Applies to: Advanced Threat Analytics version 1.9
ATA readiness roadmap
This article provides you a readiness roadmap that will assist you to get started with Advanced Threat Analytics.
Advanced Threat Analytics (ATA) is an on-premises platform that helps protect your enterprise from multiple types of advanced targeted cyber attacks and insider threats. Use the following resources to learn more about ATA:
ATA is composed of the ATA Center, which you can install on a server, and ATA Gateways, which you can install on separate computers or by using the Lightweight Gateway directly on your domain controllers. Before you get up and running, it's important to make the following deployment decisions:
|Hardware type||Physical, virtual, Azure VM|
|Workgroup or Domain||Workgroup, domain|
|Gateway sizing||Full Gateway, Lightweight Gateway|
If you are using physical servers, you should plan capacity. You can get help from the sizing tool to allocate space for ATA:
ATA sizing tool - The sizing tool automates collection of the amount of traffic ATA needs. It automatically provides supportability and resource recommendations for both the ATA Center and ATA Lightweight Gateways.
These resources will help you download and install the ATA Center, connect to Active Directory, download the ATA Gateway package, set up event collection, and optionally integrate with your VPN and set up honeytoken accounts and exclusions.
Download ATA - Before deploying ATA, if you haven't made the decision to purchase ATA, you can download the evaluation version.
ATA POC playbook - Guide to all the steps necessary to do a successful POC deployment of ATA.
ATA deployment video - This video provides an overview of ATA deployment steps in less than 10 minutes.
The basic necessary settings in ATA are configured as part of the installation wizard. However, there are a number of other settings that you can configure to fine-tune ATA that makes detections more accurate for your environment, such as SIEM integration and audit settings.
Audit settings – Audit your domain controller health before and after an ATA deployment.
Work with ATA
After ATA is up and running, you can view suspicious activities that are detected in the Attack timeline. This is the default landing page you are taken to when you log in to the ATA Console. By default, all open suspicious activities are shown on the attack time line. You can also see the severity assigned to each activity. Investigate each suspicious activity by drilling down into the entities (computers, devices, users) to open their profile pages that provide more information. These resources will help you work with ATA's suspicious activities:
ATA suspicious activity playbook - This article walks you through credential theft attack techniques using readily available research tools on the internet. At each point of the attack, you can see how ATA helps you gain visibility into these threats.
Security best practices
ATA best practices - Best practices for securing ATA.
ATA frequently asked questions - This article provides a list of frequently asked questions about ATA and provides insight and answers.