PowerProtect �Data Manager
Anomaly Detection
Copyright © Dell Inc. All Rights Reserved.
1
Internal Use - Confidential
Agenda
Copyright © Dell Inc. All Rights Reserved.
2
Internal Use - Confidential
What is?
PPDM ANOMALY DETECTION
Copyright © Dell Inc. All Rights Reserved.
3
Internal Use - Confidential
Anomaly Detection
Anomaly Detection
The process of identifying data points that are different from what's normal or expected. Also known as outlier detection.
Cyber
Security
What
Where
When
Security Platform SEIM/SOAR
Copyright © Dell Inc. All Rights Reserved.
4
Internal Use - Confidential
Why do I need in PPDM?
PPDM ANOMALY DETECTION
Copyright © Dell Inc. All Rights Reserved.
5
Internal Use - Confidential
Anomaly Detection
EXTENSIVE analysis of backup data to ensure integrity of digital infrastructure, enhancing confidence in cyber resiliency
PROVIDES detection of anomalies to enable insights into potential threats and security risks
MACHINE LEARNING analyzes patterns to detect suspicious activity and indicators of compromise
LIGHTWEIGHT detection within PowerProtect Data Manager
Identify anomalies before they escalate
Threat detection with PowerProtect Data Manager
Copyright © Dell Inc. All Rights Reserved.
6
Copyright © Dell Inc. All Rights Reserved.
6
Internal Use - Confidential
Solution
PPDM ANOMALY DETECTION
Copyright © Dell Inc. All Rights Reserved.
7
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
8
Internal Use - Confidential
Complementary Anomaly Detection
Vault
Cyber Analytics
Vault
Data
Production Anomaly
Detection
Backup
Data
Trusted Accuracy
Detect data corruption with 99.5% accuracy with intelligent recovery
Isolated & Available
CyberSense secured inside the vault to ensure analytics are available
Identify Malware
Scan signatures of all vaulted data
Identify Anomalies
UDA across primary data backups
Integrated Backup App
Quarantine to avoid reinfestation
Remove from Backups
Remove from primary backups to eliminate future risk
Unusual Data Activity Anomalies are part of a comprehensive MDR strategy
Copyright © Dell Inc. All Rights Reserved.
9
Internal Use - Confidential
Anomaly Detection with PowerProtect Data Manager
Identify cyber threats in your production backup environment
DATA CENTER
(on-premises)
Production
Workloads
PowerProtect
Data Manager
Cyber Resiliency
Copyright © Dell Inc. All Rights Reserved.
10
Internal Use - Confidential
Complementary Capability
PPDM
Anomaly Detection
Prod / DR
2 Copy Message
Integrated with PPDM
Meta-data
Not isolated (running in production)
PPDM Only support
(File, Virtual)
Vault
3 Copy Message
Integrated with PPCR
Full Content
Yes, isolated (intrinsic isolation in vault)
Heterogenous BU SW support
(File, NAS, Virtual, DB)
Messaging Alignment
Workflow Integration
Analysis Level
Isolated & Availability
Backup App & Workload Support
CyberSense
Analytics
Copyright © Dell Inc. All Rights Reserved.
11
Internal Use - Confidential
Why CyberSense - Isolated
Production
Storage & Backup
Connected
Outside Blast Radius
Blast Radius
CyberSense is isolated and available to help with incident response and recovery.
Vault CyberSense
Isolated
Copyright © Dell Inc. All Rights Reserved.
12
Internal Use - Confidential
Why CyberSense - Accuracy
ESG Validated: 99.99% SLA in Detecting Ransomware Corruption1
1 Source: https://indexengines.com/esgvalidation
Copyright © Dell Inc. All Rights Reserved.
13
Internal Use - Confidential
Why CyberSense – Raw Disk Attack
Raw Disk Attack prevents access to VM file system.
Copyright © Dell Inc. All Rights Reserved.
14
Internal Use - Confidential
MITRE ATT&CK Alignment – RawDisk
RawDisk
Source1: https://attack.mitre.org/techniques/T1486/
Source2 https://attack.mitre.org/software/S0364/ - (Image)
Copyright © Dell Inc. All Rights Reserved.
15
Internal Use - Confidential
Why CyberSense - Data Integrity
CyberSense validates the integrity of the data.
Copyright © Dell Inc. All Rights Reserved.
16
Internal Use - Confidential
Why CyberSense - Accelerate Post Attack Forensics
CyberSense helps identify what to eradicate
Copyright © Dell Inc. All Rights Reserved.
17
Internal Use - Confidential
Why CyberSense - Smart Recovery
CyberSense accelerates incident response and recovery.
Copyright © Dell Inc. All Rights Reserved.
18
Internal Use - Confidential
Why CyberSense – Broad Heterogenous Support
CyberSense supports a variety of backup software providers and workloads
Copyright © Dell Inc. All Rights Reserved.
19
Internal Use - Confidential
Complementary Anomaly Detection
Vault
Cyber
Analytics
Production Backup
Integrated
Trusted Accuracy
99.99% SLA in Detecting Ransomware Corruption
Isolated & Available
CyberSense secured inside the vault to ensure analytics are available
Post Attack Forensics
Identify Malware via signatures and YARA rules
Included Light Weight Anomaly Detection
Detection of anomalies from backup
Integrated Backup App
Quarantine to avoid reinfestation
Remove from primary backups to eliminate future risk
Broad Support
Heterogenous backup software and extensive workload coverage (including databases)
Smart Recovery
Know what is trusted to accelerate recovery
Data Integrity
AI based machine learning validates data integrity
Detection Techniques
Pattern and Behavioral Analysis
Identify suspicious names, paths, exts. Evaluate mod/create time
System Configuration Analysis
Windows systems, e.g. disabled firewalls, User Account Control settings. 20 known settings
Ransomware Detection
Extensive library comprising over 5,000 patterns
Comprehensive Strategy Strengthens Data Resiliency
Copyright © Dell Inc. All Rights Reserved.
20
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
21
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
22
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
23
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
24
Internal Use - Confidential
PowerProtect Data Manager Anomaly Detection - Techniques
Pattern Matching
Behavioral Analysis
System Configuration
Copyright © Dell Inc. All Rights Reserved.
25
Internal Use - Confidential
MITRE ATT&CK Alignment - UAC
User Account Control
Source1: https://attack.mitre.org/techniques/T1548/002/
Source2: https://attack.mitre.org/mitigations/M1052/ - (Image)
Copyright © Dell Inc. All Rights Reserved.
26
Internal Use - Confidential
MITRE ATT&CK Alignment – Impair Defenses
Windows Firewall Service
Source1: https://attack.mitre.org/techniques/T1562/004/
Source2 https://attack.mitre.org/datasources/DS0018/ - (Image)
Copyright © Dell Inc. All Rights Reserved.
27
Internal Use - Confidential
Anomaly Detection shall be used Everywhere
Helps achieve comprehensive cyber resiliency
100%
All companiesshould have PowerProtect
Anomaly Detection
Who shall implement Anomaly Detection?
Included with PPDM price!
Copyright © Dell Inc. All Rights Reserved.
28
Copyright © Dell Inc. All Rights Reserved.
28
Internal Use - Confidential
PowerProtect Data Manager Anomaly Detection Demo
Copyright © Dell Inc. All Rights Reserved.
29
Internal Use - Confidential
Anomaly Detection Prerequisites
Search Cluster should be configured and active
Indexing must be enabled in protection policy
PowerProtect Search Engine Requirements
Copyright © Dell Inc. All Rights Reserved.
30
Internal Use - Confidential
Enhancements
Augmented Detection
Visibility and Reporting
Workflow Enhancements
2
Identify anomalies before they escalate….
5
4
3
1
Copyright © Dell Inc. All Rights Reserved.
31
Internal Use - Confidential
Source:�https://dell.sabacloud.com/Saba/Web_spf/PRODTNT091/app/me/learningeventdetail/cours000000000478720?regId=regdw000000070318146&context=user&learnerId=emplo000000000811143&returnurl=catalog%2Fsearch%3FsearchText%3D19.18%2526selectedTab%3DLEARNINGEVENT%2526referrer%3Dtrue%2526filter%3D%7B%7D
Copyright © Dell Inc. All Rights Reserved.
32
Internal Use - Confidential
https://dell.sharepoint.com/:p:/r/sites/dpd-advanced-customer-eng/_layouts/15/Doc.aspx?sourcedoc=%7B56D789F0-C96B-49D7-94CA-00E2DFFF6FD4%7D&file=PPDM%2019.18_Anomaly%20Detection_Technical%20Deck.pptx&wdLOR=c99D19186-5FE6-4C20-93B3-61C1F32D92CA&action=edit&mobileredirect=true
Copyright © Dell Inc. All Rights Reserved.
33
Internal Use - Confidential
Critical
- find anomalies
Warning
- conifuration mismatch
Verified Saved
- user analized the message and said – this is fine, this is not anomaly for me
Copyright © Dell Inc. All Rights Reserved.
34
Internal Use - Confidential
Anomaly detection requires Indexing to be turned on
Copyright © Dell Inc. All Rights Reserved.
35
Internal Use - Confidential
Tech Preview Label – Protection Policy Enable
© Copyright 2021 Dell Inc.
36
of 97
© Copyright 2020 Dell Inc.
36
of Y
Internal Use - Confidential
Anomaly Detection activity – Job Group
Copyright © Dell Inc. All Rights Reserved.
37
Internal Use - Confidential
Anomaly Detection activity – Job Details without anomalies
© Copyright 2021 Dell Inc.
38
of 97
© Copyright 2020 Dell Inc.
38
of Y
Internal Use - Confidential
Anomaly Detection activity – Job Details with anomalies
Anomaly Summary
Example 01
Copyright © Dell Inc. All Rights Reserved.
39
Internal Use - Confidential
Anomaly Detection – Jobs View with Anomalies Cont.
Note: If “Protect” or “Index” job is failed/cancelled, Anomaly Detection Job is marked as Skipped.
Example 02
© Copyright 2021 Dell Inc.
40
of 97
© Copyright 2020 Dell Inc.
40
of Y
Internal Use - Confidential
Tech Preview Label – Critical Alerts
© Copyright 2021 Dell Inc.
41
of 97
© Copyright 2020 Dell Inc.
41
of Y
Internal Use - Confidential
Anomaly Detection –Warning Alerts
© Copyright 2021 Dell Inc.
42
of 97
© Copyright 2020 Dell Inc.
42
of Y
Internal Use - Confidential
Tech Preview – Copy Management
© Copyright 2021 Dell Inc.
43
of 97
© Copyright 2020 Dell Inc.
43
of Y
Internal Use - Confidential
Anomaly Detection results – Copy Management
Copyright © Dell Inc. All Rights Reserved.
44
Internal Use - Confidential
Anomaly Detection Report
Download is progress
Download completed
Export successfully complered
Copyright © Dell Inc. All Rights Reserved.
45
Internal Use - Confidential
Anomaly Detection Results – Report Download
Copyright © Dell Inc. All Rights Reserved.
46
Internal Use - Confidential
Anomaly Detection results – Status changes and notes
Copyright © Dell Inc. All Rights Reserved.
47
Internal Use - Confidential
Feature Feedback
Copyright © Dell Inc. All Rights Reserved.
48
Tech Preview Label – Protection Policy Enable
Copyright © Dell Inc. All Rights Reserved.
49
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
50
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
51
Internal Use - Confidential
There are 3 jobs if anomaly detection is started:
- protection
- indexing
- anomaly detection
Copyright © Dell Inc. All Rights Reserved.
52
Internal Use - Confidential
Succesful anomaly detection jobs does not say anything about checking that everything is OK
It only says that the job finished fine.
Copyright © Dell Inc. All Rights Reserved.
53
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
54
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
55
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
56
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
57
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
58
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
59
Internal Use - Confidential
If files were deleted intentionally we can skip the message
Warning marks the copy as clean
Copyright © Dell Inc. All Rights Reserved.
60
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
61
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
62
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
63
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
64
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
65
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
66
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
67
Internal Use - Confidential
Suspicious is only for Critical anomaly
Copyright © Dell Inc. All Rights Reserved.
68
Internal Use - Confidential
Clicking here starts downloading report files
Copyright © Dell Inc. All Rights Reserved.
69
Internal Use - Confidential
SuspectedFiles
Copyright © Dell Inc. All Rights Reserved.
70
Internal Use - Confidential
After analyzing the report we can mark the copy as Safe or Qurantine
Copyright © Dell Inc. All Rights Reserved.
71
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
72
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
73
Internal Use - Confidential
End logo slide
Questions…
Copyright © Dell Inc. All Rights Reserved.
74
Internal Use - Confidential