Get hands-on with Operations Management Suite Security and Compliance
Objective
After completing this lab, you will have:- Deployed a sample infrastructure environment using a Marketplace Template
- Deployed a sample SQL Database
- Explored Azure Security Center
- Enabled Endpoint Protection on Virtual Machines
- Enabled Auditing and Threat detection on the SQL Database Server
- Enabled Transparent Data Encryption (TDE)
Scenario
In this lab, you will use Azure Security Center to identify recommendations and configure additional security measures against resources configured in your Azure Subscription.
Time estimate: 60-75 minutes
Time estimate: 60-75 minutes
Virtual Machines
- Windows 10
Exercise 1 : Set up your Azure Account
In this exercise you will:
- Set up your Azure Account
Scenario: To perform this lab, you must have an Azure account set up that you can modify. To set up up this account, use the promotional code visible in the Content tab of the lab interface. This exercise will walk you through the steps for redeeming the code.
Note: If you already have an Azure subscription (MSDN/Internal) that you can use for this hands-on lab, you can skip this exercise.
- Obtain Microsoft AccountYou will need a Microsoft account (@outlook.com or @live.com, etc). This account must NOT have an Azure subscription associated with it. If you do not have an appropriate Microsoft account, please acquire one before continuing this lab. You can obtain an account from the following site: http://www.microsoft.com/en-us/account.
- Open Site (Azure Pass)Open the Edge or IE browser, and navigate to http://microsoftazurepass.com.
- Submit Promo CodeChoose from the country drop-down “United States”. Enter the promotional code (given to you in the lab Content tab) in the Promo Code field. Click on the Submit button.
- Complete Account RequestClick on the Sign in button to enter your MSA account (@outlook.com/@live.com etc.) Follow any additional instructions to complete the process.
Congratulations!
You have successfully:
You have successfully:
- Set up your Azure Account
Click Continue to advance to the next exercise.
Exercise 2 : Deploy a Sample Infrastructure Environment Using a Marketplace Template
In this exercise you will:
- Deploy a sample infrastructure environment using a Marketplace template
Scenario: In this exercise, you will deploy a lab environment based on an already existing Azure Marketplace template for SharePoint 2013 non-HA farm. You will also deploy an additional Windows Server 2012 R2 Virtual Machine via the portal.
You can now easily deploy a two or three-tier SharePoint Server 2013 farm in Azure. This is designed to help you quickly create an Internet-facing SharePoint farm for dev/test, demonstration, or proof-of-concept purposes. The SharePoint 2013 non-HA Farm template deploys a SharePoint Server 2013 two-tier farm topology including Active Directory Domain Services and Microsoft SQL Server with three servers and 10 cores (using default virtual machine sizes). The completed deployment consists of a Windows Server 2012 R2 domain controller, a SQL Server 2014 server, and a SharePoint 2013 server.
Each farm is configured with just a single web application and site collection. The SharePoint service application deployment is left to you to configure.
This will give us the required Virtual Machines and applications we will use throughout this lab.
- Open Azure PortalOpen a Web Browser and browse to the Azure Portal, https://portal.azure.com.
- AuthenticateAuthenticate with the account for the Azure Subscripton that you configured in Exercise 1.
- Create SharePoint FarmClick + New, and type Sharepoint 2013 in the Marketplace search field. From the list of results, select Sharepoint 2013 non-HA Farm.
- Select TemplateSelect it from the filtered list of Azure templates on the Everything blade.
- Launch Deployment TemplateSelect the Create button. This launches the Sharepoint 2013 deployment template.
- Configure Basic InformationFor the Basics information, enter the information as shown in the Alert window and screenshot. Then click the OK button to continue to Infrastructure settings.SharePoint farm name: omsdemosp
Subscrption: Select your subscription
Resource group: Create new – OMSDemoRG
Location: Location Closest to you - Configure Infrastructure SettingsIn the Infrastructure settings blade, enter the informationas shown in teh Alert window and screenshot. Click OK to continue to the next step.Username: demouser
Password: demo@pass123
Confirm password: demo@pass123
Storage account name prefix: omsdemosp[+#]; if necessary,add a number to make it unique
Storage account type: Premium-LRS (default)
Virtual Network name: spfarmvnet (default) - Configure Active Directory SettingIn the Active Directory settings blade, enter the information shown in the Alerrt window and the screenshot. Click the OK button to continue to the SQL Server settings.Forest root domain name: omsdemosp.com
Virtual machine size: 1x Standard DS2 (default) - Configre SQL Server SettingsIn the SQL Server settings blade, enter the information as shown in the Alert window and screenshot. Click the OK button to go to the next step.Virtual machine size: 1x Standard DS3 (default)
Service account password: demo@pass123
Confirm password: demo@pass123 - Configure SharePoint Server SettingsIn the SharePoint Server settings blade, enter the information as shown in the Alert window and screenshot. Click the OK button to continue to the validation and the Summary blade.Public IP address: (new) ip01 (default)
DNS label: omsdemo0101 (must be unique) – look for green checkmark
Virtual machine size: 1x Standard DS3 (default)
Setup user account password: demo@pass123
Confirm password: demo@pass123
Server farm account password: demo@pass123
Confirm password: demo@pass123
Server farm passphrase: demo@pass123
Confirm passphrase: demo@pass123
Content site template: Team Site (default)
NOTE: For ease of deployment and our lab environment, we are choosing the same password for all the entries. Were this an actual production environemnt, follow password best practices and utilize different secure password entries for the password options. - Confirm ValidationOn the Summary blade, make sure the validation passes, then click the OK button to continue.
- PurchaseIn the Buy blade, confirm the deployment by clicking the Purchase button.
- View Deployment ProgressYour deployment will start, and depending on your selection, a tile is will be pinned to the Azure portal dashboard, showing you the progress of the deployment. Select this tile to get a more detailed view of the deployment process.NOTE: This deployment should take about 30-45 minutes to complete. You can continue with exercise 3 in the meantime. Wait for the confirmation on screen the deployment is successfully completed before moving onto Exercise 4.
Congratulations!
You have successfully:
You have successfully:
- Deployed a sample infrastructure environment using a Marketplace template
Click Continue to advance to the next exercise.
Exercise 3 : Deploy a Sample SQL Database
In this exercise you will:
- Deploy a sample SQL database
Scenario: In this exercise you will provision a new SQL Database and Server that will be used in a later exercise with Azure Security Center.
- Create New SQL DatabaseClick New -> Databases -> SQL Database.
- Configure Database
- Specify SQLDBLAB for the Database name.
- Specify SQLDBLABRG for the new resource group name.
- Change the Pricing tier to S0 Standard
- Click the Server tile.
- Create ServerClick Create a new server.
- Specify SQL PropertiesSpecify the properties as shown in the Alert window and screenshot. Click Select and then click Create to provision the SQL Database.
- Specify a unique server name
- Ensure the green checkmark appears to tell you that the name is unique.
- Specify a user name such as demouser
- Specify a complex password
- Confirm the password
- An Azure region near you
Congratulations!
You have successfully:
You have successfully:
- Deployed a sample SQL database
Click Continue to advance to the next exercise.
Exercise 4 : Explore Azure Security Center
In this exercise you will:
- Explore Azure Security Center
Scenario: In this exercise you will enable Azure Security Center and learn more about its capabilities for monitoring and recommendations.
- Open Azure Security CenterOpen Azure Security Center by clicking the More Services link in the Azure portal.Before continuing, ensure that the deployment from Exercise 2 has completed.
- Select Security CenterClick Security Center.
- Open QuickstartOnce Security Center opens click the Quickstart link on the left.
- Review Quickstart PanelReview the Quick Start panel to learn more about getting started with Azure Security Center.
- View Security PolicyView the default Security policy by clicking the Security policy tile.
- View Subscription Level InformationClick the name of the subscription to view what information is being collected at the subscription level.
- View Prevention PolicyThe Azure Security Center policy can be changed by clicking the Prevention policy tile. Click the Prevention policy tile to view the types of recommendations security center will provide recommendations for. Ensure that Data Collection is set to On.
- View Email NotificationsSecurity Center can also provide email alerts when a threat or anomalous behavior is detected. You can configure the email by clicking the Email notifications tile.
- View Pricing Tier InformationClick the Pricing tier tile to view the available options.
- Learn MoreClick the Learn more link to view the additional features the Standard pricing tier provides. Select the Standard – Free Trial and click Select.
- Save SettingsClick Save and close the blade.
- View Resource GroupsClick the arrow by the subscription to see the individual resource groups. Each resource group by default will inherit the policy settings from the subscription but can also be customized individually.
- View PREVENTION and DETECTION TilesNote that the PREVENTION and DETECTION tiles allow quick access to recommendations from Security Center as well as Security alerts that Security Center has detected.
Congratulations!
You have successfully:
You have successfully:
- Explored Azure Security Center
Click Continue to advance to the next exercise.
Exercise 5 : Enable Endpoint Protection on Virtual Machines
In this exercise you will:
- Enable Endpoint Protection on virtual machines
Scenario: In this exercise you will configure endpoint protection on the previously deployed virtual machines to protect them from malware.
- View OverviewClick the Overview link under the GENERAL section.
- View RecommendationsClick the Recommendations tile.
- Install Endpoint ProtectionNote that there are several recommendations from Azure Security Center. To resolve the first one, click Install Endpoint Protection.If you do not see the recommendation, wait awhile and try again.
- Install on 3 VMsClick the button Install on 3 VMs at the top to install Endpoint Protection on the virtual machines.
- Install Microsoft AntimalwareClick Microsoft Antimalware to install on the virtual machines. Note that you can also choose to install Deep Security Agent by TrendMicro.
- Complete InstallationsClick Create and then click OK. Close the Install Endpoint Protection blade.
Congratulations!
You have successfully:
You have successfully:
- Enabled Endpoint Protection on virtual machines
Click Continue to advance to the next exercise.
Exercise 6 : Enable Auditing and Threat Detection on the SQL Database Server
In this exercise you will:
- Enable Auditing and Threat detection on the SQL Database Server
Scenario: In this exercise you will configure auditing on your SQL Database server to ensure actions against the SQL Database or threats detected are logged into Azure storage for later analysis. Note that enabling Auditing on the SQL Database Server will apply it to the SQL Database as well.
- Enable Auditing on SQL ServersClick Enable Auditing on SQL Servers.
- Select SQL Database ServerClick the SQL Database Server name.
- Configure Auditing on the SQL Database ServerConfigure Auditing on the SQL Database Server, as shown in the screenshot: Enable Auditing, Enable Threat detection. Click Storage Details to configure a storage account to log audit data to.
- Create Storage AccountClick the Create new link, and specify a unique name for the storage account (use all lower case letters). Ensure the green checkmark appears to show the name is valid. Click OK to configure.
- Configure Retention PeriodChange the retention period to 180 days, and click OK to complete the configuration.
- Save SettingsClick Save to save the new settings.
Congratulations!
You have successfully:
You have successfully:
- Enabled Auditing and Threat detection on the SQL Database Server
Click Continue to advance to the next exercise.
Exercise 7 : Enable Transparent Data Encryption (TDE)
In this exercise you will:
- Enable Transparent Data Encryption (TDE)
Scenario: In this exercise you will configure Transparent Data Encryption (TDE) on the SQL Database. TDE adds encryption to the database without changing connectivity settings on the application(s) using the database.
- Filter RecommendationsTo make it simpler to identify open issues, click the Filter link at the top of the page.
- Filter Open IssuesUncheck the Resolved status so that only open issues show in the view.
- Enable Transparent Data EncryptionClick the Enable Transparent Data Encryption link.
- Select SQL DatabaseClick the name of the SQL Database.
- Finalize ConfigurationRead the capabilities of Transparent data encryption and then click the ON button to enable the feature. Click Save to finalize the configuration.
- Clean Up Azure AccountIf you intent to use yor trial Azure account for other labs or testing, t is advisable to delete the Azure resources created during this lab.
Congratulations!
You have successfully:
You have successfully:
- Enabled Transparent Data Encryption (TDE)
Click Continue to close and finalize this lab.
No comments:
Post a Comment