SlideShare a Scribd company logo
A DEMONSTRATION
OF OMS AND
AZURE SECURITY
CENTER
© 2023 StoneFly, Inc. | All rights reserved.
Security in the Cloud OMS Demonstration
How many of you have a centralized pane of glass that tell you, you have
malicious traffic attacks, you have identity and access information that is
there? You have computers with security updates that are missing?. Do you
have all of this in a centralized pane of glass? Or do you have different tools
that you use to find out what’s what? Those are the benefits that you have
with Microsoft’s Operations Management Suite (OMS). We are going
to jump right into a demo, and we are going to go right into Microsoft’s OMS
(Operations Management Suit).
Operations Management Suite (OMS)
Inside of here you have different assessments and analysis that are running
for your organization. Now, because you are using this primarily for cloud
services, you can see that you have preventions and things like that, that are
here to assess your environment. But you also see that you have had a brute
force attack.
Page 1
Security in the Cloud OMS Demonstration
So, you can see that we have a brute force attack, and we also have double
extension files being executed and things like that. So, you have your systems
being attacked at your organization. Now, if we look at the process of how to
diagnose, assess, and things like that, this system, or this platform, is already
starting to diagnose intelligently in the background across all these different
assessments that you see here. So, you have your malware assessment that is
running, you have an update assessment that is running, you have network
security and distinct IP address assessment that is running. You also have
a threat intelligence assessment that is running. This is where it is going to
start to say, here are the malicious IPs in your organization, here is where
they are coming from, here is where you are, and here is where somebody
else is actually controlling your server and that is where we see the malicious
IP coming from. We will walk through this a little bit more in depth.
What To Do Once You Are Breached?
Now that you have been breached, you see that there is a brute force at-
tack or you see that there is a double extension on file. You have to click
into the attack link to find out what is going on, and what server has been
compromised and where things are happening. So, you can clearly see that
you have a domain controller that has been compromised. What happens
when a domain controller is compromised? Or is starting to have brute force
attacks on it? They take control of your entire environment. Right now it is
a warning, but before it becomes compromised, let us go ahead and fix this.
Page 2
Security in the Cloud OMS Demonstration
How Can You Fix It?
What you are going to do here is look at your query and your search results
where it tells you the type of alert and the severity. You want to go ahead
and setup an alert for your entire security team or for your IT team or for
your help desk team. This allows them to know what is happening to your
organization so that they can start to remediate it.
So, you have to click up at the “Alert” tap and you are going to add a
Page 3
Security in the Cloud OMS Demonstration
roll. Then you are going to say, ”We have a brute force attack in play” in
the Name box. Insert in the severity of the attack, then the description and
the time window (How often do I want this to run?). So for example you
want this to run every five minutes, or every two minutes, or wherever you
want that to be. You want the threshold to be greater than zero. So, even if
it happens once where you are being brute forced attacked and it is starting
to hit the system significantly, it lets you know. You also want to setup
an email notification, and this is where you would put your distribution list
of your help desk, of your security team, of your server team, etc. under
”Recipients”. Next you would put in a Webhook and a Webhook can be
used for things like Slack or ServiceNow if you have a help desk. Webhook
will translate and open up an incident, or open up a security incident within
your ITSM solution. What that means is any time you have this as a security
incident, it is recorded and if there is a change that is executed against it that
goes through your change management and service request process. So, you
actually have something that goes and tracks this as a postmortem closed
process as well. Once you have that, then you can also execute a Runbook
behind it. Now this Runbook would give you the automation to go ahead
and fix the issue. Now you have the ability to execute this in Azure only or to
execute this on-premise as well with your hybrid worker. In this demo we are
going to execute this across environments with a hybrid worker. Now in your
”Service Desk Actions”, what this is going to do is give you a connection to
your ServiceNow or your ITSM based solution that will automatically open
up an incident for you.
Page 4
Security in the Cloud OMS Demonstration
So you choose a ”Work Item” and you will choose a security incident.
And as you choose a security incident, you will say hey, how did you find out
about this in the ”Contact Type”. You will select ”the impact, the risk, the
severity, the priority and the category”. This is exactly what has happened,
is that confidential personal data loss, or was it a policy violation, was it a
rogue server or service, things like that. That is when you would go ahead
and save this. Once you save it, it now will tell you any time that there is
a brute force attack that is happening from that environment, you will get a
notification on it.
Now, the other thing that you also have is the ability to go ahead and
look at ”threat intelligence”. So as you are detecting, and as you are going
through your organization, you want to know where malicious traffic events
are. So you are looking at malicious traffic events, and you can see that there
are five botnets that are sitting within your organization, that are coming
from China.
Let’s See How This is Happening
You can see the computer. So, your SharePoint web front end has been
compromised. You can see your local IP, the malicious IP that is controlling
it and then the member of the botnet. You have the ability to set up a rule
on this as well, and then export that to see where things are coming from.
The idea is for you to be able to take different sources of information from
your Security and Audit.
Page 5
Security in the Cloud OMS Demonstration
Page 6
Security in the Cloud OMS Demonstration
Page 7
Security in the Cloud OMS Demonstration
Generally, most environments have separate disparate systems that don’t
have log analytics across the board. This is what gives you that capability
to centralize a lot of those things that you are having multiple people look
at, multiple very smart people look at, from different sources of technology.
It is actually combining that for you so that you have a single common pane
of glass. So that’s the idea.
Azure Security Center
In Azure Security Center, you have the ability to turn on security monitoring
for every single one of your virtual machines, your storage accounts, your
databases, whatever you have. And that will start to tell you, hey, your disk
is not encrypted, so go ahead and take this remediation action. The other
thing that you have in Azure Security Center is you also have the ability to
use third party technologies that are integrated for more protection or for
a remediation of a solution that you have. Those are the things that you
have with Operations Management Suite and Azure Security Center
combined.
Page 8
www.stonefly.com
2865, 2869 and 2879 Grove Way,
Castro Valley, CA 94546 USA.
+1 (510) 265-1616

More Related Content

PPTX
Azure Operation Management Suite - security and compliance
PPTX
Cloudbrew 2019 - Azure Security
PPTX
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
PPTX
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
PDF
Monitoreo en Azure con Operations Management Suite
PPTX
Rencore Webinar: Securing Office 365 and Microsoft Azure like a Rockstar
PDF
ScotSecure Cyber Security Summit 2025 Edinburgh
PDF
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Azure Operation Management Suite - security and compliance
Cloudbrew 2019 - Azure Security
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
Monitoreo en Azure con Operations Management Suite
Rencore Webinar: Securing Office 365 and Microsoft Azure like a Rockstar
ScotSecure Cyber Security Summit 2025 Edinburgh
"Evolving Cybersecurity Strategies" - Threat protection and incident managment

Similar to Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azure Security Center (20)

PDF
Azure Security Center
PPTX
Power of the cloud - Introduction to azure security
PPTX
Azure Operations Manager Suite
PDF
Azure 101: Shared responsibility in the Azure Cloud
PPTX
Power of the Cloud - Introduction to Microsoft Azure Security
PDF
Global Azure Bootcamp 2018 - Azure Security Center
PDF
Learn how to protect against and recover from data breaches in Office 365
PDF
Microsoft operations management_suite_resources
PDF
Azure Security Overview
PPTX
Get ahead of cybersecurity with MS Enterprise Mobility + Security
PPTX
Microsoft Security Advice ISSA Slides.pptx
PDF
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
PDF
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PDF
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
PPTX
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
PDF
Tour to Azure Security Center
PDF
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
PPTX
Effective Management of Azure through Operations Management Suite (OMS) Webinar
PDF
Microsoft Azure Security Overview
PDF
Secure remote work
Azure Security Center
Power of the cloud - Introduction to azure security
Azure Operations Manager Suite
Azure 101: Shared responsibility in the Azure Cloud
Power of the Cloud - Introduction to Microsoft Azure Security
Global Azure Bootcamp 2018 - Azure Security Center
Learn how to protect against and recover from data breaches in Office 365
Microsoft operations management_suite_resources
Azure Security Overview
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Microsoft Security Advice ISSA Slides.pptx
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Tour to Azure Security Center
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Effective Management of Azure through Operations Management Suite (OMS) Webinar
Microsoft Azure Security Overview
Secure remote work
Ad

More from MaryJWilliams2 (20)

PDF
Veeam Replication in Azure Cloud: Ensuring Business Continuity and Data Prote...
PDF
Eyes Everywhere: The Power of Body-Worn and Dashboard Cameras
PDF
Guarding Against Ransomware: Strategies for Robust Data Protection
PDF
Data Protection and Disaster Recovery Solutions: Ensuring Business Continuity
PDF
Exploring Change Block Tracking (CBT): A Game Changer for IT Professionals
PDF
Securing Your Future: Cloud-Based Data Protection Solutions
PDF
Securing the Future: A Guide to Cloud-Based Data Protection
PDF
Exploring Veeam Backup & Replication for Seamless Business Continuity
PDF
Integrating OMS and Azure Security Center for Enhanced Cloud Security
PDF
Erasure Coding: Revolutionizing Data Durability and Storage Efficiency
PDF
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
PDF
Unlocking Efficiency: Exploring Change Block Tracking in Data Management
PDF
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
PDF
Streamlining Backup: Enhancing Data Protection with Backup Appliances
PDF
Navigating the Cloud: Empowering Enterprises with Cloud Solutions
PDF
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
PDF
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
PDF
Exploring Software-Defined Storage in Digital Transformation
PDF
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
PDF
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
Veeam Replication in Azure Cloud: Ensuring Business Continuity and Data Prote...
Eyes Everywhere: The Power of Body-Worn and Dashboard Cameras
Guarding Against Ransomware: Strategies for Robust Data Protection
Data Protection and Disaster Recovery Solutions: Ensuring Business Continuity
Exploring Change Block Tracking (CBT): A Game Changer for IT Professionals
Securing Your Future: Cloud-Based Data Protection Solutions
Securing the Future: A Guide to Cloud-Based Data Protection
Exploring Veeam Backup & Replication for Seamless Business Continuity
Integrating OMS and Azure Security Center for Enhanced Cloud Security
Erasure Coding: Revolutionizing Data Durability and Storage Efficiency
Efficient Backup and Archiving with StoneFly Smart Cloud Gateway in a Hybrid ...
Unlocking Efficiency: Exploring Change Block Tracking in Data Management
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Navigating the Cloud: Empowering Enterprises with Cloud Solutions
Safeguarding Business Continuity: Insights into Backup and Disaster Recovery ...
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...
Exploring Software-Defined Storage in Digital Transformation
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Unveiling the Evolution: Proprietary Hardware to Agile Software-Defined Solut...
Ad

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Cloud computing and distributed systems.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Machine learning based COVID-19 study performance prediction
PDF
Modernizing your data center with Dell and AMD
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Cloud computing and distributed systems.
Dropbox Q2 2025 Financial Results & Investor Presentation
Network Security Unit 5.pdf for BCA BBA.
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Monthly Chronicles - July 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Unlocking AI with Model Context Protocol (MCP)
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Machine learning based COVID-19 study performance prediction
Modernizing your data center with Dell and AMD
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Advanced methodologies resolving dimensionality complications for autism neur...

Maximizing Cloud Security and Efficiency: A Guide to Integrating OMS and Azure Security Center

  • 1. A DEMONSTRATION OF OMS AND AZURE SECURITY CENTER © 2023 StoneFly, Inc. | All rights reserved.
  • 2. Security in the Cloud OMS Demonstration How many of you have a centralized pane of glass that tell you, you have malicious traffic attacks, you have identity and access information that is there? You have computers with security updates that are missing?. Do you have all of this in a centralized pane of glass? Or do you have different tools that you use to find out what’s what? Those are the benefits that you have with Microsoft’s Operations Management Suite (OMS). We are going to jump right into a demo, and we are going to go right into Microsoft’s OMS (Operations Management Suit). Operations Management Suite (OMS) Inside of here you have different assessments and analysis that are running for your organization. Now, because you are using this primarily for cloud services, you can see that you have preventions and things like that, that are here to assess your environment. But you also see that you have had a brute force attack. Page 1
  • 3. Security in the Cloud OMS Demonstration So, you can see that we have a brute force attack, and we also have double extension files being executed and things like that. So, you have your systems being attacked at your organization. Now, if we look at the process of how to diagnose, assess, and things like that, this system, or this platform, is already starting to diagnose intelligently in the background across all these different assessments that you see here. So, you have your malware assessment that is running, you have an update assessment that is running, you have network security and distinct IP address assessment that is running. You also have a threat intelligence assessment that is running. This is where it is going to start to say, here are the malicious IPs in your organization, here is where they are coming from, here is where you are, and here is where somebody else is actually controlling your server and that is where we see the malicious IP coming from. We will walk through this a little bit more in depth. What To Do Once You Are Breached? Now that you have been breached, you see that there is a brute force at- tack or you see that there is a double extension on file. You have to click into the attack link to find out what is going on, and what server has been compromised and where things are happening. So, you can clearly see that you have a domain controller that has been compromised. What happens when a domain controller is compromised? Or is starting to have brute force attacks on it? They take control of your entire environment. Right now it is a warning, but before it becomes compromised, let us go ahead and fix this. Page 2
  • 4. Security in the Cloud OMS Demonstration How Can You Fix It? What you are going to do here is look at your query and your search results where it tells you the type of alert and the severity. You want to go ahead and setup an alert for your entire security team or for your IT team or for your help desk team. This allows them to know what is happening to your organization so that they can start to remediate it. So, you have to click up at the “Alert” tap and you are going to add a Page 3
  • 5. Security in the Cloud OMS Demonstration roll. Then you are going to say, ”We have a brute force attack in play” in the Name box. Insert in the severity of the attack, then the description and the time window (How often do I want this to run?). So for example you want this to run every five minutes, or every two minutes, or wherever you want that to be. You want the threshold to be greater than zero. So, even if it happens once where you are being brute forced attacked and it is starting to hit the system significantly, it lets you know. You also want to setup an email notification, and this is where you would put your distribution list of your help desk, of your security team, of your server team, etc. under ”Recipients”. Next you would put in a Webhook and a Webhook can be used for things like Slack or ServiceNow if you have a help desk. Webhook will translate and open up an incident, or open up a security incident within your ITSM solution. What that means is any time you have this as a security incident, it is recorded and if there is a change that is executed against it that goes through your change management and service request process. So, you actually have something that goes and tracks this as a postmortem closed process as well. Once you have that, then you can also execute a Runbook behind it. Now this Runbook would give you the automation to go ahead and fix the issue. Now you have the ability to execute this in Azure only or to execute this on-premise as well with your hybrid worker. In this demo we are going to execute this across environments with a hybrid worker. Now in your ”Service Desk Actions”, what this is going to do is give you a connection to your ServiceNow or your ITSM based solution that will automatically open up an incident for you. Page 4
  • 6. Security in the Cloud OMS Demonstration So you choose a ”Work Item” and you will choose a security incident. And as you choose a security incident, you will say hey, how did you find out about this in the ”Contact Type”. You will select ”the impact, the risk, the severity, the priority and the category”. This is exactly what has happened, is that confidential personal data loss, or was it a policy violation, was it a rogue server or service, things like that. That is when you would go ahead and save this. Once you save it, it now will tell you any time that there is a brute force attack that is happening from that environment, you will get a notification on it. Now, the other thing that you also have is the ability to go ahead and look at ”threat intelligence”. So as you are detecting, and as you are going through your organization, you want to know where malicious traffic events are. So you are looking at malicious traffic events, and you can see that there are five botnets that are sitting within your organization, that are coming from China. Let’s See How This is Happening You can see the computer. So, your SharePoint web front end has been compromised. You can see your local IP, the malicious IP that is controlling it and then the member of the botnet. You have the ability to set up a rule on this as well, and then export that to see where things are coming from. The idea is for you to be able to take different sources of information from your Security and Audit. Page 5
  • 7. Security in the Cloud OMS Demonstration Page 6
  • 8. Security in the Cloud OMS Demonstration Page 7
  • 9. Security in the Cloud OMS Demonstration Generally, most environments have separate disparate systems that don’t have log analytics across the board. This is what gives you that capability to centralize a lot of those things that you are having multiple people look at, multiple very smart people look at, from different sources of technology. It is actually combining that for you so that you have a single common pane of glass. So that’s the idea. Azure Security Center In Azure Security Center, you have the ability to turn on security monitoring for every single one of your virtual machines, your storage accounts, your databases, whatever you have. And that will start to tell you, hey, your disk is not encrypted, so go ahead and take this remediation action. The other thing that you have in Azure Security Center is you also have the ability to use third party technologies that are integrated for more protection or for a remediation of a solution that you have. Those are the things that you have with Operations Management Suite and Azure Security Center combined. Page 8
  • 10. www.stonefly.com 2865, 2869 and 2879 Grove Way, Castro Valley, CA 94546 USA. +1 (510) 265-1616