Time
8 hours 33 minutes
Difficulty
Intermediate
CEU/CPE
9

Video Transcription

00:00
Hello, Siberians. Welcome to this demonstration on virtual machine security.
00:05
This demonstration is part of the fifth month do off. The is that 500 Microsoft Azure security technologist costs
00:13
some quick information on the activities that will be completing in this demonstration.
00:17
We'll start by an Ablin Endpoint Protection for Windows. Virtual Machine
00:22
after that will configure it just in time. VM access in as your security center
00:27
and finally will configure object management for a Windows virtual machine in Hajer. Let's get into this.
00:35
So in the first task of this demonstration, how be enabling endpoint protection Financial virtual machine
00:41
on every side. Official representation off what I'll be Dean.
00:45
I have a Windows 7 20 nights in VM, deployed in Azure
00:49
on Windows 7 2019 already comes with Windows Defender installed, so there's really nothing for me to install.
00:56
However, I'll use the anti malware extension to configure the settings off the Windows Defender that's installed
01:03
if it were to be a Windows server. 2000 and eight out Teoh, a Windows Server 2000 and 12 or 2000 and 12 out of the M. The extension will actually installed buying Avi's for the Microsoft and tomorrow we're solution on the seven.
01:19
So here I am in the agile Pato. If I go, I'd and click on virtual machines.
01:23
You can send my Windows Twin tonight and Veteran Machine Hey,
01:27
my guidance and likes it
01:30
on. If I scroll down, I click on extensions.
01:33
Now if I click on the option to add extension.
01:37
And one of the extension options that we have is the Microsoft and tomorrow, where extension?
01:42
If I cried and select that option
01:45
on if I quiet and click on create
01:48
Now, whenever I configured these as a mentioned earlier, it's not actually going to install anything on my 2000 and 19 sever. It's only going to juice whatever configuration I specify here to configure Windows defender.
02:00
So, for example, if I want this gun type to be full, I can specify that to be full, and I can specify this candidate I want. And once I've configured these, I can quiet and click OK to that.
02:12
That's only gonna take a few seconds to complete.
02:16
And now that that is complete educ and see that the provisioning in our succeeded So now I've configured onto my wear for my Windows 2019 vm
02:25
So in the next task off this demonstration are configured just in time. VM access Financial Virtual Machine
02:32
Yes, official representation of what I'll be doing
02:35
have working with the same Windows Server 2000 and 19 VM that I worked with Alia
02:40
on. The first thing that I would do is to enable just in time vm access for the VM.
02:46
When I do, these Securities Center will hard in Network Security Group grew to block the out dp parts to this VM on After I've done these out. Their requests in Security Center for temporary access to the Veteran Machine
03:04
on Security Center will open the RGB part on my seven for me to be able to connect to the server using Rdp. So let's go to do this.
03:14
So I'm back in the other Pato. If I glided and click on networking,
03:17
you see that this veteran mission, currently as no inbound access from the Internet
03:23
to enable just in time vm access, I need to ensure that I have security center standards here. So let's go verify that I have that If I click on the left on top here on If I select security center
03:37
on insecure the center. If I go, I'd and click on coverage.
03:42
And if I go, I'd and click on the option to edit plan. Here.
03:46
You can see that I'm currently understand. That's yes. Oh, that looks good.
03:51
So if I go back to my veteran machine
03:54
and I said, Let's my Windows virtual machine
03:57
to enable just in time vm access I can do that on the configuration,
04:01
and I have the option to enable just in time. So if I go ahead and click on that option,
04:06
that's it. It's done. It's enabled just in time access.
04:11
Now two very five whites done. If I scroll up and I click on networking,
04:15
I can see that security centers added a route to block out deep each. If I click on that, you can see that that's denying.
04:23
Now, if I want to get access to this VM Tim, probably using our DP, I can go to configurations to you. Why can go directly to security center? Also, any of those options will walk,
04:34
but from wouldn't configuration, I can click on the option to open as your security center.
04:40
And when I do that I can see all the virtual machines that have just in time vm access enabled
04:46
so I can go ahead and select my veteran machine and I have the option to request access. If I go ahead and click on Request Access,
04:54
I can Quiet and Togo. That's to be hard for our dp
04:57
On what I p address dr Want eats to allow.
05:00
I wanted to allow just my high p address. So if I go ahead and leave that on what's time? Vinge? I want to have our DP open for I can Griet instead starts to just one how
05:11
I can give a justification,
05:14
needs to do some work
05:17
and I click on open parts
05:19
and that's it. So it's initiated. A request on what security sent I would do is it's going to configure the access for me. So that just took a few seconds and you can see that the request is automatically approved on. I have access.
05:33
So if I go back to my veteran machine
05:38
on if I select it, if I go on the network in
05:42
you see that there is now a Buddha, allows my high P address to be ableto access this VM using rdp so security center automatically configure it that on after an are that you will automatically be removed.
05:55
If I want to verify that I can quiet and copy the public i p for this virtual machine, I can bring up the rdp clients.
06:02
Andi I can click on connects
06:04
and you can see that I'm been prompted to put in my user name and my password so I'll go ahead and can sue that.
06:11
So in the final task off this demonstration, our configure opted management fund as your virtual machine. And here is a visual representation off. What are between
06:20
the first Ronaldo is to create a log analytics workspace
06:25
how they create on automation account. So this hacker component off the object management solution as we discussed in the last lesson
06:33
how then enable updates management for my veteran machine on objects. Staters will be reported. I can only use the object management feature off the automation account to shadow update installation.
06:46
So here I am, back in the azure Pato. The 1st 1 I'll do is to create a log analytics workspace. So I grabbed it and click on that
06:54
click on. Create a recess
06:56
and type log ANALITICO swap space. Our guidance selects that great and click on Create Now for the results Group out. Put it in the computer science group
07:05
for the name our Call that update management workspace,
07:10
and it's already in use. I just put a one after that
07:14
on I lived the regionals. Duke yourself are just quiet and click on review, Plus creates and I'll click on Creates.
07:20
So that's good. My work spaces create that successfully,
07:25
so I'll go ride and create an automation account by great and creative is us on a typing automation,
07:31
and I'll click on automation here
07:33
and I great and creates that.
07:36
I'll give you the name off off this management automation,
07:40
and I put it in the computer. Subscript I live every other setting as the default on our guiding click on Create, and now the azure automation account is successfully created.
07:50
So the next one that I would do is to enable off the management for my virtual machine. To do that, I'll go onto my virtual machine
07:59
on If I scroll down. There's an option called Object Management. Yes, If I go, I'd and click on that option.
08:05
I have the option to specify the workspace two years, so great, and leave that as my workspace. And I can also specify the automation account two years and I'll go ahead and select the automation accounts like Created Alia.
08:16
After that, I'll click on a never and after all of this is done,
08:22
I will have object management and neighborhood for my virtual machine. The olefin left will be to shadow the installation off missing updates from azure automation.
08:31
So that's it. Ladies and gentlemen, it's that simple. Here's a summary of the activities that were completed in this demonstration.
08:37
In the first activity, I enabled endpoint protection.
08:41
Then I configured just in time veteran Mission access.
08:45
And after that I configured update management Financial Virtual machine.
08:50
Thanks very much for watching, and I'll see you in the next lesson.

Up Next

AZ-500: Microsoft Azure Security Technologies

In the AZ-500 Microsoft Azure Security Technologies training, students will learn the skills that are needed to pass the AZ-500 certification exam. All exam topics are covered as well as exam preparation strategies and hands-on practice.

Instructed By

Instructor Profile Image
David Okeyode
Cloud Security Architect
Instructor