Event banner
Microsoft Detection and Response Team (DART) AMA
Event details
We are very excited to announce our Microsoft Detection and Response Team (DART) AMA!
About DART:
Our job is to respond to compromises and help our customers become cyber-resilient. This is also our team mission. One we take very seriously. And it’s why we are passionate about what we do for our customers. Curious about stories from the front lines of incident response, customer engagements, or the tools we use? Ask us anything.
An AMA is a live text-based online event similar to a “YamJam” on Yammer or an “Ask Me Anything” on Reddit. This AMA gives you the opportunity to connect with Microsoft product experts who will be on hand to answer your questions and listen to feedback.
Feel free to post your questions for the DART team anytime in the comments below beforehand, if it fits your schedule or time zone better, though questions will not be answered until the live hour.
57 Comments
- David_OldsOccasional ReaderI have a customer who lost their global admin and also lost access to email and M365 functions. This is a university. The customer has opened up the CA to allow global access, which is not desirable. The original ticket 2307300040000701 was rejected, however as a university the customer has not been able to operate. The customer did notice that a new global admin was created, shortly before the issues started to occur and they are not aware of the person. I am reaching out for help to firstly get the customer back to a secure state, and will provide some education with the current admin arrives back from vacation. He is in the office until 1700 Central today.
- Alex_S410Occasional ReaderI have been given the task of mapping out which steps need to be taken to get in touch with the DART team, if an incident occurs. I hope someone can give me some more information about the procedure.
- DigtalNathanCopper ContributorThanks for hosting the AMA, DART Team. I'd like to know, as you're wrapping up an engagement, what are the most frequent tips you find you give clients in the spirit of: "If you had done {x} before this incident, it would have been easier for us to help you recover...." I know sadly it probably isn't a true assumption, but so we get best value from your answers to this, let us assume everyone is already well on top of their game when it comes to a) making appropriate backups and keeping them out of attacker reach, and b) centralised log collection and management. If those were nailed, what else would be your top tips?
- DaveSchrock
Microsoft
Some of the frequent things we find missing in todays landscape is: 1. Lack of Incident Response plan - Doesn't have to be a million steps, but it needs to have procedures in place that are clear and direct. SOC analyst calls lead to get the alert or suspicious behavior looked at with another set of eyes, then a flow chart based on decisions from there. Actors are getting faster, however they are usually signs of compromise 30-60+ days before the investigation starts. 2. Recovery only needs to happen after an incident. Lets build more on proactive measures! MFA everything, password-less login, Windows Hello. As remote work has turned into the norm, many IT providers have put solutions in place fast to enable workers. This fast pace usually cuts security corners sometimes, as they may not have MFA on VPN. 3. Someone will always click the email. Credential tiering helps cut off the lateral movement possibilities and privilege escalation. Losing an end users workstation should not lead to a full domain compromise.- DigtalNathanCopper ContributorGlad to hear I'm not the only one banging the drum re: "Someone will always click the email." End-user security awareness training is a useful part of the strategy but I worry too many people think that it can form an 'entire' solution to a problem that will always need more than that. Other than LAPS, what are your "defend against lateral movement" recommendations?
- eolson
Microsoft
Know your business applications and their dependencies. When we ask you to take down a SQL Server because of an indicator of compromise, what's going to be the impact? What applications will be unavailable to your organization? Do you know all of your service accounts and their passwords? What would be the level of effort to reset those passwords?
- Trevor_Rusher
Community Manager
Thank you for joining our AMA today! We appreciated all the great questions - we'll be sharing a summary of the questions and answers in this space soon. We'll be having another AMA in two weeks on Information Governance and Records Management so hope to see you there 🙂 (Attached is a summary of the AMA)
- Puma_15421Occasional ReaderHow Can I Become A Member Of DART?
- mickeymiticCopper ContributorWhat would be your suggestion when stuff in an organisation are encouraged to use their personnal devices. Incident where account was comprmosied through the use of personal device, what would be the right approach. Some policies on Defender or conditional access? Suggestions?
- eolson
Microsoft
Conditional access for sure! Hopefully these devices are onboarded to Defender for Endpoint. From an incident response perspective, getting personal devices when there's a compromise is going to be a tough one... so when it gets to that point you probably want to have a discussion with your legal team.
- Jerad_RodgersCopper ContributorWe recently discovered that a compromised account created a Azure Virtual Machine. We were not able to see the subscription in our tenant. How would you handle the incident response for this? How often has something like this been seen in the wild?
- aymansirajCopper ContributorFor Azure Virtual Machines, reviewing alerts in Microsoft Defender for Cloud: https://docs.microsoft.com/en-us/azure/defender-for-cloud/tutorial-security-incident. The reason you might not be seeing the subscription is your account might not have the rights to see the subscription, a Global Admin may have access to the subscription so I would recommend you ask a global admin in your org to see if they are able to see the subscription: https://docs.microsoft.com/en-us/azure/role-based-access-control/elevate-access-global-admin
- Petitohead
Microsoft
In some cases, there could be subscriptions that cannot be seen by Global Administrators. Therefore, they must elevate their access to be able to see and manage those subscriptions which may explain why you couldn't see it. Here is a good overview: https://docs.microsoft.com/en-us/azure/role-based-access-control/elevate-access-global-admin. This is a common tactic that we've seen. With those credentials they typically create a very expensive VM for coin mining and footing you with the bill or use that as a launching point for other attacks.
- Trevor_Rusher
Community Manager
15 minutes to go! Get your questions in now to get them answered by the DART team! - Chad_MunkeltCopper ContributorFor someone who is trying to build out their internal DFIR capabilities, what are a few key areas you would recommend they focus on? What are your thoughts on live triage vs traditional forensics (disk images etc.)?
- kshitijk
Microsoft
Have a playbook to follow -- identify your requirements and needs before an incident strikes. What are your requirements to gather a disk image or triage data? What tools do you need, and do you have them ready? What stakeholders need to be made aware, for legal and compliance reasons? Do site managers know what they need to do to actually acquire the evidence you need? Plan ahead so that execution can be efficient. It probably won't be perfect even then, but it'll still get your team answers faster. As for live triage vs. deadbox analysis, abide by organizational/evidence preservation/legal and compliance requirements first 🙂 That said, live triage data can be collected and analyzed much more quickly than a disk image can be obtained...- Chad_MunkeltCopper ContributorThank you Kshitij, those are great points! SaltyMunk
- aymansirajCopper ContributorLive Triage is the way to go, it's fast and aligns best with business objectives of least impact to business downtime. Most data on computers isn't forensically/threat hunting relevant. Disk Images are usually necessary if you are trying to carve for a file no longer on disk or litigation/lawyers come in. One key thing to focus on is employees who know how to use 5 tools well are more well prepared to defend vs throwing 10 shiny tools at them. On many engagements we see customers with all the tools, but the security folks aren't well versed in how to use them or don't gain a deep enough understanding as they are switching between tools/portals.
- Jamesmoe
Microsoft
Identity is the mechanism by which most attacks execute on their objectives. They may get in several different ways; however, the real question is how did they privilege escalate from a normal user to a privileged user? So making sure you are implementing identity detections is key to stitching together the various artifacts into a true attack timeline.
- Prag_751700Copper Contributor10 sec error in my outlook.* Welcome DevTools
- ExMSW4319Iron ContributorExMSW4319, MDO operator from Europe. I'd like to thank DART for helping keep MDO detection fresh. Naturally I also have a question. What can be done to improve the speed at which Microsoft reacts to a breached O365 customer? It seems that all we can do is use the usual tools to alert MS that a tenancy clearly has a problem, and hope that the report is detected as a report of a breached tenancy and not just another source of malware phishing. On some days the most malign host attacking my mailboxes is prod.outlook.com. Yes, I realise that is because edge filtering is blocking all of the real rubbish...
- LGP124
Microsoft
Hi Nathan, could you please clarify your question here "What can be done to improve the speed at which Microsoft reacts to a breached O365 Customer?" Are you rereferring specifically to DART or Microsoft in general?- ExMSW4319Iron ContributorI am assuming that DART considers malware posted via O365 to be as high a priority as that posted via any other source, but it comes with the additional complication that Microsoft itself is the disseminating organisation. I would therefore expect it to instead be something of a commercial priority. How, therefore, do I alert Microsoft that one of its own customers is projecting a file or URL that none of the other security authorities we work with has yet recognised as malign? It seems that all I have is Outlook Report Message or the WDSI portal.