Home
%3CLINGO-SUB%20id%3D%22lingo-sub-1046870%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1046870%22%20slang%3D%22en-US%22%3E%3CP%3ELighthouse%20has%20so%20much%20promise%20for%20MSPs%2C%20but%20I%20get%20push-back%20from%20clients%20who%20need%20to%20maintain%20PCI%20compliance.%20The%20fear%20is%20that%20delegating%20access%20control%20to%20an%20external%20partner%20by%20grating%20rights%20to%20their%20groups%20means%20that%20they%20are%20relying%20on%20the%20partner%20to%20ensure%20that%20rouge%20actors%20don't%20gain%20access.%20It%20also%20would%20presumably%20make%20auditing%20more%20difficult.%3C%2FP%3E%3CP%3EHas%20Microsoft%20addressed%20this%20concern%20anywhere%20in%20a%20whitepaper%20or%20article%3F%20I%20can't%20seem%20to%20find%20anything.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1046938%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1046938%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F469611%22%20target%3D%22_blank%22%3E%40JoshuaK%3C%2FA%3E%26nbsp%3B-%20PCI-DSS%20has%20robust%20provisions%20for%20handling%20service%20providers%20with%20access%20to%20in%20scope%20data%2C%20if%20a%20customer%20has%20PCI%20relevant%20data%20in%20Sentinel%20then%20Microsoft%20will%20already%20by%20a%20PCI%20service%20provider%20for%20them%20for%20which%20Microsoft%20has%20accreditation%20-%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Foffering-pci-dss%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Foffering-pci-dss%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EAny%20other%20MSP%20with%20access%20to%20that%20data%20would%20also%20have%20to%20go%20through%20an%20accreditation%20and%20audit%20process%20but%20this%20is%20a%20well%20established%20path%20for%20QSAs.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20for%20malicious%20actors%20gaining%20access%20via%20a%20partner%20it%20is%20a%20threat%20vector%20to%20consider%20as%20attackers%20have%20targetted%20service%20providers%20to%20gain%20access%20to%20customers%2C%20however%20it%20with%20robust%20auditing%20of%20MSP%20security%20controls%20this%20risk%20can%20be%20managed.%20In%20addition%20the%20Lighthouse%20configuration%20allows%20you%20to%20assign%20granular%20controls%20over%20what%20an%20MSP%20has%20access%20to%20meaning%20it%20could%20be%20limited%20to%20read-only%20access%20to%20Sentinel%20data%2C%20limiting%20the%20scope%20of%20impact%20in%20a%20scenario%20where%20an%20MSP%20might%20be%20breached.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1047235%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1047235%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20there%20any%20way%20to%20easily%20deploy%20playbooks%20to%20different%20tenants%20at%20once%3F%20That%20way%20you%20can%20keep%20a%20baseline%20for%20all%20customers%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1049020%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1049020%22%20slang%3D%22en-US%22%3E%3CP%20dir%3D%22ltr%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F186539%22%20target%3D%22_blank%22%3E%40Thijs%20Lecomte%3C%2FA%3E%26nbsp%3B%3A%20you%20can%20use%20ARM.%20See%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flogic-apps%2Flogic-apps-azure-resource-manager-templates-overview%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fplatform.deloitte.com.au%2Farticles%2Fpreparing-azure-logic-apps-for-cicd%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1043899%22%20slang%3D%22en-US%22%3EUsing%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1043899%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20Lighthouse%20provides%20capability%20for%20cross-tenancy%20management%20of%20Azure%20services%20for%20Managed%20Service%20Providers%20(MSPs)%20and%20organizations%20with%20multiple%20Azure%20tenants%2C%20all%20from%20a%20single%20Azure%20portal.%20Azure%20Lighthouse%20is%20integrated%20with%20Azure%20Sentinel%20allowing%20organizations%20to%20easily%20manage%20Azure%20Sentinel%20workspaces%20from%20across%20multiple%20tenants.%20In%20this%20blog%20we%20will%20show%20you%20how%20to%20configure%20Azure%20Lighthouse%2C%20and%20how%20to%20use%20its%20capabilities%20to%20investigate%20an%20attack%20as%20it%20targets%20several%20customers%20at%20once.%3C%2FP%3E%0A%3CP%3EFull%20documentation%20on%20Azure%20Lighthouse%20can%20be%20found%20here%3A%20%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flighthouse%2Fhow-to%2Fonboard-customer%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flighthouse%2Fhow-to%2Fonboard-customer%3C%2FSPAN%3E%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEnabling%20Azure%20Lighthouse%20for%20Sentinel%20requires%20configuration%20on%20both%20the%20%3CSTRONG%3Emanaging%20tenant%3C%2FSTRONG%3E%20and%20%3CSTRONG%3Ecustomer%20tenant%3C%2FSTRONG%3E%20(for%20the%20purpose%20of%20this%20blog%20we%20will%20refer%20to%20customer%20tenant%20to%20describe%20the%20tenant%20to%20be%20managed%2C%20whether%20this%20is%20an%20external%20customer%20or%20separate%20internal%20tenant)%2C%20we%20will%20address%20these%20elements%20separately.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20377px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F159782iD5575B60CCECDD74%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%221.png%22%20title%3D%221.png%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ELighthouse%20Architecture%20Diagram%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1441303424%22%20id%3D%22toc-hId--1441303424%22%3EManaging%20Tenant%20Configuration%3C%2FH2%3E%0A%3CP%3ESeveral%20items%20are%20needed%20to%20configure%20Lighthouse%20for%20Azure%20Sentinel%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EThe%20tenant%20ID%20of%20the%20%3CSTRONG%3Emanaging%20tenant%3C%2FSTRONG%3E.%3C%2FLI%3E%0A%3CLI%3EThe%20ID%20of%20the%20Azure%20AD%20group%20in%20the%20managing%20tenant%20that%20you%20wish%20to%20have%20access%20to%20Azure%20Sentinel%20in%20the%20customer%20tenant.%20It%20is%20advised%20that%20a%20specific%20Azure%20AD%20group%20is%20created%20for%20this%20purpose.%3CPRE%3E(Get-AzADGroup%20%3CFONT%20color%3D%22%23008080%22%3E-DisplayName%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%22%3CGROUP%20name%3D%22%22%3E%22%3C%2FGROUP%3E%3C%2FFONT%3E).id%E2%80%8B%3C%2FPRE%3E%0A%3C%2FLI%3E%0A%3CLI%3EThe%20ID%20of%20the%20user%20role%20that%20you%20wish%20the%20AD%20group%20to%20have%20within%20the%20customers%20tenant.%20For%20this%20you%20can%20use%20%3CA%20href%3D%22http%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Frole-based-access-control%2Fbuilt-in-roles%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ebuilt%20in%20Role%20Definitions%3C%2FA%3E%26nbsp%3Bsuch%20as%20Security%20Reader%2C%20or%20create%20a%20custom%20definition.%0A%3CPRE%3E(Get-AzRoleDefinition%20%3CFONT%20color%3D%22%23008080%22%3E-Name%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%E2%80%9C%3CROLE%20name%3D%22%22%3E%E2%80%9D%3C%2FROLE%3E%3C%2FFONT%3E).id%3C%2FPRE%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20core%20deployment%20of%20the%20Azure%20Lighthouse%20configuration%20will%20be%20made%20using%20this%20Azure%20Resource%20Manager%20(ARM)%20template%20-%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FAzure%2FAzure-Lighthouse-samples%2Fblob%2Fmaster%2FAzure-Delegated-Resource-Management%2Ftemplates%2Fdelegated-resource-management%2FdelegatedResourceManagement.json%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgithub.com%2FAzure%2FAzure-Lighthouse-samples%2Fblob%2Fmaster%2FAzure-Delegated-Resource-Management%2Ftemplates%2Fdelegated-resource-management%2FdelegatedResourceManagement.json%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20order%20to%20ensure%20this%20ARM%20template%20deploys%20the%20required%20configuration%20it%20is%20accompanied%20by%20a%20parameters%20file%20which%20you%20must%20populate%20with%20the%20ID%20details%20listed%20above.%20A%20template%20for%20this%20parameters%20file%20can%20be%20found%20here%3A%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FAzure%2FAzure-Lighthouse-samples%2Fblob%2Fmaster%2FAzure-Delegated-Resource-Management%2Ftemplates%2Fdelegated-resource-management%2FdelegatedResourceManagement.parameters.json%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgithub.com%2FAzure%2FAzure-Lighthouse-samples%2Fblob%2Fmaster%2FAzure-Delegated-Resource-Management%2Ftemplates%2Fdelegated-resource-management%2FdelegatedResourceManagement.parameters.json%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20complete%20the%20parameters%20file%2C%20update%20the%20values%20as%20follows%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EmspOfferName%20%E2%80%93%20provide%20a%20display%20name%20for%20your%20managed%20service%20offering%20(this%20can%20be%20seen%20within%20the%20customer%20tenant).%3C%2FLI%3E%0A%3CLI%3EmspOfferDescription%20%E2%80%93%20provide%20a%20description%20for%20your%20managed%20service%20offering%20(this%20can%20be%20seen%20within%20the%20customer%20tenant).%3C%2FLI%3E%0A%3CLI%3EmanagedByTenantId%20%E2%80%93%20the%20tenant%20ID%20of%20the%20managing%20tenant.%3C%2FLI%3E%0A%3CLI%3Eauthorizations%0A%3CUL%3E%0A%3CLI%3EprincipalId%20%E2%80%93%20the%20ID%20string%20of%20the%20Azure%20AD%20Group%20in%20the%20managing%20tenant%20you%20want%20to%20grant%20access.%3C%2FLI%3E%0A%3CLI%3EroleDefinitionId%20%E2%80%93%20the%20ID%20of%20the%20user%20role%20that%20you%20wish%20the%20AD%20group%20to%20have%20within%20the%20customers%20tenant.%3C%2FLI%3E%0A%3CLI%3EprincipalIdDisplayName%20%E2%80%93%20provide%20a%20name%20for%20the%20group%20being%20granted%20access%20(this%20can%20be%20seen%20within%20the%20customer%20tenant%20and%20does%20not%20have%20to%20be%20the%20same%20as%20the%20AD%20group%20name).%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EOnce%20complete%20your%20parameters%20file%20should%20look%20something%20like%20this%3A%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F2.png%22%20border%3D%220%22%20width%3D%22692%22%20height%3D%22334%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22padding-left%3A%2030px%3B%22%3E%3CEM%3ENote%3A%20If%20you%20want%20to%20grant%20multiple%20groups%20access%20at%20differing%20role%20levels%2C%20you%20can%20include%20multiple%20entries%20under%20the%20authorizations%20section%E2%80%93%20see%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flighthouse%2Fhow-to%2Fonboard-customer%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flighthouse%2Fhow-to%2Fonboard-customer%3C%2FA%3E%20for%20an%20example%20of%20this.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20you%20have%20completed%20the%20parameters%20file%20you%20will%20need%20to%20provide%20the%20ARM%20template%20and%20parameters%20file%20to%20a%20user%20with%20the%20Owner%20role%20within%20the%20customer%20tenant.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1046209409%22%20id%3D%22toc-hId-1046209409%22%3ECustomer%20Tenant%20Configuration%3C%2FH2%3E%0A%3CP%3EAfter%20receiving%20the%20ARM%20template%20and%20parameters%20file%20from%20the%20managing%20tenant%2C%20the%20customer%20tenant%20%26nbsp%3Bmust%20deploy%20the%20configuration%20within%20the%20subscription%20that%20contains%20the%20Azure%20Sentinel%20workspace%20to%20be%20managed.%3C%2FP%3E%0A%3CP%3EThe%20first%20step%20in%20provisioning%20Lighthouse%20access%20within%20the%20customer%20tenant%20is%20to%20register%20the%20ManagedServices%20Resource%20in%20Azure.%20You%20can%20check%20if%20this%20is%20already%20registered%20via%20%3CA%20href%3D%22http%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fpowershell%2Fazure%2Finstall-Az-ps%3Fview%3Dazps-3.0.0%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EPowerShell%3CFONT%20size%3D%222%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FFONT%3E%3C%2FA%3Ewith%3A%3C%2FP%3E%0A%3CPRE%3EGet-AzResourceProvider%20%3CFONT%20color%3D%22%23008080%22%3E-ProviderNameSpace%3C%2FFONT%3E%20Microsoft.ManagedServices%3C%2FPRE%3E%0A%3CP%20style%3D%22padding-left%3A%2030px%3B%22%3E%3CEM%3E%3CFONT%20size%3D%222%22%3E(If%20you%20are%20not%20using%20Azure%20Cloud%20Shell%20you%20will%20first%20need%20to%20run%20the%20Connect-AzAccount%20cmdlet%20to%20authenticate%20to%20Azure)%3C%2FFONT%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20style%3D%22padding-left%3A%2030px%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20should%20return%20an%20output%20similar%20to%20this%3A%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F3.png%22%20border%3D%220%22%20width%3D%22674%22%20height%3D%22346%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20the%20RegistrationState%20does%20not%20read%20%E2%80%98Registered%E2%80%99%20%26nbsp%3Bfor%20all%20Workspaces%20in%20the%20output%20run%20the%20following%20command%20in%20PowerShell%20to%20register%20the%20service%3A%3C%2FP%3E%0A%3CPRE%3ERegister-AzResourceProvider%20%3CFONT%20color%3D%22%23008080%22%3E-ProviderNamespace%3C%2FFONT%3E%20Microsoft.ManagedServices%3C%2FPRE%3E%0A%3CP%3EOnce%20the%20ManagedServices%20Resource%20is%20registered%20you%20can%20deploy%20the%20Lighthouse%20ARM%20template%20with%20the%20correct%20parameters%20provided%20by%20the%20managing%20tenant.%20First%20select%20the%20subscription%20that%20the%20Azure%20Sentinel%20workspace%20to%20be%20managed%20is%20part%20of%20using%3A%3C%2FP%3E%0A%3CPRE%3ESelect-AzSubscription%20%3CFONT%20color%3D%22%23008080%22%3E-SubscriptionId%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%E2%80%98%3CYOUR%20subscription%3D%22%22%20id%3D%22%22%3E%E2%80%99%3C%2FYOUR%3E%3C%2FFONT%3E%3C%2FPRE%3E%0A%3CP%3EThen%20deploy%20the%20ARM%20template%20with%3A%3C%2FP%3E%0A%3CPRE%3ENew-AzDeployment%20%3CFONT%20color%3D%22%23008080%22%3E-Name%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%3CDEPLOYMENTNAME%3E%3C%2FDEPLOYMENTNAME%3E%3C%2FFONT%3E%20%60%0A%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3CFONT%20color%3D%22%23008080%22%3E-Location%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%3CAZUREREGION%3E%3C%2FAZUREREGION%3E%3C%2FFONT%3E%60%0A%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3CFONT%20color%3D%22%23008080%22%3E-TemplateFile%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%3CPATH%20to%3D%22%22%20arm%3D%22%22%20template%3D%22%22%3E%3C%2FPATH%3E%3C%2FFONT%3E%20%60%0A%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3CFONT%20color%3D%22%23008080%22%3E-TemplateParameterFile%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%3CPATH%20to%3D%22%22%20parameters%3D%22%22%20file%3D%22%22%3E%3C%2FPATH%3E%3C%2FFONT%3E%60%0A%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3CFONT%20color%3D%22%23008080%22%3E-Verbose%3C%2FFONT%3E%3C%2FPRE%3E%0A%3CP%20style%3D%22padding-left%3A%2030px%3B%22%3E%3CEM%3E%3CFONT%20size%3D%222%22%3E(You%20can%20deploy%20in%20any%20region%2C%20if%20you%20are%20unsure%20you%20can%20use%20the%20region%20your%20Azure%20Sentinel%20workspace%20is%20deployed%20in.)%3C%2FFONT%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20deployed%20correctly%20the%20output%20should%20look%20like%20this%3A%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F4%2520(2).png%22%20border%3D%220%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20confirm%20if%20this%20deployment%20has%20been%20successful%20navigate%20to%20the%20Azure%20Portal%20and%20search%20for%20%3CSTRONG%3EService%20Providers%3C%2FSTRONG%3E.%20In%20here%20select%20%3CSTRONG%3EService%20provider%20offers%20%3C%2FSTRONG%3Ewhere%20you%20should%20see%20the%20details%20of%20the%20configuration%20you%20just%20deployed.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22padding-left%3A%2030px%3B%22%3E%3CEM%3ENote%3A%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20style%3D%22padding-left%3A%2030px%3B%22%3E%3CEM%3EThere%20are%20also%20options%20to%20publish%20an%20MSP%20offering%20as%20a%20service%20via%20the%20Azure%20Marketplace%20and%20Cloud%20Partner%20Portal%20enabling%20customers%20to%20purchase%20and%20onboard%20the%20resources%20via%20the%20Azure%20portal%20rather%20than%20having%20to%20deploy%20an%20ARM%20template%20as%20described%20above.%20This%20process%20requires%20the%20MSP%20to%20publish%20several%20additional%20details%20about%20their%20service.%20For%20details%20regarding%20this%20process%20please%20see%20this%20documentation%20-%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flighthouse%2Fhow-to%2Fpublish-managed-services-offers%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CEM%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flighthouse%2Fhow-to%2Fpublish-managed-services-offers%3C%2FEM%3E%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--761245054%22%20id%3D%22toc-hId--761245054%22%3EManaging%20Tenants%3C%2FH2%3E%0A%3CP%3EOnce%20the%20customer%20tenant%20has%20deployed%20the%20Lighthouse%20configuration%20the%20managing%20tenant%20can%20also%20validate%20the%20deployment%20by%20navigating%20to%20the%20%3CSTRONG%3EService%20Provider%20Portal%3C%2FSTRONG%3E%26nbsp%3B%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3Eand%20opening%20the%20%3CSTRONG%3ECustomers%3C%2FSTRONG%3E%20tab.%20Here%20you%20should%20see%20a%20list%20of%20customer%20tenants%20who%20have%20successfully%20deployed%20your%20Lighthouse%20configuration.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3ETo%20view%20customer%20resources%20within%20the%20managing%20tenant%E2%80%99s%20Azure%20Portal%20open%20the%20portal%20and%20select%20the%20Directory%20%2B%20subscription%20filter%20at%20the%20top%20of%20the%20page%2C%20here%20you%20should%20see%20the%20customer%20tenant%20directories%20and%20subscriptions%20on-boarded%20for%20you%20to%20select%3A%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F7.png%22%20border%3D%220%22%20width%3D%22414%22%20height%3D%22338%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F8.png%22%20border%3D%220%22%20width%3D%22407%22%20height%3D%2296%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20selected%20the%20customer%20tenants%20Workspaces%20will%20appear%20in%20your%20Azure%20Sentinel%20workspaces%20list%20alongside%20your%20own%20workspaces.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECurrently%20most%20features%20within%20Azure%20Sentinel%20are%20directly%20tied%20to%20a%20single%20workspace%2C%20however%20it%20is%20possible%20to%20query%20multiple%20tenant%E2%80%99s%20workspaces%20with%20one%20unified%20query%20in%20order%20to%20investigate%20and%20hunt%20for%20threats%20that%20might%20be%20impacting%20several%20tenants%20at%20once.%26nbsp%3B%20To%20do%20this%20you%20can%20use%20the%20union%20operator%20to%20merge%20a%20table%20from%20one%20workspace%20with%20another.%20For%20example%2C%20if%20you%20wanted%20to%20see%20a%20list%20of%20all%20security%20alerts%20from%20the%20last%20week%20from%20two%20workspaces%20you%20would%20use%20the%20following%20query%3A%3C%2FP%3E%0A%3CPRE%3E%3CFONT%20color%3D%22%230000FF%22%3Eunion%3C%2FFONT%3E%20SecurityAlert%2C%20workspace(%3CFONT%20color%3D%22%23FF0000%22%3E'%3CSECOND%20workspace%3D%22%22%20name%3D%22%22%3E'%3C%2FSECOND%3E%3C%2FFONT%3E).SecurityAlert%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Ewhere%3C%2FFONT%3E%20TimeGenerated%20%26gt%3B%20ago(%3CFONT%20color%3D%22%23339966%22%3E7%3C%2FFONT%3Ed)%3C%2FPRE%3E%0A%3CP%3EThis%20can%20also%20be%20extended%20to%20any%20number%20of%20workspaces%20simply%20by%20adding%20more%20workspaces%20to%20the%20union%20query%3A%3C%2FP%3E%0A%3CPRE%3E%3CFONT%20color%3D%22%230000FF%22%3Eunion%20%3C%2FFONT%3ESecurityAlert%2C%20workspace(%3CFONT%20color%3D%22%23FF0000%22%3E'%3CSECOND%20workspace%3D%22%22%20name%3D%22%22%3E'%3C%2FSECOND%3E%3C%2FFONT%3E).SecurityAlert%2C%20workspace(%3CFONT%20color%3D%22%23FF0000%22%3E%E2%80%98%3CTHIRD%20workspace%3D%22%22%20name%3D%22%22%3E%E2%80%99%3C%2FTHIRD%3E%3C%2FFONT%3E).SecurityAlert%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Ewhere%3C%2FFONT%3E%20TimeGenerated%20%26gt%3B%20ago(%3CFONT%20color%3D%22%23339966%22%3E7%3C%2FFONT%3Ed)%3C%2FPRE%3E%0A%3CP%3EThe%20result%20set%20will%20appear%20as%20a%20single%20table%2C%20but%20you%20can%20use%20the%20TenantId%20field%20to%20identity%20which%20customer%20each%20item%20comes%20from.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1726267779%22%20id%3D%22toc-hId-1726267779%22%3ETracking%20an%20attack%20across%20multiple%20customer%20tenants%3C%2FH2%3E%0A%3CP%3EExposed%20management%20endpoints%20on%20the%20internet%20are%20a%20regular%20attack%20target.%20Often%20attackers%20will%20scan%20the%20internet%20for%20exposed%20endpoints%20and%20then%20attempt%20to%20login%20using%20common%20credentials%20in%20the%20hopes%20of%20gaining%20access%20to%20at%20least%20some%20hosts.%20As%20a%20multi-customer%20monitoring%20team%2C%20it%20is%20common%20to%20see%20such%20attacks%20impacting%20several%20tenants%20simultaneously%20as%20commodity%20attackers%20indiscriminately%20attack%20any%20exposed%20interface%20they%20can%20find.%3C%2FP%3E%0A%3CP%3EIn%20this%20example%20we%20start%20with%20an%20alert%20in%20one%20of%20our%20customer%E2%80%99s%20workspaces%20for%20an%20attempted%20brute%20force%20attempt%3A%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F9.png%22%20border%3D%220%22%20width%3D%22766%22%20height%3D%22423%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUpon%20inspecting%20the%20logs%20associated%20with%20this%20alert%20we%20can%20see%20all%20the%20attempts%20are%20coming%20from%20the%20same%20IP%20address%3A%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F10.png%22%20border%3D%220%22%20width%3D%22765%22%20height%3D%22427%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20quickly%20assess%20if%20there%20is%20an%20impact%20from%20this%20activity%20we%20want%20to%20see%20if%20that%20IP%20address%20has%20successfully%20logged%20into%20any%20hosts%20in%20the%20environment.%20However%2C%20as%20we%20suspect%20this%20attack%20might%20be%20wider%20than%20just%20one%20of%20our%20customers%2C%20we%20can%20also%20simultaneously%20query%20our%20other%20workspaces%20for%20the%20same%20IP%20address.%3C%2FP%3E%0A%3CPRE%3E%3CFONT%20color%3D%22%230000FF%22%3Eunion%20%3C%2FFONT%3ESyslog%2C%20workspace(%3CFONT%20color%3D%22%23FF0000%22%3E'%3CCUSTOMER2%20workspace%3D%22%22%20name%3D%22%22%3E'%3C%2FCUSTOMER2%3E%3C%2FFONT%3E).Syslog%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Ewhere%3C%2FFONT%3E%20TimeGenerated%20%26gt%3B%20ago(%3CFONT%20color%3D%22%23339966%22%3E7%3C%2FFONT%3Ed)%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Ewhere%3C%2FFONT%3E%20ProcessName%20%3D%3D%20%22sshd%22%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Eextend%3C%2FFONT%3E%20LogonIP%20%3D%20extract(%3CFONT%20color%3D%22%23FF0000%22%3E%22(%5B0-9%5D%7B1%2C3%7D%5C%5C.%5B0-9%5D%7B1%2C3%7D%5C%5C.%5B0-9%5D%7B1%2C3%7D%5C%5C.%5B0-9%5D%7B1%2C3%7D)%22%3C%2FFONT%3E%2C%20%3CFONT%20color%3D%22%23339966%22%3E1%3C%2FFONT%3E%2C%20SyslogMessage)%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Ewhere%3C%2FFONT%3E%20SyslogMessage%20%3CFONT%20color%3D%22%230000FF%22%3Econtains%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E'Accepted'%3C%2FFONT%3E%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Ewhere%3C%2FFONT%3E%20LogonIP%20%3D%3D%20%22174.116.122.126%22%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Eextend%3C%2FFONT%3E%20Customer%20%3D%20iif(TenantId%20%3D%3D%20%3CFONT%20color%3D%22%23FF0000%22%3E%22%3CCUSTOMER2%20tenant%3D%22%22%20id%3D%22%22%3E%22%2C%20%22Customer2%22%2C%20%22Customer1%22%3C%2FCUSTOMER2%3E%3C%2FFONT%3E)%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Eproject%3C%2FFONT%3E%20TimeGenerated%2C%20Customer%2C%20Computer%2C%20LogonIP%2C%20SyslogMessage%20%3C%2FPRE%3E%0A%3CP%3EThe%20results%20of%20this%20query%20shows%20us%20that%20whilst%20there%20was%20no%20impact%20for%20the%20customer%20where%20we%20saw%20the%20Brute%20Force%20alert%20there%20were%202%20successful%20logons%20for%20that%20IP%20address%20in%20another%20customer%20environment%2C%20highlighting%20these%20as%20events%20to%20investigate%20further.%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F11.png%22%20border%3D%220%22%20width%3D%22764%22%20height%3D%22369%22%20%2F%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--81186684%22%20id%3D%22toc-hId--81186684%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1888641147%22%20id%3D%22toc-hId--1888641147%22%3ESummary%3C%2FH2%3E%0A%3CP%3EA%20key%20principle%20to%20effective%20and%20scalable%20security%20operations%20is%20streamlining%20the%20security%20analysts%E2%80%99%20job%20so%20that%20they%20can%20focus%20on%20threat%20detection%20and%20response.%20Azure%20Lighthouse%E2%80%99s%20integration%20with%20Azure%20Sentinel%20simplifies%20management%20of%20workspaces%20from%20multiple%20Azure%20tenants%2C%20whether%20they%20be%20external%20customer%20tenants%20or%20other%20tenants%20used%20internally%20within%20an%20organization%2C%20so%20that%20analysts%20can%20easily%20and%20effectively%20monitor%20multiple%20environments%20at%20once.%20In%20addition%2C%20the%20union%20operator%20within%20KQL%20allows%20analysts%20to%20query%20multiple%20environments%20at%20once%2C%20and%20track%20threats%20across%20them%20without%20having%20to%20repeat%20analysis.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20want%20to%20know%20more%20about%20using%20Azure%20Sentinel%20in%20a%20multi-tenant%20or%26nbsp%3B%20Managed%20Service%20Provider%20environment%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F293879%22%20target%3D%22_blank%22%3E%40Ofer_Shezaf%3C%2FA%3E%26nbsp%3Brecently%20ran%20a%20really%20useful%20webinar%20on%20this%20subject.%20A%20recording%20of%20this%20can%20be%20found%20on%20%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D_mm3GNwPBHU%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EYouTube%3C%2FA%3E%2C%20and%20the%20slides%20are%20available%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252F1drv.ms%252Fb%252Fs!AnEPjr8tHcNmggz-uunb1Vi9VnGz%26amp%3Bdata%3D02%257C01%257CPeter.Bryan%2540microsoft.com%257C3fa1c16df49145316b2508d77cc6bbd1%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637115065299423016%26amp%3Bsdata%3DKQAVUIdmQsMkatNQAhQFsSLZyxf6nLsNpQe%252BgDSx720%253D%26amp%3Breserved%3D0%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESpecial%20thanks%20must%20also%20go%20to%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F185177%22%20target%3D%22_blank%22%3E%40Yaniv%20Shasha%3C%2FA%3E%20from%20the%20Azure%20Sentinel%20CxE%20team%20for%20his%20contribution%20to%20this%20blog%20and%20his%20work%20with%20Azure%20Lighthouse.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1043899%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20Lighthouse%20provides%20capability%20for%20cross-tenancy%20management%20of%20Azure%20services%20for%20Managed%20Service%20Providers%20(MSPs)%20and%20organizations%20with%20multiple%20Azure%20tenants%2C%20all%20from%20a%20single%20Azure%20portal.%20Azure%20Lighthouse%20is%20integrated%20with%20Azure%20Sentinel%20allowing%20organizations%20to%20easily%20manage%20Azure%20Sentinel%20workspaces%20from%20across%20multiple%20tenants.%20In%20this%20blog%20we%20will%20show%20you%20how%20to%20configure%20Azure%20Lighthouse%2C%20and%20how%20to%20use%20its%20capabilities%20to%20investigate%20an%20attack%20as%20it%20targets%20several%20customers%20at%20once.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1043899%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EInvestigation%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Azure Lighthouse provides capability for cross-tenancy management of Azure services for Managed Service Providers (MSPs) and organizations with multiple Azure tenants, all from a single Azure portal. Azure Lighthouse is integrated with Azure Sentinel allowing organizations to easily manage Azure Sentinel workspaces from across multiple tenants. In this blog we will show you how to configure Azure Lighthouse, and how to use its capabilities to investigate an attack as it targets several customers at once.

Full documentation on Azure Lighthouse can be found here:  https://docs.microsoft.com/en-us/azure/lighthouse/how-to/onboard-customer

 

Enabling Azure Lighthouse for Sentinel requires configuration on both the managing tenant and customer tenant (for the purpose of this blog we will refer to customer tenant to describe the tenant to be managed, whether this is an external customer or separate internal tenant), we will address these elements separately.

1.pngLighthouse Architecture Diagram

 

Managing Tenant Configuration

Several items are needed to configure Lighthouse for Azure Sentinel:

  • The tenant ID of the managing tenant.
  • The ID of the Azure AD group in the managing tenant that you wish to have access to Azure Sentinel in the customer tenant. It is advised that a specific Azure AD group is created for this purpose.
    (Get-AzADGroup -DisplayName "<Group Name>").id​
  • The ID of the user role that you wish the AD group to have within the customers tenant. For this you can use built in Role Definitions such as Security Reader, or create a custom definition.
    (Get-AzRoleDefinition -Name “<Role Name>”).id

 

The core deployment of the Azure Lighthouse configuration will be made using this Azure Resource Manager (ARM) template - https://github.com/Azure/Azure-Lighthouse-samples/blob/master/Azure-Delegated-Resource-Management/te...

 

In order to ensure this ARM template deploys the required configuration it is accompanied by a parameters file which you must populate with the ID details listed above. A template for this parameters file can be found here:  https://github.com/Azure/Azure-Lighthouse-samples/blob/master/Azure-Delegated-Resource-Management/te...

 

To complete the parameters file, update the values as follows:

  • mspOfferName – provide a display name for your managed service offering (this can be seen within the customer tenant).
  • mspOfferDescription – provide a description for your managed service offering (this can be seen within the customer tenant).
  • managedByTenantId – the tenant ID of the managing tenant.
  • authorizations
    • principalId – the ID string of the Azure AD Group in the managing tenant you want to grant access.
    • roleDefinitionId – the ID of the user role that you wish the AD group to have within the customers tenant.
    • principalIdDisplayName – provide a name for the group being granted access (this can be seen within the customer tenant and does not have to be the same as the AD group name).

Once complete your parameters file should look something like this:

 

Note: If you want to grant multiple groups access at differing role levels, you can include multiple entries under the authorizations section– see https://docs.microsoft.com/en-us/azure/lighthouse/how-to/onboard-customer for an example of this.

 

Once you have completed the parameters file you will need to provide the ARM template and parameters file to a user with the Owner role within the customer tenant.

 

Customer Tenant Configuration

After receiving the ARM template and parameters file from the managing tenant, the customer tenant  must deploy the configuration within the subscription that contains the Azure Sentinel workspace to be managed.

The first step in provisioning Lighthouse access within the customer tenant is to register the ManagedServices Resource in Azure. You can check if this is already registered via PowerShell with:

Get-AzResourceProvider -ProviderNameSpace Microsoft.ManagedServices

(If you are not using Azure Cloud Shell you will first need to run the Connect-AzAccount cmdlet to authenticate to Azure)

 

This should return an output similar to this:

 

If the RegistrationState does not read ‘Registered’  for all Workspaces in the output run the following command in PowerShell to register the service:

Register-AzResourceProvider -ProviderNamespace Microsoft.ManagedServices

Once the ManagedServices Resource is registered you can deploy the Lighthouse ARM template with the correct parameters provided by the managing tenant. First select the subscription that the Azure Sentinel workspace to be managed is part of using:

Select-AzSubscription -SubscriptionId ‘<Your Subscription ID>’

Then deploy the ARM template with:

New-AzDeployment -Name <deploymentName> `

                 -Location <AzureRegion>`

                 -TemplateFile <Path to ARM template> `

                 -TemplateParameterFile <Path to parameters file>`

                 -Verbose

(You can deploy in any region, if you are unsure you can use the region your Azure Sentinel workspace is deployed in.)

 

If deployed correctly the output should look like this:

 

To confirm if this deployment has been successful navigate to the Azure Portal and search for Service Providers. In here select Service provider offers where you should see the details of the configuration you just deployed.

 

Note:

There are also options to publish an MSP offering as a service via the Azure Marketplace and Cloud Partner Portal enabling customers to purchase and onboard the resources via the Azure portal rather than having to deploy an ARM template as described above. This process requires the MSP to publish several additional details about their service. For details regarding this process please see this documentation - https://docs.microsoft.com/en-us/azure/lighthouse/how-to/publish-managed-services-offers

 

Managing Tenants

Once the customer tenant has deployed the Lighthouse configuration the managing tenant can also validate the deployment by navigating to the Service Provider Portal and opening the Customers tab. Here you should see a list of customer tenants who have successfully deployed your Lighthouse configuration.

To view customer resources within the managing tenant’s Azure Portal open the portal and select the Directory + subscription filter at the top of the page, here you should see the customer tenant directories and subscriptions on-boarded for you to select:

 

 

Once selected the customer tenants Workspaces will appear in your Azure Sentinel workspaces list alongside your own workspaces.

 

Currently most features within Azure Sentinel are directly tied to a single workspace, however it is possible to query multiple tenant’s workspaces with one unified query in order to investigate and hunt for threats that might be impacting several tenants at once.  To do this you can use the union operator to merge a table from one workspace with another. For example, if you wanted to see a list of all security alerts from the last week from two workspaces you would use the following query:

union SecurityAlert, workspace('<Second Workspace Name>').SecurityAlert
| where TimeGenerated > ago(7d)

This can also be extended to any number of workspaces simply by adding more workspaces to the union query:

union SecurityAlert, workspace('<Second Workspace Name>').SecurityAlert, workspace(‘<Third Workspace Name>’).SecurityAlert
| where TimeGenerated > ago(7d)

The result set will appear as a single table, but you can use the TenantId field to identity which customer each item comes from.

 

Tracking an attack across multiple customer tenants

Exposed management endpoints on the internet are a regular attack target. Often attackers will scan the internet for exposed endpoints and then attempt to login using common credentials in the hopes of gaining access to at least some hosts. As a multi-customer monitoring team, it is common to see such attacks impacting several tenants simultaneously as commodity attackers indiscriminately attack any exposed interface they can find.

In this example we start with an alert in one of our customer’s workspaces for an attempted brute force attempt:

 

Upon inspecting the logs associated with this alert we can see all the attempts are coming from the same IP address:

 

To quickly assess if there is an impact from this activity we want to see if that IP address has successfully logged into any hosts in the environment. However, as we suspect this attack might be wider than just one of our customers, we can also simultaneously query our other workspaces for the same IP address.

union Syslog, workspace('<Customer2 Workspace Name>').Syslog
| where TimeGenerated > ago(7d)
| where ProcessName == "sshd"
| extend LogonIP = extract("([0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3})", 1, SyslogMessage)
| where SyslogMessage contains 'Accepted'
| where LogonIP == "174.116.122.126"
| extend Customer = iif(TenantId == "<Customer2 Tenant ID>", "Customer2", "Customer1")
| project TimeGenerated, Customer, Computer, LogonIP, SyslogMessage 

The results of this query shows us that whilst there was no impact for the customer where we saw the Brute Force alert there were 2 successful logons for that IP address in another customer environment, highlighting these as events to investigate further.

 

Summary

A key principle to effective and scalable security operations is streamlining the security analysts’ job so that they can focus on threat detection and response. Azure Lighthouse’s integration with Azure Sentinel simplifies management of workspaces from multiple Azure tenants, whether they be external customer tenants or other tenants used internally within an organization, so that analysts can easily and effectively monitor multiple environments at once. In addition, the union operator within KQL allows analysts to query multiple environments at once, and track threats across them without having to repeat analysis.

 

If you want to know more about using Azure Sentinel in a multi-tenant or  Managed Service Provider environment @Ofer_Shezaf recently ran a really useful webinar on this subject. A recording of this can be found on YouTube, and the slides are available here.

 

Special thanks must also go to @Yaniv Shasha from the Azure Sentinel CxE team for his contribution to this blog and his work with Azure Lighthouse.

4 Comments
Frequent Visitor

Lighthouse has so much promise for MSPs, but I get push-back from clients who need to maintain PCI compliance. The fear is that delegating access control to an external partner by grating rights to their groups means that they are relying on the partner to ensure that rouge actors don't gain access. It also would presumably make auditing more difficult.

Has Microsoft addressed this concern anywhere in a whitepaper or article? I can't seem to find anything.

Microsoft

@JoshuaK - PCI-DSS has robust provisions for handling service providers with access to in scope data, if a customer has PCI relevant data in Sentinel then Microsoft will already by a PCI service provider for them for which Microsoft has accreditation - https://docs.microsoft.com/en-us/microsoft-365/compliance/offering-pci-dss

Any other MSP with access to that data would also have to go through an accreditation and audit process but this is a well established path for QSAs.

 

As for malicious actors gaining access via a partner it is a threat vector to consider as attackers have targetted service providers to gain access to customers, however it with robust auditing of MSP security controls this risk can be managed. In addition the Lighthouse configuration allows you to assign granular controls over what an MSP has access to meaning it could be limited to read-only access to Sentinel data, limiting the scope of impact in a scenario where an MSP might be breached.

Frequent Contributor

Is there any way to easily deploy playbooks to different tenants at once? That way you can keep a baseline for all customers

Microsoft

@Thijs Lecomte : you can use ARM. See here and here.