SlideShare a Scribd company logo
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. © 2017 WiAdvance Technology Co. All rights reserved.
Technology Co.
iThome
實戰Hybrid Cloud管理與安全技術
2017 Jun.
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
I’m Charles 龔萬軒
Consultant of WiAdvance
• 組織 $2.8M USD 大型國際標案
• 執行產品行銷包括大型演講、形象影片、電銷計
劃等,增加300%客戶成長率
• 微軟雲架構技術顧問
• 研發管理顧問ACP (敏捷), PMP(瀑布式)
Professional Experience
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
• OMS Lab Instructions (OneNote)
https://goo.gl/pHaQYX
3
Lecture Material
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
企業面臨的挑戰
Azure Introduction
OMS Introduction
Case Study
OMS監控環境實作
緯謙解決方案介紹
Agenda
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Pain Points of IT
5
Performance
Machine performance and
health monitor
Threat
Threat detection and
prevention through advanced
cloud security
Management
Cross-platform and hybrid
environment in reality
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Supporting Statistic Data
6
+40%
time spent on
confirm root
cause1
+41%
Unlicensed
application
installed2
+75%
IT cost spent
on M&A3
1. Turner, Mary Johnston. IDC. “Automated, Integrated IT Operations Improve Effi ciency and Deliver Cost Savings”. January 2010.
2. Business Software Alliance, IDC. “Sixth Annual Global Software Piracy Report”. May 2009.
3. O’Donnell, Glenn. Forrester. “IT Operations 2009: An Automation Odyssey”. July 2009.
4. Berger, Brian. Enterprise Networks & Servers. “Putting Trust Back Into Computing: How Enterprises Can Secure Systems and Data”.
August 2007.
5. Gartner. “The Cost of Downtime”. July 2014.
+75%
Corporate PCs
are infected4
+60s
Unplanned downtime
costs 5,600 USD/min5
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
資訊系統意外隨時都可能發生…
當機或效率不佳
預期效能
Web Server
Systems
Mainframe
Database
Network
Application
End-User
Service
05:00 06:00 07:00 08:00 09:00 10:00 11:00 12:00 13:00 14:00 15:00 16:00
99%
99%
99.999%
99.9%
99.99%
99.9%
% available
當所有獨立的意外發生的時候
?
誰測量真實的用戶體驗,
和管理的全程服務
及時遠端監視系統可以在意外發生時,通知 IT 人員或權責主管
,馬上進行障礙排除,恢復系統運作。
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
There are no cattle,
there is only the herd.
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.9
There are no cattle,
there is only the herd.
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
自動化
受控管的資源
彈性
以使用量為主
虛擬機器 網站 雲端服務 SQL資料庫 noSQL 資料庫 blob 儲存 連線 虛擬網路 流量管理員
...
...
...
...
...
...
There are no cattle, there is only the herd.
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
OMS INTRODUCTION
12
The world of traditional IT
is under pressure
Source: Drive Digital Business Using Insights From Gartner Symposium’s Analyst Keynote
21 November 2014 G00270846
Analyst(s): David A. Willis I Peter Sondergaard I Richard Hunter I Daryl C. Plummer I Kurt Potter I Frank Buytendijk I Paul E. Proctor I Brian Prentice I Jenny Sussin
Straddling two worlds: challenges
for modern management
AND Cloud model is geared for speed
• Developers have a critical business role
• Micro-services and modern apps create new complexity
• The server is no longer the center point
• Application data is business data
Traditional systems
still require traditional
management
Private or hosted third-party cloud,
Rackspace, etc.
WINDOWS
LINUX
WINDOWS
LINUX
WINDOWS
LINUX
Public cloud
Azure or AWS
Microsoft hybrid IT managementSimplified guest and workload management, both on-premises and in the cloud
Microsoft
Operations
Management Suite
On-premises with System Center
WINDOWS
LINUX
HYPER-V
WINDOWS
LINUX
VMWare
WINDOWS
LINUX
Automation & ControlProtection & Recovery
OMS 四大功能
• 整合雲端備份
• 無縫災難復原和工作負載
移轉
• Hybrid runbook worker
• 撰寫圖形化 Workbook
和自動化 DSC
自動快速作業輕鬆保護資料
OMS 協助我們
延伸 System Center 的能力得到完整的管理解決方案!
Security & Compliance
• 惡意軟體評估
• 安全態勢和系統更新評估
即早辨識威脅
Insight & Analystics
• 輕鬆收集記錄檔
• 整合的快速搜尋和客製化
儀表板查詢
快速發現問題
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Architecture
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Problem
-40GB log per day
-Collecting log in hybrid environment
-Need data visualization tool for better experience
Solution
-OMS with AD Assessment, O365 Audit Log solutions
-6 months data retention
-OMS dash board & PowerBI
Case Study (1) – AD Log
18
 收集Log並觀察費用  搜尋與法調整
 建立警示規則
 客製化儀錶板
 客製化報表
D+14 D+21 D+25
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Problem
-20+ Exchange server to be monitor
-Mail queue trending
-Failover event alerting
-Client access server fail record
Solution
-Customize scripts integrated w/OMS
-OMS dash board
Case Study (2) – DAG Status
19
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Client access server fail record
RPC time latencyMail queue trending
Case Study (2) – DAG Status
Failover event
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Problem
-Slow speed for file server
-Who accessed the file
Solution
-File server audit log and shipping to OMS
-Root cause analysis
Case Study (3) – File Server Audit
21
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
當日(瀏覽檔案)Top10 User
當日(新增檔案)Top10 User
當日(刪除檔案)Top10 User
Case Study (3) – File Server Audit
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Problem
-How to audit Office 365 log
-Seeing the insights from legal operation
Solution
-Office 365 solution gallery with OMS
-Custom query string to see insights
Case Study (4) – O365 Behavior Audit
23
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Case Study (4) – O365 Behavior Audit
合法行為但活動異常
深入問題核心
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
雲儲存空間
雲計算/搜尋能力(Billion)
節省維運成本
跨平台
SaaS服務
Custom Log
SCOM
按照使用量收費
無軟體授權費用
持續功能更新
法規遵循
資料無法被修改及刪除
無硬體損壞風險
Why We Use OMS
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 26
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Lab 1
設定OMS Workspace
Task 1 - 開啟OMS Workspace
Task 2 - 設定OMS Workspace
Task 3 - 連結OMS與Windows VM
Task 4 - 直接安裝OMS Agent
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Lab 2
安裝Linux Agent
Task 1 – 安裝Agent
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Metrics Collection
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
OMS OVERVIEW
30
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Landing Page Overview
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Organization
Administrative users
Standard users
Groups
Microsoft Account
Administrative users
Standard users
Microsoft support
Microsoft.com users only
Standard users
User Management
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 33
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Using and Management Log Search
Select * (all) from the last 1 days
Look for “Error” in all sources from the last 1 days
Look for all Event log in all sources from the last 7 days
https://technet.microsoft.com/en-us/library/mt450427.aspx
OMS Search Reference
General query syntax
 filterExpression | command1 | command2 |…..
Filter expressions
Logical operators
Aggregate using measure
Date and Time
Numbers
Strings and String literals
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
• Logical operators
• Aggregate using measure
• Date and Time
• Numbers
• Strings and String literals
Using and Management Log Search
system OR error
Type:Alert | measure count() interval 1HOUR
TimeGenerated>NOW-5MINUTES
Type=Perf ObjectName=Process CounterValue>10
The WMI Adapter
“The WMI Adapter”
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Lab 3
Query Syntax
Task 1 - 網路介面五分鐘平均頻寬(GB)
Task 2 - 網路介面每小時最大頻寬(MB)
Task 3 -平均磁碟讀取趨勢
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Security Challenges
網路攻擊事件
頻繁
IT環境日益複
雜
資安能力缺乏
巨量安全記錄
分析
功能完整的資
安機制
智能威脅偵測
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.40
What is OMS Security Threat Intelligence and why do I
need it?
From leading Threat Intelligence vendors
Real time data feeding
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
DEMO
41
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.42
Demo: Attack on Target Network
• Firewalls are turned off on all systems
• Windows Updates have not been
applied and have been turned off
• Remote Desktop is turned on
• WinRM is enabled
• File Sharing and Network Discovery are
turned on
• No Antivirus installed
• PowerShell scripts set to unrestricted
DC1
Windows Server 2008 R2 SP1
10.0.1.10
Domain Controller & DNS
Server1
Windows Server 2008 R2 SP1
10.0.1.5
ATA
Windows Server 2016
10.0.1.12
Client1
Windows 7 SP1
10.0.1.22
Client2
Windows 7 SP1
10.0.1.21
Kali Linux 2.0
10.0.1.15
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.43
Demo: Attack on Target Network
• Firewalls are turned off on all systems
• Windows Updates have not been
applied and have been turned off
• Remote Desktop is turned on
• WinRM is enabled
• File Sharing and Network Discovery are
turned on
• No Antivirus installed
• PowerShell scripts set to unrestricted
Attack Box
DC1
Windows Server 2008 R2 SP1
10.0.1.10
Domain Controller & DNS
Server1
Windows Server 2008 R2 SP1
10.0.1.5
ATA
Windows Server 2016
10.0.1.12
Client1
Windows 7 SP1
10.0.1.22
Client2
Windows 7 SP1
10.0.1.21
Kali Linux 2.0
10.0.1.15
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.44
Demo: Attack on Target Network
1. Phishing Attack on Client2
DC1
Windows Server 2008 R2 SP1
10.0.1.10
Domain Controller & DNS
Server1
Windows Server 2008 R2 SP1
10.0.1.5
ATA
Windows Server 2016
10.0.1.12
Client1
Windows 7 SP1
10.0.1.22
Client2
Windows 7 SP1
10.0.1.21
Kali Linux 2.0
10.0.1.15
1
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.45
Demo: Attack on Target Network
1. Phishing Attack on Client2
2. Steal server admin credentials
DC1
Windows Server 2008 R2 SP1
10.0.1.10
Domain Controller & DNS
Server1
Windows Server 2008 R2 SP1
10.0.1.5
ATA
Windows Server 2016
10.0.1.12
Client1
Windows 7 SP1
10.0.1.22
Client2
Windows 7 SP1
10.0.1.21
Kali Linux 2.0
10.0.1.15
2
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.46
Demo: Attack on Target Network
1. Phishing Attack on Client2
2. Steal server admin credentials
3. Conduct Recon on Network
DC1
Windows Server 2008 R2 SP1
10.0.1.10
Domain Controller & DNS
Server1
Windows Server 2008 R2 SP1
10.0.1.5
ATA
Windows Server 2016
10.0.1.12
Client1
Windows 7 SP1
10.0.1.22
Client2
Windows 7 SP1
10.0.1.21
Kali Linux 2.0
10.0.1.15
3
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.47
1. Phishing Attack on Client2
2. Steal server admin credentials
3. Conduct Recon on Network
4. Pivot to Server1
4
Demo: Attack on Target Network
DC1
Windows Server 2008 R2 SP1
10.0.1.10
Domain Controller & DNS
Server1
Windows Server 2008 R2 SP1
10.0.1.5
ATA
Windows Server 2016
10.0.1.12
Client1
Windows 7 SP1
10.0.1.22
Client2
Windows 7 SP1
10.0.1.21
Kali Linux 2.0
10.0.1.15
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.48
Demo: Attack on Target Network
1. Phishing Attack on Client2
2. Steal server admin credentials
3. Conduct Recon on Network
4. Pivot to Server1
5. Steal domain admin credentials
5
DC1
Windows Server 2008 R2 SP1
10.0.1.10
Domain Controller & DNS
Server1
Windows Server 2008 R2 SP1
10.0.1.5
ATA
Windows Server 2016
10.0.1.12
Client1
Windows 7 SP1
10.0.1.22
Client2
Windows 7 SP1
10.0.1.21
Kali Linux 2.0
10.0.1.15
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.49
Demo: Attack on Target Network
1. Phishing Attack on Client2
2. Steal server admin credentials
3. Conduct Recon on Network
4. Pivot to Server1
5. Steal domain admin credentials
6. Pivot to DC1
6
DC1
Windows Server 2008 R2 SP1
10.0.1.10
Domain Controller & DNS
Server1
Windows Server 2008 R2 SP1
10.0.1.5
ATA
Windows Server 2016
10.0.1.12
Client1
Windows 7 SP1
10.0.1.22
Client2
Windows 7 SP1
10.0.1.21
Kali Linux 2.0
10.0.1.15
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.50
What We Saw
1. Phishing Attack on Client2
2. Steal server admin credentials
3. Conduct Recon on Network
4. Pivot to Server1
5. Steal domain admin credentials
6. Pivot to DC1
7. Establish persistence in domain
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 51
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Lab 4
使用Security and Compliance
for 增強SQL安全性
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Lab 5
啟用Security and Audit
Solution in OMS
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Microsoft Teams
協同溝通
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Lab 6
Add Webhook to Microsoft
Teams
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
{
"text": "#alertrulename fired with #searchresultcount records which exceeds the over threshold of #thresholdvalue .",
"title": "#alertrulename",
"themeColor": "0072C6",
"sections": [{
"activityTitle": "Alert Rule Name - #alertrulename",
"activityText": "##Severity:<font color="#FFD700">Warning<font>",
"markdown": true
},{
"activityTitle": "Alert Rule Name - #alertrulename",
"activityText": "WorkspaceID: #workspaceid nnSearch Condition - *Threshold Operator:* #thresholdoperator,
*Threshold Value:* #thresholdvalue nnSearch Syntax: #searchquery",
"markdown": true
}, {
"activityTitle": "Search Time",
"activityText": "StartTime(UTC): #searchintervalstarttimeutc nnEndTime(UTC): #searchintervalendtimeutc nnInterval(Seconds): #searchinterva
"markdown": true
}],
"entities": [],
"potentialAction": [{
"@context": "http://schema.org",
"@type": "ViewAction",
"name": "Search Results: #searchresultcount result(s)",
"target": ["#linktosearchresults"]
}]
}
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Lab 7
Insights From Dashboard
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Which Dashboard We Care about Most
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Peak Loading
EIP: 23:12, 4:30, 10:27, 15:37
ERP: 1:07, 3:07, 10:32
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Lab 8
Deploy Template
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-template-workspace-configuration
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Lab 9
SNMP Trap
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Module
- Net-SNMP
- fluentd
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 65
緯謙全方位效能與資安監控解決方案
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
高可視化資料呈現
服務整合
事件告警
66
緯謙效能監控服務
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
深入問題核心,追蹤問題來源
67
緯謙效能監控服務
資料蒐集 分析問題 採取行動
使用OMS代理程式及
Solution gallery整合企業
所使用的IT資源於單一平台
透過OMS平台自訂搜尋語法
功能,抽絲剝繭尋找問題根
本原因
透過高可視化儀表呈現資料
分布及趨勢,提供您作商業
決策的依據
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
ECS - 帳務管理服務
68
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
高可視化儀表版,輕易了解使用金額及每月趨勢
69
緯謙帳務管理服務
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
使用量圓餅圖,花費比率一目了然
緯謙帳務管理服務
70
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
輕鬆了解各資源群組使用金額及每月趨勢
緯謙帳務管理服務
71
Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
Technology Co.
© 2017 WiAdvance Technology Co. All rights reserved.
選擇緯謙的三大原因
Summary
72
問題 解決方案
緯謙帳務管理服務
高度整合Azure
O365監控機制
技術諮詢、服務報修
緯謙效能監控服務
緯謙維運管理服務
Azure費用分佈
預算控制


Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
© 2017 WiAdvance Technology Co. All rights reserved.
$
73
Thank You

More Related Content

What's hot

Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Skybox Security
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Digital Transformation EXPO Event Series
 
Hope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, NeustarHope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, Neustar
ResellerClub
 
State of DevSecOps - GTACS 2019
State of DevSecOps - GTACS 2019State of DevSecOps - GTACS 2019
State of DevSecOps - GTACS 2019
Stefan Streichsbier
 
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 Examining Technical Best Practices for Veritas and Azure Using a Detailed Re... Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
Veritas Technologies LLC
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software Remediation
Denim Group
 
Le soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityLe soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuity
Jürgen Ambrosi
 
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Veritas Technologies LLC
 
Top 5 Reasons to Replace Data Domain with NetBackup Appliances
Top 5 Reasons to Replace Data Domain with NetBackup AppliancesTop 5 Reasons to Replace Data Domain with NetBackup Appliances
Top 5 Reasons to Replace Data Domain with NetBackup Appliances
Veritas Technologies LLC
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
Cyber Security Alliance
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsNewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
James Wickett
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
HP Enterprise Italia
 
Cloud Adoption: From Start to PaaS
Cloud Adoption: From Start to PaaSCloud Adoption: From Start to PaaS
Cloud Adoption: From Start to PaaS
Andrew Khoury
 
The New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOpsThe New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOps
James Wickett
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
CA Technologies
 
Securing DevOps Lifecycle
Securing DevOps LifecycleSecuring DevOps Lifecycle
Securing DevOps Lifecycle
DevOps Indonesia
 
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Achieving Secure DevOps: Overcoming the Risks of Modern Service DeliveryAchieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Perforce
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 

What's hot (19)

Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
 
Hope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, NeustarHope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, Neustar
 
State of DevSecOps - GTACS 2019
State of DevSecOps - GTACS 2019State of DevSecOps - GTACS 2019
State of DevSecOps - GTACS 2019
 
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 Examining Technical Best Practices for Veritas and Azure Using a Detailed Re... Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software Remediation
 
141106 actifio overview
141106 actifio overview 141106 actifio overview
141106 actifio overview
 
Le soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityLe soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuity
 
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
 
Top 5 Reasons to Replace Data Domain with NetBackup Appliances
Top 5 Reasons to Replace Data Domain with NetBackup AppliancesTop 5 Reasons to Replace Data Domain with NetBackup Appliances
Top 5 Reasons to Replace Data Domain with NetBackup Appliances
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsNewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
Cloud Adoption: From Start to PaaS
Cloud Adoption: From Start to PaaSCloud Adoption: From Start to PaaS
Cloud Adoption: From Start to PaaS
 
The New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOpsThe New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOps
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
Securing DevOps Lifecycle
Securing DevOps LifecycleSecuring DevOps Lifecycle
Securing DevOps Lifecycle
 
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Achieving Secure DevOps: Overcoming the Risks of Modern Service DeliveryAchieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
Achieving Secure DevOps: Overcoming the Risks of Modern Service Delivery
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 

Similar to iThome Cloud Summit 2017 - 實戰 Hybrid Cloud 管理與安全技術

Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...
Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...
Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...
VMware Tanzu
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
Cisco Russia
 
7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive
marketingunitrends
 
Case Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCase Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP way
CA Technologies
 
How to Stop Over Paying Your VMware Taxes
How to Stop Over Paying Your VMware TaxesHow to Stop Over Paying Your VMware Taxes
How to Stop Over Paying Your VMware Taxes
Veritas Technologies LLC
 
The Essentials Of Project Management
The Essentials Of Project ManagementThe Essentials Of Project Management
The Essentials Of Project Management
Laura Arrigo
 
Veritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Technologies LLC
 
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayWebinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Hussein Khazaal
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyes
ThousandEyes
 
Tame the Beast: Rapidly Build, Deploy, Reuse, and Govern Microservices
Tame the Beast: Rapidly Build, Deploy, Reuse, and Govern MicroservicesTame the Beast: Rapidly Build, Deploy, Reuse, and Govern Microservices
Tame the Beast: Rapidly Build, Deploy, Reuse, and Govern Microservices
VMware Tanzu
 
Ongoing management of your PHP 7 application
Ongoing management of your PHP 7 applicationOngoing management of your PHP 7 application
Ongoing management of your PHP 7 application
Zend by Rogue Wave Software
 
Scale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBeesScale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBees
Deborah Schalm
 
Scale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBeesScale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBees
DevOps.com
 
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
Veritas Technologies LLC
 
Journey to Cloud-Native: Continuous Delivery with Artificial Intelligence
Journey to Cloud-Native: Continuous Delivery with Artificial IntelligenceJourney to Cloud-Native: Continuous Delivery with Artificial Intelligence
Journey to Cloud-Native: Continuous Delivery with Artificial Intelligence
VMware Tanzu
 
Postgres Vision 2018: Making Modern an Old Legacy System
Postgres Vision 2018: Making Modern an Old Legacy SystemPostgres Vision 2018: Making Modern an Old Legacy System
Postgres Vision 2018: Making Modern an Old Legacy System
EDB
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simple
Cisco Canada
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
Check Point Software Technologies
 
7 flavours of devops implementation
7 flavours of devops implementation7 flavours of devops implementation
7 flavours of devops implementation
Aspire Systems
 
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
Check Point Software Technologies
 

Similar to iThome Cloud Summit 2017 - 實戰 Hybrid Cloud 管理與安全技術 (20)

Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...
Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...
Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive7 Ways Backup Makes IT More Productive
7 Ways Backup Makes IT More Productive
 
Case Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCase Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP way
 
How to Stop Over Paying Your VMware Taxes
How to Stop Over Paying Your VMware TaxesHow to Stop Over Paying Your VMware Taxes
How to Stop Over Paying Your VMware Taxes
 
The Essentials Of Project Management
The Essentials Of Project ManagementThe Essentials Of Project Management
The Essentials Of Project Management
 
Veritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike Palmer
 
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayWebinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyes
 
Tame the Beast: Rapidly Build, Deploy, Reuse, and Govern Microservices
Tame the Beast: Rapidly Build, Deploy, Reuse, and Govern MicroservicesTame the Beast: Rapidly Build, Deploy, Reuse, and Govern Microservices
Tame the Beast: Rapidly Build, Deploy, Reuse, and Govern Microservices
 
Ongoing management of your PHP 7 application
Ongoing management of your PHP 7 applicationOngoing management of your PHP 7 application
Ongoing management of your PHP 7 application
 
Scale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBeesScale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBees
 
Scale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBeesScale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBees
 
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
 
Journey to Cloud-Native: Continuous Delivery with Artificial Intelligence
Journey to Cloud-Native: Continuous Delivery with Artificial IntelligenceJourney to Cloud-Native: Continuous Delivery with Artificial Intelligence
Journey to Cloud-Native: Continuous Delivery with Artificial Intelligence
 
Postgres Vision 2018: Making Modern an Old Legacy System
Postgres Vision 2018: Making Modern an Old Legacy SystemPostgres Vision 2018: Making Modern an Old Legacy System
Postgres Vision 2018: Making Modern an Old Legacy System
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simple
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
 
7 flavours of devops implementation
7 flavours of devops implementation7 flavours of devops implementation
7 flavours of devops implementation
 
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
 

Recently uploaded

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 

Recently uploaded (20)

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 

iThome Cloud Summit 2017 - 實戰 Hybrid Cloud 管理與安全技術

  • 1. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. © 2017 WiAdvance Technology Co. All rights reserved. Technology Co. iThome 實戰Hybrid Cloud管理與安全技術 2017 Jun.
  • 2. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. I’m Charles 龔萬軒 Consultant of WiAdvance • 組織 $2.8M USD 大型國際標案 • 執行產品行銷包括大型演講、形象影片、電銷計 劃等,增加300%客戶成長率 • 微軟雲架構技術顧問 • 研發管理顧問ACP (敏捷), PMP(瀑布式) Professional Experience
  • 3. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. • OMS Lab Instructions (OneNote) https://goo.gl/pHaQYX 3 Lecture Material
  • 4. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 企業面臨的挑戰 Azure Introduction OMS Introduction Case Study OMS監控環境實作 緯謙解決方案介紹 Agenda
  • 5. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Pain Points of IT 5 Performance Machine performance and health monitor Threat Threat detection and prevention through advanced cloud security Management Cross-platform and hybrid environment in reality
  • 6. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Supporting Statistic Data 6 +40% time spent on confirm root cause1 +41% Unlicensed application installed2 +75% IT cost spent on M&A3 1. Turner, Mary Johnston. IDC. “Automated, Integrated IT Operations Improve Effi ciency and Deliver Cost Savings”. January 2010. 2. Business Software Alliance, IDC. “Sixth Annual Global Software Piracy Report”. May 2009. 3. O’Donnell, Glenn. Forrester. “IT Operations 2009: An Automation Odyssey”. July 2009. 4. Berger, Brian. Enterprise Networks & Servers. “Putting Trust Back Into Computing: How Enterprises Can Secure Systems and Data”. August 2007. 5. Gartner. “The Cost of Downtime”. July 2014. +75% Corporate PCs are infected4 +60s Unplanned downtime costs 5,600 USD/min5
  • 7. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 資訊系統意外隨時都可能發生… 當機或效率不佳 預期效能 Web Server Systems Mainframe Database Network Application End-User Service 05:00 06:00 07:00 08:00 09:00 10:00 11:00 12:00 13:00 14:00 15:00 16:00 99% 99% 99.999% 99.9% 99.99% 99.9% % available 當所有獨立的意外發生的時候 ? 誰測量真實的用戶體驗, 和管理的全程服務 及時遠端監視系統可以在意外發生時,通知 IT 人員或權責主管 ,馬上進行障礙排除,恢復系統運作。
  • 8. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. There are no cattle, there is only the herd.
  • 9. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.9 There are no cattle, there is only the herd.
  • 10. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 自動化 受控管的資源 彈性 以使用量為主 虛擬機器 網站 雲端服務 SQL資料庫 noSQL 資料庫 blob 儲存 連線 虛擬網路 流量管理員 ... ... ... ... ... ... There are no cattle, there is only the herd.
  • 11.
  • 12. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. OMS INTRODUCTION 12
  • 13. The world of traditional IT is under pressure Source: Drive Digital Business Using Insights From Gartner Symposium’s Analyst Keynote 21 November 2014 G00270846 Analyst(s): David A. Willis I Peter Sondergaard I Richard Hunter I Daryl C. Plummer I Kurt Potter I Frank Buytendijk I Paul E. Proctor I Brian Prentice I Jenny Sussin
  • 14. Straddling two worlds: challenges for modern management AND Cloud model is geared for speed • Developers have a critical business role • Micro-services and modern apps create new complexity • The server is no longer the center point • Application data is business data Traditional systems still require traditional management
  • 15. Private or hosted third-party cloud, Rackspace, etc. WINDOWS LINUX WINDOWS LINUX WINDOWS LINUX Public cloud Azure or AWS Microsoft hybrid IT managementSimplified guest and workload management, both on-premises and in the cloud Microsoft Operations Management Suite On-premises with System Center WINDOWS LINUX HYPER-V WINDOWS LINUX VMWare WINDOWS LINUX
  • 16. Automation & ControlProtection & Recovery OMS 四大功能 • 整合雲端備份 • 無縫災難復原和工作負載 移轉 • Hybrid runbook worker • 撰寫圖形化 Workbook 和自動化 DSC 自動快速作業輕鬆保護資料 OMS 協助我們 延伸 System Center 的能力得到完整的管理解決方案! Security & Compliance • 惡意軟體評估 • 安全態勢和系統更新評估 即早辨識威脅 Insight & Analystics • 輕鬆收集記錄檔 • 整合的快速搜尋和客製化 儀表板查詢 快速發現問題
  • 17. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Architecture
  • 18. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Problem -40GB log per day -Collecting log in hybrid environment -Need data visualization tool for better experience Solution -OMS with AD Assessment, O365 Audit Log solutions -6 months data retention -OMS dash board & PowerBI Case Study (1) – AD Log 18  收集Log並觀察費用  搜尋與法調整  建立警示規則  客製化儀錶板  客製化報表 D+14 D+21 D+25
  • 19. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Problem -20+ Exchange server to be monitor -Mail queue trending -Failover event alerting -Client access server fail record Solution -Customize scripts integrated w/OMS -OMS dash board Case Study (2) – DAG Status 19
  • 20. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Client access server fail record RPC time latencyMail queue trending Case Study (2) – DAG Status Failover event
  • 21. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Problem -Slow speed for file server -Who accessed the file Solution -File server audit log and shipping to OMS -Root cause analysis Case Study (3) – File Server Audit 21
  • 22. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 當日(瀏覽檔案)Top10 User 當日(新增檔案)Top10 User 當日(刪除檔案)Top10 User Case Study (3) – File Server Audit
  • 23. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Problem -How to audit Office 365 log -Seeing the insights from legal operation Solution -Office 365 solution gallery with OMS -Custom query string to see insights Case Study (4) – O365 Behavior Audit 23
  • 24. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Case Study (4) – O365 Behavior Audit 合法行為但活動異常 深入問題核心
  • 25. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 雲儲存空間 雲計算/搜尋能力(Billion) 節省維運成本 跨平台 SaaS服務 Custom Log SCOM 按照使用量收費 無軟體授權費用 持續功能更新 法規遵循 資料無法被修改及刪除 無硬體損壞風險 Why We Use OMS
  • 26. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 26
  • 27. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Lab 1 設定OMS Workspace Task 1 - 開啟OMS Workspace Task 2 - 設定OMS Workspace Task 3 - 連結OMS與Windows VM Task 4 - 直接安裝OMS Agent
  • 28. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Lab 2 安裝Linux Agent Task 1 – 安裝Agent
  • 29. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Metrics Collection
  • 30. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. OMS OVERVIEW 30
  • 31. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Landing Page Overview
  • 32. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Organization Administrative users Standard users Groups Microsoft Account Administrative users Standard users Microsoft support Microsoft.com users only Standard users User Management
  • 33. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 33
  • 34. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Using and Management Log Search Select * (all) from the last 1 days Look for “Error” in all sources from the last 1 days Look for all Event log in all sources from the last 7 days https://technet.microsoft.com/en-us/library/mt450427.aspx OMS Search Reference General query syntax  filterExpression | command1 | command2 |….. Filter expressions Logical operators Aggregate using measure Date and Time Numbers Strings and String literals
  • 35. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. • Logical operators • Aggregate using measure • Date and Time • Numbers • Strings and String literals Using and Management Log Search system OR error Type:Alert | measure count() interval 1HOUR TimeGenerated>NOW-5MINUTES Type=Perf ObjectName=Process CounterValue>10 The WMI Adapter “The WMI Adapter”
  • 36. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Lab 3 Query Syntax Task 1 - 網路介面五分鐘平均頻寬(GB) Task 2 - 網路介面每小時最大頻寬(MB) Task 3 -平均磁碟讀取趨勢
  • 37. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
  • 38. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
  • 39. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Security Challenges 網路攻擊事件 頻繁 IT環境日益複 雜 資安能力缺乏 巨量安全記錄 分析 功能完整的資 安機制 智能威脅偵測
  • 40. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.40 What is OMS Security Threat Intelligence and why do I need it? From leading Threat Intelligence vendors Real time data feeding
  • 41. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. DEMO 41
  • 42. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.42 Demo: Attack on Target Network • Firewalls are turned off on all systems • Windows Updates have not been applied and have been turned off • Remote Desktop is turned on • WinRM is enabled • File Sharing and Network Discovery are turned on • No Antivirus installed • PowerShell scripts set to unrestricted DC1 Windows Server 2008 R2 SP1 10.0.1.10 Domain Controller & DNS Server1 Windows Server 2008 R2 SP1 10.0.1.5 ATA Windows Server 2016 10.0.1.12 Client1 Windows 7 SP1 10.0.1.22 Client2 Windows 7 SP1 10.0.1.21 Kali Linux 2.0 10.0.1.15
  • 43. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.43 Demo: Attack on Target Network • Firewalls are turned off on all systems • Windows Updates have not been applied and have been turned off • Remote Desktop is turned on • WinRM is enabled • File Sharing and Network Discovery are turned on • No Antivirus installed • PowerShell scripts set to unrestricted Attack Box DC1 Windows Server 2008 R2 SP1 10.0.1.10 Domain Controller & DNS Server1 Windows Server 2008 R2 SP1 10.0.1.5 ATA Windows Server 2016 10.0.1.12 Client1 Windows 7 SP1 10.0.1.22 Client2 Windows 7 SP1 10.0.1.21 Kali Linux 2.0 10.0.1.15
  • 44. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.44 Demo: Attack on Target Network 1. Phishing Attack on Client2 DC1 Windows Server 2008 R2 SP1 10.0.1.10 Domain Controller & DNS Server1 Windows Server 2008 R2 SP1 10.0.1.5 ATA Windows Server 2016 10.0.1.12 Client1 Windows 7 SP1 10.0.1.22 Client2 Windows 7 SP1 10.0.1.21 Kali Linux 2.0 10.0.1.15 1
  • 45. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.45 Demo: Attack on Target Network 1. Phishing Attack on Client2 2. Steal server admin credentials DC1 Windows Server 2008 R2 SP1 10.0.1.10 Domain Controller & DNS Server1 Windows Server 2008 R2 SP1 10.0.1.5 ATA Windows Server 2016 10.0.1.12 Client1 Windows 7 SP1 10.0.1.22 Client2 Windows 7 SP1 10.0.1.21 Kali Linux 2.0 10.0.1.15 2
  • 46. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.46 Demo: Attack on Target Network 1. Phishing Attack on Client2 2. Steal server admin credentials 3. Conduct Recon on Network DC1 Windows Server 2008 R2 SP1 10.0.1.10 Domain Controller & DNS Server1 Windows Server 2008 R2 SP1 10.0.1.5 ATA Windows Server 2016 10.0.1.12 Client1 Windows 7 SP1 10.0.1.22 Client2 Windows 7 SP1 10.0.1.21 Kali Linux 2.0 10.0.1.15 3
  • 47. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.47 1. Phishing Attack on Client2 2. Steal server admin credentials 3. Conduct Recon on Network 4. Pivot to Server1 4 Demo: Attack on Target Network DC1 Windows Server 2008 R2 SP1 10.0.1.10 Domain Controller & DNS Server1 Windows Server 2008 R2 SP1 10.0.1.5 ATA Windows Server 2016 10.0.1.12 Client1 Windows 7 SP1 10.0.1.22 Client2 Windows 7 SP1 10.0.1.21 Kali Linux 2.0 10.0.1.15
  • 48. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.48 Demo: Attack on Target Network 1. Phishing Attack on Client2 2. Steal server admin credentials 3. Conduct Recon on Network 4. Pivot to Server1 5. Steal domain admin credentials 5 DC1 Windows Server 2008 R2 SP1 10.0.1.10 Domain Controller & DNS Server1 Windows Server 2008 R2 SP1 10.0.1.5 ATA Windows Server 2016 10.0.1.12 Client1 Windows 7 SP1 10.0.1.22 Client2 Windows 7 SP1 10.0.1.21 Kali Linux 2.0 10.0.1.15
  • 49. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.49 Demo: Attack on Target Network 1. Phishing Attack on Client2 2. Steal server admin credentials 3. Conduct Recon on Network 4. Pivot to Server1 5. Steal domain admin credentials 6. Pivot to DC1 6 DC1 Windows Server 2008 R2 SP1 10.0.1.10 Domain Controller & DNS Server1 Windows Server 2008 R2 SP1 10.0.1.5 ATA Windows Server 2016 10.0.1.12 Client1 Windows 7 SP1 10.0.1.22 Client2 Windows 7 SP1 10.0.1.21 Kali Linux 2.0 10.0.1.15
  • 50. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.50 What We Saw 1. Phishing Attack on Client2 2. Steal server admin credentials 3. Conduct Recon on Network 4. Pivot to Server1 5. Steal domain admin credentials 6. Pivot to DC1 7. Establish persistence in domain
  • 51. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 51
  • 52. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Lab 4 使用Security and Compliance for 增強SQL安全性
  • 53. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Lab 5 啟用Security and Audit Solution in OMS
  • 54. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Microsoft Teams 協同溝通
  • 55. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Lab 6 Add Webhook to Microsoft Teams
  • 56. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. { "text": "#alertrulename fired with #searchresultcount records which exceeds the over threshold of #thresholdvalue .", "title": "#alertrulename", "themeColor": "0072C6", "sections": [{ "activityTitle": "Alert Rule Name - #alertrulename", "activityText": "##Severity:<font color="#FFD700">Warning<font>", "markdown": true },{ "activityTitle": "Alert Rule Name - #alertrulename", "activityText": "WorkspaceID: #workspaceid nnSearch Condition - *Threshold Operator:* #thresholdoperator, *Threshold Value:* #thresholdvalue nnSearch Syntax: #searchquery", "markdown": true }, { "activityTitle": "Search Time", "activityText": "StartTime(UTC): #searchintervalstarttimeutc nnEndTime(UTC): #searchintervalendtimeutc nnInterval(Seconds): #searchinterva "markdown": true }], "entities": [], "potentialAction": [{ "@context": "http://schema.org", "@type": "ViewAction", "name": "Search Results: #searchresultcount result(s)", "target": ["#linktosearchresults"] }] }
  • 57. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Lab 7 Insights From Dashboard
  • 58. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Which Dashboard We Care about Most
  • 59. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Peak Loading EIP: 23:12, 4:30, 10:27, 15:37 ERP: 1:07, 3:07, 10:32
  • 60. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Lab 8 Deploy Template
  • 61. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-template-workspace-configuration
  • 62. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Lab 9 SNMP Trap
  • 63. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Module - Net-SNMP - fluentd
  • 64. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved.
  • 65. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 65 緯謙全方位效能與資安監控解決方案
  • 66. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 高可視化資料呈現 服務整合 事件告警 66 緯謙效能監控服務
  • 67. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 深入問題核心,追蹤問題來源 67 緯謙效能監控服務 資料蒐集 分析問題 採取行動 使用OMS代理程式及 Solution gallery整合企業 所使用的IT資源於單一平台 透過OMS平台自訂搜尋語法 功能,抽絲剝繭尋找問題根 本原因 透過高可視化儀表呈現資料 分布及趨勢,提供您作商業 決策的依據
  • 68. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. ECS - 帳務管理服務 68
  • 69. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 高可視化儀表版,輕易了解使用金額及每月趨勢 69 緯謙帳務管理服務
  • 70. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 使用量圓餅圖,花費比率一目了然 緯謙帳務管理服務 70
  • 71. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. 輕鬆了解各資源群組使用金額及每月趨勢 緯謙帳務管理服務 71
  • 72. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. Technology Co. © 2017 WiAdvance Technology Co. All rights reserved. 選擇緯謙的三大原因 Summary 72 問題 解決方案 緯謙帳務管理服務 高度整合Azure O365監控機制 技術諮詢、服務報修 緯謙效能監控服務 緯謙維運管理服務 Azure費用分佈 預算控制  
  • 73. Technology Co.© 2017 WiAdvance Technology Co. All rights reserved. © 2017 WiAdvance Technology Co. All rights reserved. $ 73 Thank You

Editor's Notes

  1. 沒有足夠時間與工具掌握現有系統狀態 被動收到告警才發現服務異常 Threat detection demo video: https://www.microsoft.com/en-us/cloud-platform/security-and-compliance Demo重點: 被安裝malware的電腦 遺漏安裝更新的電腦 (update assessment) Windows 的監控 攻擊IP的可視化分析 Wistron IT: 異常流量, CPU,並希望alert自己報出來 Ecessa 網路服務公司提出的IT痛點有 確保每日的可用頻寬以及品質 Multi-site的監控 服務品質低落造成抱怨 新服務導入的頻寬預估 Kaseya 提出 實際案例: 業務工程師提到網路
  2. Gartner estimates that one hour of network downtime - planned or unplanned - costs the average company £26,000.4
  3. Werner Vogels, CTO of AWS “When it comes to servers, there are no cattle, there is only the herd.” There are no cattle, there is only the herd.”
  4. Werner Vogels, CTO of AWS “When it comes to servers, there are no cattle, there is only the herd.” There are no cattle, there is only the herd.”
  5. User Types Administrative users Can make changes to the workspace Invite other users Create dashboards for users Standard users Use solutions Manage my dashboard Perform and save searches Microsoft users Must have @Microsoft.com Support purpose Set to standard user role Removed after 7 days
  6. COUNT, MAX, MIN, SUM , AVG, STDDEV - AND (&), OR (||), NOT (!)
  7. Notes
  8. Counter: Bytes Total/sec ObjectName="Network Interface" CounterName="Bytes Total/sec" TimeGenerated>NOW-5MINUTES | measure avg(CounterValue) by Computer,InstanceName |sort Computer Counter: Bytes Total/sec ObjectName="Network Interface" CounterName="Bytes Total/sec" TimeGenerated>NOW-1HOUR | measure max(CounterValue) by Computer,InstanceName Counter: Disk Reads/sec Type=Perf ObjectName=LogicalDisk OR ObjectName="Logical Disk" (CounterName="Disk Reads/sec") TimeGenerated>NOW-1DAY | measure avg(CounterValue) by Computer, InstanceName |sort Computer | where AggregatedValue <0.02
  9. Security Challenges: Threats are on the rise: 160 million records exposed 229 days between compromise and detection $3 MILLION of cost/business impact per breach Environments are more complex: hybrid, multi-cloud, heterogeneous, IaaS+PaaS increasingly distributed and physical networks no longer define the perimeter more than 30 security solutions A new approach is required: too many alerts, too few insights traditional methods often don’t apply to the cloud threats are evolving rapidly Today’s IT Security and Operations teams are tasked with managing highly complex, hybrid-cloud, cross-platform systems which are increasingly vulnerable to a growing number of sophisticated cyber-attacks. With this, IT Operations teams have a requirement to identify any threats to their environment as soon as possible to mitigate damages, as well as continue to cost-effectively meet SLAs.
  10. 一週內成功登入使用者列表 Type=SecurityEvent EventID=4624 | Measure count() as LogonCount by Computer
  11. 超過60ms 效能不佳
  12. 超過60ms 效能不佳 EIP:高峰時間點 10AM, 11:12 PM, 4:30 AM, 3:30 PM ERP: 1:07 AM, 3:07 AM, 10:32 AM
  13. 間控各種服務的效能 整和其它雲端服務至OMS 告警以及帳務報表 主動安全性分析以及安全稽核 (非法軟體、更新policy) 緯謙加值: 報表整合, 告警rule設定, 費用分析 障礙告警+效能告警 = 掌握系統健康狀態 訂時報表分析 = 提前預知 資安稽核 行為分析 跨平台整合 單一管理介面
  14. 蒐集資料 洞見問題 採取行動