Home

How Azure Security Center helps detect attacks against your Linux machines

%3CLINGO-SUB%20id%3D%22lingo-sub-186495%22%20slang%3D%22en-US%22%3EHow%20Azure%20Security%20Center%20helps%20detect%20attacks%20against%20your%20Linux%20machines%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-186495%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20Security%20Center%20(ASC)%20is%20now%20extending%20its%20Linux%20threat%20detection%20preview%20program%2C%20both%20on%20cloud%20and%20on-premise.%20New%20capabilities%20include%20detection%20of%20suspicious%20processes%2C%20suspect%20login%20attempts%2C%20and%20anomalous%20kernel%20module%20loads.%20Security%20Center%20is%20using%20auditd%20for%20collecting%20machines%E2%80%99%20events%2C%20which%20is%20one%20of%20the%20most%20common%20frameworks%20for%20auditing%20on%20Linux.%20Auditd%20has%20the%20advantage%20of%20having%20been%20around%20for%20a%20long%20time%20and%20living%20in%20the%20mainline%20kernel.%20Any%20Linux%20machine%20that%20runs%20auditd%20by%20default%20and%20is%20covered%20by%20Security%20Center%20will%20benefit%20from%20this%20public%20preview.%20For%20a%20little%20more%20detail%20on%20how%20the%20collection%20works%2C%20check%20out%20our%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fazure-security-center-previews-new-threat-detections-for-linux%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Eprivate%20preview%20announcement%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Efrom%20October.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20addition%20to%20building%20up%20Linux-specific%20detections%2C%20we%20have%20also%20reviewed%20applicability%20of%20our%20current%20detections%20originally%20developed%20for%20Windows.%20Attackers%20also%20like%20to%20be%20OS-agnostic%2C%20especially%20for%20large-scale%20attacks%2C%20and%20will%20reuse%20tools%20and%20techniques%20where%20they%20can.%20In%20such%20circumstances%20the%20same%20detection%20is%20also%20applicable%20across%20operating%20systems.%20Happily%2C%20several%20of%20our%20analytics%20worked%20with%20minimal%20tuning.%20Today%2C%20I%E2%80%99ll%20walk%20you%20through%20an%20analytic%20example%20in%20the%20form%20of%20malicious%20crypto%20coin%20mining%20and%20then%20give%20some%20tips%20on%20using%20Azure%20Log%20Analytics%20with%20Linux%20machines.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20975px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F32882iDA10D9029ACD5273%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%2262253631-5818-49b4-89d5-1276b9c82dc8.png%22%20title%3D%2262253631-5818-49b4-89d5-1276b9c82dc8.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERead%20more%20about%20it%20in%20the%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fhow-azure-security-center-helps-detect-attacks-against-your-linux-machines%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20blog%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-186495%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESecurity%20Center%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Community Manager

Azure Security Center (ASC) is now extending its Linux threat detection preview program, both on cloud and on-premise. New capabilities include detection of suspicious processes, suspect login attempts, and anomalous kernel module loads. Security Center is using auditd for collecting machines’ events, which is one of the most common frameworks for auditing on Linux. Auditd has the advantage of having been around for a long time and living in the mainline kernel. Any Linux machine that runs auditd by default and is covered by Security Center will benefit from this public preview. For a little more detail on how the collection works, check out our private preview announcement from October.

 

In addition to building up Linux-specific detections, we have also reviewed applicability of our current detections originally developed for Windows. Attackers also like to be OS-agnostic, especially for large-scale attacks, and will reuse tools and techniques where they can. In such circumstances the same detection is also applicable across operating systems. Happily, several of our analytics worked with minimal tuning. Today, I’ll walk you through an analytic example in the form of malicious crypto coin mining and then give some tips on using Azure Log Analytics with Linux machines.

 

62253631-5818-49b4-89d5-1276b9c82dc8.png

 

Read more about it in the Azure blog.