Home
%3CLINGO-SUB%20id%3D%22lingo-sub-829563%22%20slang%3D%22en-US%22%3EInfrastructure%20%2B%20Security%3A%20Noteworthy%20News%20(August%2C%202019)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-829563%22%20slang%3D%22en-US%22%3E%3CP%3E%3C%2FP%3E%0A%3CDIV%20class%3D%22WordSection1%22%3E%0A%3CP%20class%3D%22paragraph%22%20style%3D%22vertical-align%3A%20baseline%3B%22%3E%3CSPAN%20class%3D%22normaltextrun1%22%3E%3CSPAN%20style%3D%22font-size%3A%2011.0pt%3B%20font-family%3A%20'Calibri'%2Csans-serif%3B%22%3EHi%20there!%20You%20are%20reading%20the%20next%20issue%20of%20the%20Infrastructure%20%2B%20Security%3A%20Noteworthy%20News%20series!%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22eop%22%3E%3CSPAN%20style%3D%22font-size%3A%2011.0pt%3B%20font-family%3A%20'Calibri'%2Csans-serif%3B%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22paragraph%22%20style%3D%22vertical-align%3A%20baseline%3B%22%3E%3CSPAN%20class%3D%22eop%22%3E%3CSPAN%20style%3D%22font-size%3A%2011.0pt%3B%20font-family%3A%20'Calibri'%2Csans-serif%3B%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22paragraph%22%20style%3D%22vertical-align%3A%20baseline%3B%22%3E%3CSPAN%20class%3D%22normaltextrun1%22%3E%3CSPAN%20style%3D%22font-size%3A%2011.0pt%3B%20font-family%3A%20'Calibri'%2Csans-serif%3B%22%3EAs%20a%20reminder%2C%20the%20Noteworthy%20News%20series%20covers%20various%20areas%2C%20to%20include%20interesting%20news%2C%20announcements%2C%20links%2C%20tips%20and%20tricks%20from%20Windows%2C%20Azure%2C%20and%20Security%20worlds%20on%20a%20monthly%20basis.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22paragraph%22%20style%3D%22vertical-align%3A%20baseline%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20class%3D%22MsoNormalTable%22%20style%3D%22margin-left%3A%204.5pt%3B%20border-collapse%3A%20collapse%3B%22%20border%3D%220%22%20cellspacing%3D%220%22%20cellpadding%3D%220%22%3E%0A%3CTBODY%3E%0A%3CTR%20style%3D%22height%3A%20.25in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.25in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%20line-height%3A%2090%25%3B%22%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20line-height%3A%2090%25%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3EMicrosoft%20Azure%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2029.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2029.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fintroducing-azure-dedicated-host%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EIntroducing%20Azure%20Dedicated%20Host%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EWe%20are%20excited%20to%20announce%20the%20preview%20of%20Azure%20Dedicated%20Host%2C%20a%20new%20Azure%20service%20that%20enables%20you%20to%20run%20your%20organization%E2%80%99s%20Linux%20and%20Windows%20virtual%20machines%20on%20single-tenant%20physical%20servers.%20Azure%20Dedicated%20Hosts%20provide%20you%20with%20visibility%20and%20control%20to%20help%20address%20corporate%20compliance%20and%20regulatory%20requirements.%20We%20are%20extending%20Azure%20Hybrid%20Benefit%20to%20Azure%20Dedicated%20Hosts%2C%20so%20you%20can%20save%20money%20by%20using%20on-premises%20Windows%20Server%20and%20SQL%20Server%20licenses%20with%20Software%20Assurance%20or%20qualifying%20subscription%20licenses.%20Azure%20Dedicated%20Host%20is%20in%20preview%20in%20most%20Azure%20regions%20starting%20today.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2029.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2029.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FAzure-Active-Directory-Identity%2FAnnouncing-the-general-availability-of-two-key-features-in-Azure%2Fba-p%2F566362%22%20target%3D%22_blank%22%3EAnnouncing%20the%20general%20availability%20of%20two%20key%20features%20in%20Azure%20AD%20B2C%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EWe%20are%20excited%20to%20announce%20the%20general%20availability%20of%20two%20key%20features%20in%20Azure%20AD%20B2C.%20First%2C%20is%20the%20ability%20to%20add%20custom%20OpenID%20Connect%20(OIDC)%20identity%20providers%20for%20user%20flows.%20Second%2C%20is%20the%20capability%20to%20passthrough%20the%20access%20token%20from%20identity%20providers%20to%20your%20application.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2029.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2029.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fyour-single-source-for-azure-best-practices%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EYour%20single%20source%20for%20Azure%20best%20practices%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EMany%20Azure%20services%20offer%20best%20practices%20and%20advice.%20Examples%20include%20Azure%20Security%20Center%2C%20Azure%20Cost%20Management%2C%20and%20Azure%20SQL%20Database.%20But%20what%20if%20you%20want%20a%20single%20source%20for%20Azure%20best%20practices%2C%20a%20central%20location%20where%20you%20can%20see%20and%20act%20on%20every%20optimization%20recommendation%20available%20to%20you%3F%20That%E2%80%99s%20why%20we%20created%20Microsoft%20Azure%20Advisor%2C%20a%20service%20that%20helps%20you%20optimize%20your%20resources%20for%20high%20availability%2C%20security%2C%20performance%2C%20and%20cost%2C%20pulling%20in%20recommendations%20from%20across%20Azure%20and%20supplementing%20them%20with%20best%20practices%20of%20its%20own.%20In%20this%20blog%2C%20we%E2%80%99ll%20explore%20how%20you%20can%20use%20Advisor%20as%20your%20single%20destination%20for%20resource%20optimization%20and%20start%20getting%20more%20out%20of%20Azure.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2029.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2029.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Farchitecture%2Fcloud-adoption%2Foperations%2Fmonitor%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3ECloud%20monitoring%20guide%3A%20Introduction%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%3CSPAN%20style%3D%22color%3A%20black%3B%22%3EThe%20cloud%20presents%20a%20fundamental%20shift%20in%20the%20way%20that%20enterprises%20procure%20and%20use%20technology%20resources.%20In%20the%20past%2C%20enterprises%20assumed%20ownership%20and%20responsibility%20of%20all%20levels%20of%20technology%2C%20from%20infrastructure%20to%20software.%20Now%2C%20the%20cloud%20offers%20the%20potential%20for%20enterprises%20to%20provision%20and%20consume%20resources%20as%20needed.%20While%20the%20cloud%20offers%20nearly%20unlimited%20flexibility%20in%20terms%20of%20design%20choices%2C%20enterprises%20seek%20proven%20and%20consistent%20methodology%20for%20the%20adoption%20of%20cloud%20technologies.%20Each%20enterprise%20has%20different%20goals%20and%20timelines%20for%20cloud%20adoption%2C%20making%20a%20one-size-fits-all%20approach%20to%20adoption%20nearly%20impossible.%20This%20guide%20isn't%20a%20how-to%20guide%20for%20using%20or%20configuring%20individual%20Azure%20services%20and%20solutions%2C%20but%20does%20reference%20those%20sources%20when%20applicable%20or%20available.%20After%20reading%20this%20guide%2C%20you'll%20understand%20how%20to%20successfully%20operate%20a%20workload%20following%20recommended%20practices%20and%20patterns.%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2074.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2074.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fbetter-security-with-enhanced-access-control-experience-in-azure-files%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EBetter%20security%20with%20enhanced%20access%20control%20experience%20in%20Azure%20Files%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%3CSPAN%20style%3D%22color%3A%20black%3B%22%3EWe%20are%20making%20it%20easier%20for%20customers%20to%20%E2%80%9Clift%20and%20shift%E2%80%9D%20applications%20to%20the%20cloud%20while%20maintaining%20the%20same%20security%20model%20used%20on-premises%20with%20the%20general%20availability%20of%20Azure%20Active%20Directory%20Domain%20Services%20(Azure%20AD%20DS)%20authentication%20for%20Azure%20Files.%20By%20integrating%20Azure%20AD%20DS%2C%20you%20can%20mount%20your%20Azure%20file%20share%20over%20SMB%20using%20Azure%20Active%20Directory%20(Azure%20AD)%20credentials%20from%20Azure%20AD%20DS%20domain%20joined%20Windows%20virtual%20machines%20(VMs)%20with%20NTFS%20access%20control%20lists%20(ACLs)%20enforced.%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%20line-height%3A%2090%25%3B%22%3E%3CA%20name%3D%22Client%22%20target%3D%22_blank%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20line-height%3A%2090%25%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3EWindows%20Client%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2020.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2020.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.windowscentral.com%2Fhow-configure-windows-sandbox-windows-10%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EHow%20to%20configure%20Windows%20Sandbox%20on%20Windows%2010%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EOn%20Windows%2010%2C%20starting%20with%20the%20May%202019%20Update%2C%20you%20can%20use%20Windows%20Sandbox%2C%20a%20feature%20that%20offers%20a%20lightweight%20environment%20isolated%20from%20your%20main%20installation%2C%20to%20run%20untrusted%20applications.%20Although%20it's%20a%20great%20feature%20for%20system%20administrators%20and%20developers%2C%20Windows%20Sandbox%20doesn't%20include%20an%20interface%20to%20customize%20the%20experience.%20However%2C%20you%20can%20create%20a%20simple%20configuration%20file%20to%20control%20various%20aspects%20of%20the%20feature.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2020.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2020.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fwhats-new%2Fwhats-new-windows-10-version-1903%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EWhat's%20new%20in%20Windows%2010%2C%20version%201903%20IT%20Pro%20content%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EThis%20article%20lists%20new%20and%20updated%20features%20and%20content%20that%20are%20of%20interest%20to%20IT%20Pros%20for%20Windows%2010%20version%201903%2C%20also%20known%20as%20the%20Windows%2010%20May%202019%20Update.%20This%20update%20also%20contains%20all%20features%20and%20fixes%20included%20in%20previous%20cumulative%20updates%20to%20Windows%2010%2C%20version%201809.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%22%3E%3CA%20name%3D%22Security%22%20target%3D%22_blank%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3ESecurity%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2057.35pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2057.35pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity-center%2Fsecurity-center-features-retirement-july2019%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3ERetirement%20of%20Azure%20Security%20Center%20features%20(July%202019)%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EWe've%20made%20several%20improvements%20to%20Azure%20Security%20Center%20over%20the%20last%20six%20months.%20With%20these%20improved%20capabilities%2C%20we're%20removing%20some%20redundant%20features%20and%20related%20APIs%20from%20Security%20Center%20on%20July%2031%2C%202019.%20Most%20of%20these%20retiring%20features%20can%20be%20replaced%20with%20new%20functionality%20in%20Azure%20Security%20Center%20or%20Azure%20Log%20Analytics.%20Other%20features%20can%20be%20implemented%20using%20Azure%20Sentinel%20(preview).%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fannouncing-general-availability-for-the-azure-security-center-for-iot%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EAnnouncing%20general%20availability%20for%20the%20Azure%20Security%20Center%20for%20IoT%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3ETo%20give%20your%20organization%20IoT%20threat%20protection%20and%20security%20posture%20management%20across%20your%20entire%20IoT%20solution%2C%20we%E2%80%99re%20announcing%20the%20general%20availability%20of%20Azure%20Security%20Center%20for%20IoT.%20Azure%20Security%20Center%20allows%20you%20to%20protect%20your%20end-to-end%20IoT%20deployment%20by%20identifying%20and%20responding%20to%20emerging%20threats%2C%20as%20well%20as%20finding%20issues%20in%20your%20configurations%20before%20attackers%20can%20use%20them%20to%20compromise%20your%20deployment.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FSecurity-Privacy-and-Compliance%2FMaximizing-Your-Security-Posture-with-Azure-ATP%2Fba-p%2F772052%22%20target%3D%22_blank%22%3EMaximizing%20Your%20Security%20Posture%20with%20Azure%20ATP%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EAzure%20ATP%20constantly%20monitors%20your%20domain%20controllers%20for%20identity-based%20threats%2C%20attacks%20and%20security%20posture%20issues%20by%20capturing%20and%20parsing%20network%20traffic%20and%20leveraging%20Windows%20events.%20From%20here%20it%20then%20analyzes%20the%20data%20utilizing%20profiling%2C%20deterministic%20detection%2C%20machine%20learning%20and%20behavioral%20algorithms%20that%20enable%20it%20to%20learn%20your%20network%2C%20detect%20anomalies%20and%20warn%20you%20of%20suspicious%20activities.%20To%20maximize%20Azure%20ATP%E2%80%99s%20potential%20to%20catch%20anomalous%20identity%20related%20activities%20and%20to%20lower%20your%20time-to-resolve%20them%20we%20need%20to%20ensure%20that%20Azure%20ATP%20is%20fully%20configured%20and%20to%20do%20this%20you%20can%20use%20Microsoft%20Secure%20Scoreto%20surface%20a%20series%20of%20configuration%20checks.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2060.95pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2060.95pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FAzure-Sentinel%2FDetect-Network-beaconing-via-Intra-Request-time-delta-patterns%2Fba-p%2F779586%22%20target%3D%22_blank%22%3EDetect%20Network%20beaconing%20via%20Intra-Request%20time%20delta%20patterns%20in%20Azure%20Sentinel%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3ENetwork%20beaconing%20is%20generally%20described%20as%20network%20traffic%20originating%20from%20victim%60s%20network%20towards%20adversary%20controlled%20infrastructure%20that%20occurs%20at%20regular%20intervals%20which%20could%20be%20an%20indication%20of%20malware%20infection%20or%20compromised%20host%20doing%20data%20exfiltration.%26nbsp%3B%20This%20article%20will%20discuss%20the%20use%20case%20of%20detecting%20network%20beaconing%20via%20intra-request%20time%20delta%20patterns%20using%20KQL%20(Kusto%20query%20language)%20in%20Azure%20Sentinel.%26nbsp%3B%20The%20logic%20or%20technique%20of%20the%20use-case%20was%20originally%20discussed%20at%20threat%20hunting%20project%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FThreatHuntingProject%2FThreatHunting%2Fblob%2Fmaster%2Fhunts%2Fbeacon_detection_via_intra_request_time_deltas.md%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3Eand%20also%20blogged%20with%20the%20open%20source%20network%20analytics%20tool%20(flare)%20implementation%20by%20huntoperator%20%3CA%20href%3D%22http%3A%2F%2Fwww.austintaylor.io%2Fdetect%2Fbeaconing%2Fintrusion%2Fdetection%2Fsystem%2Fcommand%2Fcontrol%2Fflare%2Felastic%2Fstack%2F2017%2F06%2F10%2Fdetect-beaconing-with-flare-elasticsearch-and-intrusion-detection-systems%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%26nbsp%3B%20Implementing%20this%20technique%20natively%20using%20KQL%20allows%20defenders%20to%20quickly%20apply%20it%20over%20multiple%20network%20data%20sources%20and%20easily%20set%20up%20alerts%20within%20Azure%20Sentinel.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2057.35pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2057.35pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FSecurity-Privacy-and-Compliance%2FCheck-out-the-Microsoft-Graph-Security-sample-application%2Fba-p%2F790905%22%20target%3D%22_blank%22%3ECheck%20out%20the%20Microsoft%20Graph%20Security%20sample%20application!%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%3CSPAN%20style%3D%22color%3A%20black%3B%22%3EIt%E2%80%99s%20easy%20to%20build%20rich%20security%20applications%20using%20the%20Microsoft%20Graph%20Security%20API.%20We%20built%20one%20to%20help%20demo%20the%20capabilities%20and%20have%20shared%20the%20sample%20code%20on%20GitHub%20so%20you%20can%20use%20it%20to%20kick%20start%20development%20of%20your%20own%20security%20app!%20The%20sample%20app%20is%20designed%20to%20showcase%20some%20of%20the%20key%20scenarios%20enabled%20by%20the%20Microsoft%20Graph%20Security%20API.%20As%20you%E2%80%99ll%20see%2C%20data%20from%20across%20the%20organization%20is%20surfaced%20%E2%80%93%20from%20both%20Microsoft%20and%20third-party%20security%20solutions%2C%20in%20one%20simple%20dashboard.%20Users%20can%20easily%20drill%20down%20into%20specific%20alerts%20to%20get%20additional%20information%20and%20context%2C%20update%20alert%20status%20and%20add%20tags%2C%20pivot%20to%20view%20related%20alerts%20for%20a%20specific%20user%20or%20device%2C%20view%20detailed%20information%20about%20security%20recommendations%2C%20and%20much%20more.%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2057.35pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2057.35pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F07%2F31%2Fhow-windows-defender-antivirus-integrates-hardware-based-system-integrity-for-informed-extensive-endpoint-protection%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EHow%20Windows%20Defender%20Antivirus%20integrates%20hardware-based%20system%20integrity%20for%20informed%2C%20extensive%20endpoint%20protection%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%3CSPAN%20style%3D%22color%3A%20black%3B%22%3ERecently%2C%20the%20Microsoft%20Defender%20ATP%20research%20team%20found%20a%20malicious%20system%20driver%20enabling%20a%20token%20swap%20attack%20that%20could%20lead%20to%20privilege%20escalation.%20In%20this%20blog%2C%20we%E2%80%99ll%20share%20our%20analysis%20of%20the%20said%20attack%20and%20discuss%20how%20Windows%20Defender%20Antivirus%20uses%20its%20unique%20visibility%20into%20system%20behaviors%20to%20detect%20dangerous%20kernel%20threats.%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.25in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.25in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%20line-height%3A%2090%25%3B%22%3E%3CA%20name%3D%22Vulns%22%20target%3D%22_blank%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20line-height%3A%2090%25%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3EVulnerabilities%20and%20Updates%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2051.5pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2051.5pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fmsrc-blog.microsoft.com%2F2019%2F08%2F13%2Fpatch-new-wormable-vulnerabilities-in-remote-desktop-services-cve-2019-1181-1182%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EPatch%20new%20wormable%20vulnerabilities%20in%20Remote%20Desktop%20Services%20(CVE-2019-1181%2F1182)%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EOn%20August%2013th%2C%20Microsoft%20released%20a%20set%20of%20fixes%20for%20Remote%20Desktop%20Services%20that%20include%20two%20critical%20Remote%20Code%20Execution%20(RCE)%20vulnerabilities%2C%20CVE-2019-1181%20and%20CVE-2019-1182.%20Like%20the%20previously-fixed%20%E2%80%98BlueKeep%E2%80%99%20vulnerability%20(CVE-2019-0708)%2C%20these%20two%20vulnerabilities%20are%20also%20%E2%80%98wormable%E2%80%99%2C%20meaning%20that%20any%20future%20malware%20that%20exploits%20these%20could%20propagate%20from%20vulnerable%20computer%20to%20vulnerable%20computer%20without%20user%20interaction.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2051.5pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2051.5pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fportal.msrc.microsoft.com%2Fen-US%2Fsecurity-guidance%2Fadvisory%2FCVE-2019-1125%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3ECVE-2019-1125%20%7C%20Windows%20Kernel%20Information%20Disclosure%20Vulnerability%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EAn%20information%20disclosure%20vulnerability%20exists%20when%20certain%20central%20processing%20units%20(CPU)%20speculatively%20access%20memory.%20An%20attacker%20who%20successfully%20exploited%20the%20vulnerability%20could%20read%20privileged%20data%20across%20trust%20boundaries.%20To%20exploit%20this%20vulnerability%2C%20an%20attacker%20would%20have%20to%20log%20on%20to%20an%20affected%20system%20and%20run%20a%20specially%20crafted%20application.%20The%20vulnerability%20would%20not%20allow%20an%20attacker%20to%20elevate%20user%20rights%20directly%2C%20but%20it%20could%20be%20used%20to%20obtain%20information%20that%20could%20be%20used%20to%20try%20to%20compromise%20the%20affected%20system%20further.%20On%20January%203%2C%202018%2C%20Microsoft%20released%20an%20advisory%20and%20security%20updates%E2%80%AFrelated%20to%20a%20newly-discovered%20class%20of%20hardware%20vulnerabilities%20(known%20as%20Spectre)%20involving%20speculative%20execution%20side%20channels%20that%20affect%20AMD%2C%20ARM%2C%20and%20Intel%20CPUs%20to%20varying%20degrees.%20This%20vulnerability%2C%20released%20on%20August%206%2C%202019%2C%20is%20a%20variant%20of%20the%20Spectre%20Variant%201%20speculative%20execution%20side%20channel%20vulnerability%20and%20has%20been%20assigned%20CVE-2019-1125.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%22%3E%3CA%20name%3D%22SupportLifecycle%22%20target%3D%22_blank%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3ESupport%20Lifecycle%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FITOps-Talk-Blog%2FCountdown-to-End-of-Support-2020%2Fba-p%2F806002%22%20target%3D%22_blank%22%3ECountdown%20to%20End%20of%20Support%202020!%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EAll%20good%20things%20come%20to%20end%20and%20the%20end%20is%20nearing.%20What%20am%20I%20talking%20about%20you%20ask%3F%20That%20is%20end%20of%20support%20for%20several%20Microsoft%20server%20products%20in%20just%205%20short%20months.%20Yes%20friends%2C%20in%205%20short%20months%20there%20are%20several%20products%20that%20will%20be%20going%20end%20of%20support%20(%20EOS)%20.%20What%20does%20this%20mean%20for%20those%20running%20these%20products%3F%20Keep%20reading%20and%20this%20post%20will%20detail%20what%20key%20products%20will%20be%20end%20of%20support%20and%20what%20options%20you%20have%20to%20get%20updated%20and%20current.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FEnterprise-Mobility-Security%2FEnd-of-support-for-TLS-1-0-and-1-1-in-Microsoft-Cloud-App%2Fba-p%2F770507%22%20target%3D%22_blank%22%3EEnd%20of%20support%20for%20TLS%201.0%20and%201.1%20in%20Microsoft%20Cloud%20App%20Security%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EMicrosoft%20Cloud%20App%20Security%20is%20moving%20to%20Transport%20Layer%20Security%20(TLS)%201.2%2B%20to%20provide%20best-in-class%20encryption%2C%20and%20to%20ensure%20our%20service%20is%20more%20secure%20by%20default.%20As%20of%20September%208%2C%202019%20Microsoft%20Cloud%20App%20Securitywill%20no%20longer%20support%20TLS%201.0%20and%201.1.%20This%20means%20that%20any%20connection%20using%20these%20protocols%20will%20no%20longer%20work%20as%20expected%2C%20and%20no%20support%20will%20be%20provided.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4057281%2Fwindows-7-support-will-end-on-january-14-2020%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EWindows%207%20support%20will%20end%20on%20January%2014%2C%202020%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EMicrosoft%20made%20a%20commitment%20to%20provide%2010%20years%20of%20product%20support%20for%20Windows%207%20when%20it%20was%20released%20on%20October%2022%2C%202009.%20When%20this%2010-year%20period%20ends%2C%20Microsoft%20will%20discontinue%20Windows%207%20support%20so%20that%20we%20can%20focus%20our%20investment%20on%20supporting%20newer%20technologies%20and%20great%20new%20experiences.%20The%20specific%20end%20of%20support%20day%20for%20Windows%207%20will%20be%20January%2014%2C%202020.%20After%20that%2C%20technical%20assistance%20and%20automatic%20updates%20that%20help%20protect%20your%20PC%20will%20no%20longer%20be%20made%20available%20for%20the%20product.%20Microsoft%20strongly%20recommends%20that%20you%20move%20to%20Windows%2010%20sometime%20before%20January%202020%20to%20avoid%20a%20situation%20where%20you%20need%20service%20or%20support%20that%20is%20no%20longer%20available.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fna01.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Faka.ms%252Feos-offer-faq%26amp%3Bdata%3D02%257C01%257C%257C59ea4666deb74dc1f6b208d611f497b8%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C636716140005621349%26amp%3Bsdata%3DPaW9kDmsoDSDUTlaro%252B7NW7FivkMqJ34H0bye%252Bvqj%252Fw%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EExtended%20Security%20Updates%20for%20SQL%20Server%20and%20Windows%20Server%202008%2F2008%20R2%3A%20Frequently%20Asked%20Questions%3C%2FA%3E%20(PDF)%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EOn%20January%2014%2C%202020%2C%20support%20for%20Windows%20Server%202008%20and%202008%20R2%20will%20end.%20That%20means%20the%20end%20of%20regular%20security%20updates.%20Don't%20let%20your%20infrastructure%20and%20applications%20go%20unprotected.%20We're%20here%20to%20help%20you%20migrate%20to%20current%20versions%20for%20greater%20security%2C%20performance%20and%20innovation.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4316957%2Fproducts-reaching-end-of-support-for-2019%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EProducts%20reaching%20End%20of%20Support%20for%202019%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4470235%2Fproducts-reaching-end-of-support-for-2020%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EProducts%20reaching%20End%20of%20Support%20for%202020%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2035.75pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2035.75pt%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%22%3E%3CA%20name%3D%22Premier%22%20target%3D%22_blank%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3EMicrosoft%20Premier%20Support%20News%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CSPAN%20style%3D%22color%3A%20%23404040%3B%22%3EThe%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fserviceshub.microsoft.com%2Fblog%2F2019%2F08%2F13%2Frelease-announcement-microsoft-azure-active-directory-assessment-for-it-decision-makers%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%20style%3D%22color%3A%20black%3B%22%3EMicrosoft%20Azure%20Active%20Directory%20Assessment%20for%20IT%20Decision%20Makers%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20style%3D%22color%3A%20%23404040%3B%22%3Eis%20designed%20for%20the%20Support%20Technology%20Advisor%20(STA)%20service%20and%20offered%20at%20no%20cost%20to%20Unified%20Support%20Performance%20customers.%20This%20is%20designed%20to%20be%20a%20strategic%20assessment%20that%20evaluates%20your%20current%20Azure%20AD%20environment%20to%20identify%20current%20features%2C%20capabilities%2C%20and%20usage%2C%20and%20provides%20the%20necessary%20guidance%20and%20recommendations%20to%20improve%20your%20Azure%20AD%20environment%20maturity%20and%20achieve%20your%20desired%20Azure%20workload%20outcomes.%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3EMicrosoft%20Azure%20Sentinel%20is%20a%20cloud-native%20security%20information%20and%20event%20management%20(SIEM)%20solution%20that%20provides%20limitless%20cloud%20speed%20and%20scale%2C%20integration%20with%20existing%20tools%20and%20data%20sources%2C%20and%20faster%20threat%20protection%20with%20artificial%20intelligence%20(AI)%20capabilities.%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%3CSTRONG%3EAzure%20Sentinel%20-%20Fundamentals%3C%2FSTRONG%3Eis%20a%205-day%20engagement%20which%20helps%20you%20get%20started%20with%20Azure%20Sentinel.%20You%20will%20learn%20how%20to%20effectively%20plan%20and%20onboard%20the%20solution%20in%20your%20environment%2C%20SecOps%20Foundational%20concepts%2C%20and%20scenarios%20walkthrough.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%20style%3D%22margin-right%3A%20.1in%3B%20margin-bottom%3A%206.0pt%3B%20line-height%3A%20105%25%3B%22%3ECheck%20out%20Microsoft%20Services%20public%20blog%20for%20new%20Proactive%20Services%20as%20well%20as%20new%20features%20and%20capabilities%20of%20the%20Services%20Hub%2C%20On-demand%20Assessments%2C%20and%20On-demand%20Learning%20platforms.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-829563%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EHi%20there!%20Stanislav%20Belov%20here%2C%20and%20you%20are%20reading%20the%20next%20issue%20of%20the%20Infrastructure%20%2B%20Security%3A%20Noteworthy%20News%20series!%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EAs%20a%20reminder%2C%20the%20Noteworthy%20News%20series%20covers%20various%20areas%2C%20to%20include%20interesting%20news%2C%20announcements%2C%20links%2C%20tips%20and%20tricks%20from%20Windows%2C%20Azure%2C%20and%20Security%20worlds%20on%20a%20monthly%20basis.%20%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-829563%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EStanislavBelov%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Hi there! You are reading the next issue of the Infrastructure + Security: Noteworthy News series!  

 

As a reminder, the Noteworthy News series covers various areas, to include interesting news, announcements, links, tips and tricks from Windows, Azure, and Security worlds on a monthly basis.

 

 

Microsoft Azure

Introducing Azure Dedicated Host

We are excited to announce the preview of Azure Dedicated Host, a new Azure service that enables you to run your organization’s Linux and Windows virtual machines on single-tenant physical servers. Azure Dedicated Hosts provide you with visibility and control to help address corporate compliance and regulatory requirements. We are extending Azure Hybrid Benefit to Azure Dedicated Hosts, so you can save money by using on-premises Windows Server and SQL Server licenses with Software Assurance or qualifying subscription licenses. Azure Dedicated Host is in preview in most Azure regions starting today.

Announcing the general availability of two key features in Azure AD B2C

We are excited to announce the general availability of two key features in Azure AD B2C. First, is the ability to add custom OpenID Connect (OIDC) identity providers for user flows. Second, is the capability to passthrough the access token from identity providers to your application.

Your single source for Azure best practices

Many Azure services offer best practices and advice. Examples include Azure Security Center, Azure Cost Management, and Azure SQL Database. But what if you want a single source for Azure best practices, a central location where you can see and act on every optimization recommendation available to you? That’s why we created Microsoft Azure Advisor, a service that helps you optimize your resources for high availability, security, performance, and cost, pulling in recommendations from across Azure and supplementing them with best practices of its own. In this blog, we’ll explore how you can use Advisor as your single destination for resource optimization and start getting more out of Azure.

Cloud monitoring guide: Introduction

The cloud presents a fundamental shift in the way that enterprises procure and use technology resources. In the past, enterprises assumed ownership and responsibility of all levels of technology, from infrastructure to software. Now, the cloud offers the potential for enterprises to provision and consume resources as needed. While the cloud offers nearly unlimited flexibility in terms of design choices, enterprises seek proven and consistent methodology for the adoption of cloud technologies. Each enterprise has different goals and timelines for cloud adoption, making a one-size-fits-all approach to adoption nearly impossible. This guide isn't a how-to guide for using or configuring individual Azure services and solutions, but does reference those sources when applicable or available. After reading this guide, you'll understand how to successfully operate a workload following recommended practices and patterns.

Better security with enhanced access control experience in Azure Files

We are making it easier for customers to “lift and shift” applications to the cloud while maintaining the same security model used on-premises with the general availability of Azure Active Directory Domain Services (Azure AD DS) authentication for Azure Files. By integrating Azure AD DS, you can mount your Azure file share over SMB using Azure Active Directory (Azure AD) credentials from Azure AD DS domain joined Windows virtual machines (VMs) with NTFS access control lists (ACLs) enforced.

Windows Client

How to configure Windows Sandbox on Windows 10

On Windows 10, starting with the May 2019 Update, you can use Windows Sandbox, a feature that offers a lightweight environment isolated from your main installation, to run untrusted applications. Although it's a great feature for system administrators and developers, Windows Sandbox doesn't include an interface to customize the experience. However, you can create a simple configuration file to control various aspects of the feature.

What's new in Windows 10, version 1903 IT Pro content

This article lists new and updated features and content that are of interest to IT Pros for Windows 10 version 1903, also known as the Windows 10 May 2019 Update. This update also contains all features and fixes included in previous cumulative updates to Windows 10, version 1809.

Security

Retirement of Azure Security Center features (July 2019)

We've made several improvements to Azure Security Center over the last six months. With these improved capabilities, we're removing some redundant features and related APIs from Security Center on July 31, 2019. Most of these retiring features can be replaced with new functionality in Azure Security Center or Azure Log Analytics. Other features can be implemented using Azure Sentinel (preview).

Announcing general availability for the Azure Security Center for IoT

To give your organization IoT threat protection and security posture management across your entire IoT solution, we’re announcing the general availability of Azure Security Center for IoT. Azure Security Center allows you to protect your end-to-end IoT deployment by identifying and responding to emerging threats, as well as finding issues in your configurations before attackers can use them to compromise your deployment.

Maximizing Your Security Posture with Azure ATP

Azure ATP constantly monitors your domain controllers for identity-based threats, attacks and security posture issues by capturing and parsing network traffic and leveraging Windows events. From here it then analyzes the data utilizing profiling, deterministic detection, machine learning and behavioral algorithms that enable it to learn your network, detect anomalies and warn you of suspicious activities. To maximize Azure ATP’s potential to catch anomalous identity related activities and to lower your time-to-resolve them we need to ensure that Azure ATP is fully configured and to do this you can use Microsoft Secure Score to surface a series of configuration checks.

Detect Network beaconing via Intra-Request time delta patterns in Azure Sentinel

Network beaconing is generally described as network traffic originating from victim`s network towards adversary controlled infrastructure that occurs at regular intervals which could be an indication of malware infection or compromised host doing data exfiltration.  This article will discuss the use case of detecting network beaconing via intra-request time delta patterns using KQL (Kusto query language) in Azure Sentinel.  The logic or technique of the use-case was originally discussed at threat hunting project here and also blogged with the open source network analytics tool (flare) implementation by huntoperator here.  Implementing this technique natively using KQL allows defenders to quickly apply it over multiple network data sources and easily set up alerts within Azure Sentinel.

Check out the Microsoft Graph Security sample application!

It’s easy to build rich security applications using the Microsoft Graph Security API. We built one to help demo the capabilities and have shared the sample code on GitHub so you can use it to kick start development of your own security app! The sample app is designed to showcase some of the key scenarios enabled by the Microsoft Graph Security API. As you’ll see, data from across the organization is surfaced – from both Microsoft and third-party security solutions, in one simple dashboard. Users can easily drill down into specific alerts to get additional information and context, update alert status and add tags, pivot to view related alerts for a specific user or device, view detailed information about security recommendations, and much more.

How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive en...

Recently, the Microsoft Defender ATP research team found a malicious system driver enabling a token swap attack that could lead to privilege escalation. In this blog, we’ll share our analysis of the said attack and discuss how Windows Defender Antivirus uses its unique visibility into system behaviors to detect dangerous kernel threats.

Vulnerabilities and Updates

Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182)

On August 13th, Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182. Like the previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction.

CVE-2019-1125 | Windows Kernel Information Disclosure Vulnerability

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125.

Support Lifecycle

Countdown to End of Support 2020!

All good things come to end and the end is nearing. What am I talking about you ask? That is end of support for several Microsoft server products in just 5 short months. Yes friends, in 5 short months there are several products that will be going end of support ( EOS) . What does this mean for those running these products? Keep reading and this post will detail what key products will be end of support and what options you have to get updated and current.

End of support for TLS 1.0 and 1.1 in Microsoft Cloud App Security

Microsoft Cloud App Security is moving to Transport Layer Security (TLS) 1.2+ to provide best-in-class encryption, and to ensure our service is more secure by default. As of September 8, 2019 Microsoft Cloud App Security will no longer support TLS 1.0 and 1.1. This means that any connection using these protocols will no longer work as expected, and no support will be provided.

Windows 7 support will end on January 14, 2020

Microsoft made a commitment to provide 10 years of product support for Windows 7 when it was released on October 22, 2009. When this 10-year period ends, Microsoft will discontinue Windows 7 support so that we can focus our investment on supporting newer technologies and great new experiences. The specific end of support day for Windows 7 will be January 14, 2020. After that, technical assistance and automatic updates that help protect your PC will no longer be made available for the product. Microsoft strongly recommends that you move to Windows 10 sometime before January 2020 to avoid a situation where you need service or support that is no longer available.

Extended Security Updates for SQL Server and Windows Server 2008/2008 R2: Frequently Asked Questions (PDF)

On January 14, 2020, support for Windows Server 2008 and 2008 R2 will end. That means the end of regular security updates. Don't let your infrastructure and applications go unprotected. We're here to help you migrate to current versions for greater security, performance and innovation.

Products reaching End of Support for 2019

Products reaching End of Support for 2020

Microsoft Premier Support News

The Microsoft Azure Active Directory Assessment for IT Decision Makers is designed for the Support Technology Advisor (STA) service and offered at no cost to Unified Support Performance customers. This is designed to be a strategic assessment that evaluates your current Azure AD environment to identify current features, capabilities, and usage, and provides the necessary guidance and recommendations to improve your Azure AD environment maturity and achieve your desired Azure workload outcomes.

Microsoft Azure Sentinel is a cloud-native security information and event management (SIEM) solution that provides limitless cloud speed and scale, integration with existing tools and data sources, and faster threat protection with artificial intelligence (AI) capabilities.

Azure Sentinel - Fundamentals is a 5-day engagement which helps you get started with Azure Sentinel. You will learn how to effectively plan and onboard the solution in your environment, SecOps Foundational concepts, and scenarios walkthrough.

Check out Microsoft Services public blog for new Proactive Services as well as new features and capabilities of the Services Hub, On-demand Assessments, and On-demand Learning platforms.