone aiming to build a career in networking. However, preparing for the exam can be a daunting task. The good news is that this guide covers the key topics… Read More »

Mastering Microsoft Azure Fundamentals AZ-900: Essential Study Materials

Ever wondered how businesses run these days without giant server rooms? That’s the magic of cloud computing, and Microsoft Azure is a leading cloud platform. Thinking about a career in this exciting field? If so, mastering the Microsoft Certified: Azure Fundamentals certification through passing the AZ-900 exam is the perfect starting point for you. This… Read More »

The Impact of Remote Work on IT Certification Exam Processes

With remote work becoming the new norm, it’s not just our daily routines that have changed but also how we tackle IT certification exams. Gone are the days of trekking to testing centers; now, your living room can double as an exam room. This shift has brought about some fascinating changes and challenges. Let’s dive… Read More »

IT Risk Management: CRISC Certification Exam Essentials

Do you ever feel like the IT world is moving at warp speed? New tech seems to pop up every day, leaving you wondering how to keep up and truly stand out in your field. Companies are increasingly concerned about online threats, data leaks, and meeting legal requirements. That’s where the CRISC (Certified in Risk… Read More »

The Ultimate Guide to Mastering Marketing Automation for Email Wizards

Hey there, email aficionados! Welcome to your new favorite read – the one that’s going to turbocharge your email marketing game. You’re about to dive into the captivating world of marketing automation, a place where efficiency meets effectiveness, letting you boost your campaigns without breaking a sweat. Get ready to discover how automation can not… Read More »

Master YouTube Marketing with These 10 Powerful Steps

Welcome to the dynamic world of YouTube marketing! Whether you’re a seasoned pro or just getting started, harnessing the power of YouTube can significantly boost your brand’s visibility and engagement. With over 2 billion monthly active users, YouTube offers a vast audience for your content. But how do you stand out in such a crowded… Read More »

sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |