Event banner
An ounce of prevention is worth a pound of detection
Event details
- Matthew ReynoldsMar 28, 2024
Microsoft
Good news, HCI nodes have a specialized security baseline applied by default (during deployment). You don't have to do anything to get it applied! To audit/monitor this you can use Azure Policy / Machine Configuration with the built in Windows baseline policy definition. Today the "Windows" baseline settings Policy is able to audit differ slightly from the "HCI" settings applied during deployment, but we are working to bring them into 100% harmony.
- Karl-WEMar 28, 2024MVP
Thank you for this follow-up. Lastly. How do you recommend protecting the dedicated Domain Controllers, PAWS, WAC being for Azure Stack HCI (assume they are all on a separate domain for management and security reasons not tied / trusted to the productive domain)? For these VMs also using Arc and same policies as for HCI nodes or do you have something different in mind? If this is too complicated to answer here, I would not mind taking it elsewhere.
In result I am just trying to understand if I have to deal with on-prem GPO security baselines at all for this specific scenario.
Example:
mgt.contoso.com (Azure Stack HCI Domain) Forest / Domain consists
Azure Stack HCI nodes (domain-joined mgt.contoso.com)
1 DC VM per node (mgt.contoso.com, unclustered)
1 PAWS VM (domain-joined mgt.contoso.com, clustered)
1 WAC GW VM (domain-joined mgt.contoso.com, clustered)
1 Backup server (domain-joined mgt.contoso.com, to avoid NTLM to HCI hosts, seperate hosts)
Thank you for your time!