CTERA for Microsoft Sentinel

Microsoft Sentinel is a cloud-based security information and event management (SIEM) platform that helps strengthen cyber-threat management and response systems. Microsoft Sentinel provides:

  • Centralized and comprehensive visibility of all data across the entire IT infrastructure.
  • AI-powered and automated threat detection that identifies, monitors, responds to and mitigates security risks in near-real time.

Using orchestration, automation, and response (SOAR) capabilities, Microsoft Sentinel together with CTERA provides near-real-time threat intelligence and security analytics based on the data it collects and analyzes from across users, devices, applications and infrastructure. Microsoft Sentinel also automatically detects and responds to security threats and breaches.

Note

You need CTERA Edge Filer 7.8.x or higher and CTERA Portal 8.2.x, and a Syslog server with both Azure Arc and Azure Monitoring Agent installed to be able to use Microsoft Sentinel.

How CTERA and Microsoft Sentinel work together

The integration between the CTERA Portal and Microsoft Sentinel is based on the logs it receives directly from the CTERA Portal via a Syslog server. The following enable security monitoring using CTERA Sentinel:

CTERA Edge Filer SMB Audit Logs and CTERA Portal Logs

SMB audit logs are sent from different edge filers to the portal by the portal's Edge Filer Syslog service. From there, they are forwarded along with portal logs via a Syslog server to CTERA Sentinel installed in Microsoft Sentinel. Using CTERA Sentinel, these logs can be used for analysis and comprehensive security monitoring.
image.png
CTERA uses the Edge Filer Syslog service to gather all edge filer audit logs. For details see Managing the Edge Filer Syslog Service.
For details about how to connect the CTERA portal to a Syslog server, see
Setting Up Access to a Syslog Server.

Microsoft Sentinel Workbooks

Workbooks act as customizable dashboards to visualize, analyze and monitor your data. These workbooks allow you to add tables and charts with analytics for your logs and queries to make it easier to monitor key metrics and trends.
image.png
The CTERA Workbook displays relevant graphs and metrics for the CTERA workspace, including graphs of SMB audit logs. For example, the following CTERA Audit Logs Ingestion screen shows denied operations and deletion counts.
image.png
Graphs can also display details like denied operations per user and deleted operations per user.

Microsoft Sentinel Analytics

Analytics are predefined rules that constantly scan for patterns or anomalies in the data across your resources to automatically detect potential issues. When an analytics rule identifies potential security threats or suspicious events, it generates an alert containing details about the detected events. These may include the entities involved, such as users, devices, and addresses. These alerts are then aggregated and correlated into incidents, which can be investigated to determine the full scope of the detected threat in order to take appropriate action.

Analytics rules are scheduled to run every five minutes.

The following Analytics screen shows two active analytics rules that are designed for ransomware protection. These rules help detect and respond to potential ransomware activity.
image.png
The following table shows the collected metrics and alert creation for the CTERA Sentinel analytics rules:

Alert Name Monitored Events More Information Threshold Technique/What is Done Link
Ransomware Detection Portal log for detected ransomware attack Monitors CTERA Ransom Protect for ransomware attacks One ransomware event 1486/Checks ability to encrypt data for negative impact https://attack.mitre.org/techniques/T1486/
Ransomware user blocked Portal log for blocked user by ransom protect Detects when CTERA Ransom Protect has blocked a user One blocked malicious user 1486/Checks ability to encrypt data for negative impact https://attack.mitre.org/techniques/T1486/
CTERA Mass Access Denied Detection OpenDenied, createDenied, setsd, AclDenied, chown, deleteDenied Detects access denied events Generates an incident for 1000 access denied events within 5 minutes 1562/Checks ability to impair defense mechanisms https://attack.mitre.org/techniques/T1562/
CTERA Mass Deletions Detection delete Detects file deletions Generates an incident for 5000 deletions within 5 minutes 1485/Checks malware designed to destroy data https://attack.mitre.org/techniques/T1485/
CTERA Mass Permission Changes Detection ACLAdded, ACLDeleted, ACLProtectionAdded, ACLProtectionDelete, ACEChanged, setdacl Detects permission changes Generates an incident for 5000 permission denied events within 5 minutes 1068/Checks ability to elevate privileges https://attack.mitre.org/techniques/T1068/
Antivirus Detected an Infected File Portal log for infected files Detects infected files Generates an incident for each infected file event generated by edge filers 1203/Checks for vulnerabilities in client applications https://attack.mitre.org/techniques/T1203/

Microsoft Sentinel Hunting

Hunting is a tool that allows you to actively search for unusual behaviors or threats across your environment by running specific queries. These hunting queries are designed to catch suspicious activity before they becomes a bigger threat.

Hunting offers an extra layer of defense, giving you more control and insight into your data. The following queries are included by default in CTERA Sentinel:

CTERA Access Denied Detection – Tracks when a lot of access attempts are being blocked.
CTERA Batch Permission Changes Detection – Monitors for any unusual modifications to file and folder permissions.
CTERA Batch Deletions Detection – Scans for large-scale file deletions that could signal a problem.

The following table shows the collected metrics and thresholds for the hunting queries in CTERA Sentinel.

Name Monitored Events More Information Threshold Technique/What is Done Link
CTERA Access Denied Detection OpenDenied, createDenied, setsd, AclDenied, chown, deleteDenied Detects access denied events More than 10 access denied events in two minutes 1562/Checks ability to impair defense mechanisms https://attack.mitre.org/techniques/T1562/
CTERA Batch Permission Changes Detection ACLAdded, ACLDeleted, ACLProtectionAdded, ACLProtectionDelete, ACEChanged, setdacl Detects permission changes 100 permission changes in two minutes 1068/Checks ability to elevate privileges https://attack.mitre.org/techniques/T1068/
CTERA Batch Deletions Detection delete Detects file deletions 100 file deletions in two minutes 1485/Checks malware designed to destroy data https://attack.mitre.org/techniques/T1485/

Viewing Incidents

Microsoft Sentinel’s dashboard provides an overview of incidents flagged for review. They are categorized by severity, creation time, and whether they are new, active or closed. The dashboard also includes other data insights, analyses, and outcomes about threat management, content management and configuration.
image.png
From the dashboard, you can navigate to the Incidents screen, for a more detailed view.
image.png
In the above example, one incident involves Mass Deletions while another one is for Ransomware Protection and a third confirms a Ransomware Attack.

Benefits of CTERA’s Integration with Microsoft Sentinel

CTERA’s integration with Microsoft Sentinel helps your threat management and response systems. Benefits include:

  • A heightened level of visibility of data and threat intelligence. IT and security teams can include CTERA ransomware protection within their comprehensive enterprise-wide security monitoring.
  • Near-real-time monitoring that enables rapid detection of and automated action against ransomware and other cyber threats.
  • Automated and expedited incident response times to threats or breaches alleviate the workload on IT and security teams, enhancing their efficiency by enabling immediate action before further network infrastructures are affected.
  • Ongoing cybersecurity defenses at scale, from local networks to remote, global offices. If a threat or breach occurs, instant alerts notify teams, wherever the location.