NDR: Virtual Sensor Deployment (Azure)

Description

CAUTION: The examples below are intended to be serve as general guidelines. Your platform or software version may differ, resulting in variations in images, screens, options, or other elements.  

  • This guide is intended to serve as an example only. Users must modify applicable details, such as IP addresses, subnets, and device names, to align with their specific environment.
  • Exercise caution when making changes to your firewall or environment, as unplanned modifications can result in downtime, depending on the complexity of the configuration and infrastructure.
  • Your experience may vary if you are using a different software version or a product from another brand or manufacturer. Please note that you are solely responsible for the configuration and management of your devices.

1. Preparing

The Azure instance types in the az create commands in the procedure below use the instance types listed below:

Keep in mind that these are example instance types that meet the requirements stated in the Virtual Appliance Sizing Specifications section. You can select other instance types with the necessary vCPUs and RAM to perform your expected workload, as stated in the system requirements.

  • Network Traffic – Standard_B12ms
  • Sandbox and IDS Enabled – Standard_F16s_v2

To prepare for the installation:

  1. Open firewall ports for log ingestion.
  2. Open firewall ports for Network Traffic, Sandbox, and IDS features, as necessary.
  3. Reply to your NDR integration ticket to have the sensor images deployed in your region.
    1. You will need to provide the Azure region for the sensors your are installing.
    2. Do this at least 3-5 business days before installing, so that there is enough time to deploy the images to your region.

Current Azure Sensor Versions

The current sensor versions for Azure deployments are as follows:

  • Modular Sensor – 5.3.0

2. Authorizing the Stellar Cyber Software Images

You must authorize the Stellar Cyber software images so that they are available in the Azure portal:

  1. Log in to your Azure portal at https://portal.azure.com/.
  2. Click the hamburger menu at the upper left and select the entry for Microsoft Entra ID.

image-20250324-152504.png

Your Microsoft Entra Overview page appears.

  1. Scroll down and click Properties.

image-20250324-152512.png

The Properties page appears.

  1. Copy the value shown for Tenant ID. You need this for the next step and also when creating the VM, so keep it handy.

image-20250324-152519.png

  1. Put your Tenant ID in the following URL and paste it in your browser:

https://login.microsoftonline.com/<tenant id>/oauth2/authorize?client_id=58238038-43b4-4446-8260-0fa97ace1085&response_type=code&redirect_uri=https%3A%2F%2Fwww.microsoft.com%2F

The Permissions requested message appears.

  1. Click Consent on behalf of your organization.

image-20250324-152525.png

  1. Click Accept.
  2. Click Enterprise Applications.

image-20250324-152533.png

The Enterprise applications | All applications page appears.

  1. Search for Stellar. The Stellar Cyber applications that you authorized appear.

image-20250324-152539.png

If you don't see any Stellar Cyber applications, contact Stellar Cyber support.

  1. You can either create a new Resource Group for the deployment or deploy into an existing group. Use this step to create a new Resource Group. Otherwise, you can skip to the next step.
    1. Click Resource Groups.

image-20250324-152547.png

The Resource groups page appears.

image-20250324-152553.png

  1. Click Add. The Create a resource group page appears.

image-20250324-152558.png

  1. Choose your Subscription.
  2. Enter the name of your group in the Resource group field.
  3. Choose the Region where you want to deploy the resource.
  4. Click Review create.
  5. Click Create. The resource group is created and the Resource groups page appears.
  1. Click the name of the resource group where you want to deploy the sensor. This is either the resource group you just created or an existing resource group.

image-20250324-152604.png

The group details appear.

  1. Click Access control (IAM).

image-20250324-152611.png

The Access control (IAM) page appears.

  1. Click Add role assignments to display the Add role assignment controls.

image-20250324-152617.png

  1. Click on Privileged administrator roles and choose the Contributor option, as illustrated below:

image-20250324-152622.png

  1. Leave the default selection of User, group, or service principal in the Assign access to drop-down.
  2. Enter Stellar in the Select field. The available Stellar Cyber software packages appear.
  3. Choose Stellar Cyber Software Packages.
  4. Click Save. The Resource groups page appears again.
  5. Click Home. The Azure services page appears.

image-20250324-152628.png

  1. Click Subscriptions. The Subscriptions page appears.

image-20250324-152634.png

  1. Choose your subscription. The subscription details appear.
  2. Click Resource providers.

image-20250324-152639.png

The Resource providers page appears.

  1. Select Microsoft.Network.
  2. Click Register.
  3. Select Microsoft.Compute.
  4. Click Register.
  5. Click Cloud Shell.

image-20250324-152647.png

A PowerShell windows opens and connects.

  1. Enter the following 3 commands to get an access token from the Stellar Cyber Azure portal:

az account clear

az login --service-principal -u '58238038-43b4-4446-8260-0fa97ace1085' -p '3238Q~KMtVAIyuC6gDVMhboKEW7w6W~bXYQhFcZx' --tenant '2f580e30-1cc1-4c08-9e80-704999508e1a'

az account get-access-token

  1. Enter the following commands to get the access token from your tenant ID. Replace Tenant ID with the value you copied earlier.

Make sure you use your Tenant ID, copied from your Azure Portal, as described in this step.

az login --service-principal -u '58238038-43b4-4446-8260-0fa97ace1085' -p '3238Q~KMtVAIyuC6gDVMhboKEW7w6W~bXYQhFcZx' --tenant '<Tenant ID>'

az account get-access-token

  1. If you have multiple Azure subscriptions, use the az account list --output table command to make sure that the subscription where you want to deploy the sensor is currently the default. For example:

PS /home/j> az account list --output table

Name              CloudName    SubscriptionId                        State    IsDefault

Pay-As-You-Go     AzureCloud   xxxxxxxx-f477-4f2d-94bc-35c00d3d5fd8  Enabled  False

Subscription-Dev  AzureCloud   xxxxxxxx-ac50-4d82-a6ea-a14db86f3957  Enabled  True

Subscription-QA   AzureCloud   xxxxxxxx-9114-4cb0-a044-7e01f074575c  Enabled  False

In this example, Subscription-Dev has IsDefault set to True and is where the deployment will take place. You can change the default subscription with the az account set --subscription <subscription> command. Let's change the default subscription to Subscription-QA:

PS /home/j> az account set --subscription xxxxxxxx-9114-4cb0-a044-7e01f074575c

PS /home/j> az account list --output table

Name              CloudName    SubscriptionId                        State    IsDefault

Pay-As-You-Go     AzureCloud   xxxxxxxx-f477-4f2d-94bc-35c00d3d5fd8  Enabled  False

Subscription-Dev  AzureCloud   xxxxxxxx-ac50-4d82-a6ea-a14db86f3957  Enabled  False

Subscription-QA   AzureCloud   xxxxxxxx-9114-4cb0-a044-7e01f074575c  Enabled  True

After changing the default subscription, the sensor will now be deployed in Subscription-QA.

  1. Create a sensor VM.

This command points to the most recent sensor image. You can install different versions by changing the version number in the command below.

Keep in mind that these commands use an instance type that meets the system requirements, including SSD storage. You can specify a different instance type with sufficient vCPUs and RAM to handle your expected workload while making sure to observe all system requirements.

Note that any resources you specify in the az vm create command must already exist in the same resource group where you are creating the VM. This includes any values you supply for the resource-group, vnet-name, subnet, subnet-address-prefix, and nsg arguments.

You can also use variables to pass values for the parameters in the az vm create command. Refer to Using Shell Variables to Create the Sensor VM for details.

Enter the following command to create a modular sensor VM. Replace <resource-group> with an existing resource group in your deployment and  <version> with the version of software you want to install (for example, 5.3.0:

az vm create --size Standard_B12ms --resource-group <resource-group> --name StellarModularSensor --image "/subscriptions/0e28f851-f477-4f2d-94bc-35c00d3d5fd8/resourceGroups/Stellar/providers/Microsoft.Compute/galleries/StellarCyberSoftwares/images/Stellar-ModularSensor/versions/<version>" --admin-username azureuser --admin-password P@ssw0rd#2022 --storage-sku StandardSSD_LRS --os-disk-size-gb 128

Note that you can optionally specify the virtual network, subnet, and network security group to be used by the VM by including the --vnet-name, --subnet, and --nsg arguments. The resources you specify must exist in the same resource group where you are creating the VM. For example, for a modular sensor:

az vm create --size Standard_B12ms --resource-group <resource-group> --name StellarModularSensor --nsg <network-security-group> --vnet-name <vnet-name> --subnet <subnet-name> --subnet-address-prefix <subnet-cidr> --image "/subscriptions/0e28f851-f477-4f2d-94bc-35c00d3d5fd8/resourceGroups/Stellar/providers/Microsoft.Compute/galleries/StellarCyberSoftwares/images/Stellar-ModularSensor/versions/<version>" --admin-username azureuser --admin-password P@ssw0rd#2022 --storage-sku StandardSSD_LRS --os-disk-size-gb 128

You can also install the sensor without a public IP address by including the --public-ip address "" argument. For example, here's the same command from above with the --public-ip address "" argument included:

az vm create --size Standard_B12ms --resource-group <resource-group> --name StellarModularSensor --nsg <network-security-group> --vnet-name <vnet-name> --subnet <subnet-name> --subnet-address-prefix <subnet-cidr> --public-ip address "" --image "/subscriptions/0e28f851-f477-4f2d-94bc-35c00d3d5fd8/resourceGroups/Stellar/providers/Microsoft.Compute/galleries/StellarCyberSoftwares/images/Stellar-ModularSensor/versions/<version>" --admin-username azureuser --admin-password P@ssw0rd#2022 --storage-sku StandardSSD_LRS --os-disk-size-gb 128

  1. Create inbound security groups for the sensor using the commands below, replacing <resource-group> with the name of your resource group and <NSG NAME> with the name of your network security group

Enter the following command for a modular sensor:

az network nsg rule create -g <resource-group> --nsg-name <NSG NAME> -n StellarPort1 --direction Inbound --protocol Udp --destination-port-ranges 8472 --priority 500

3. Using Shell Variables to Create the Sensor VM

The az vm create commands in the examples above all specify values for parameters directly in the command. As an alternative, you can also declare shell variables for parameters you commonly reuse and include them in the az vm create command as part of a script.

The same rules for parameters included in an az vm create command also apply when passing variables in a script:

  • The specified resource-group must already exist.
  • Any values you supply for the vnet-name, subnet, subnet-address-prefix, and nsg arguments must exist in the specified resource group.

The example below starts by defining values for many of the parameters in the az vm create command before reading them in as part of the command:

#PowerShell script

#Assign values to variables

$RESOURCE_GROUP="<MyResourceGroup>"

$VM_NAME="<MyVM>"

$VNET_NAME="<MyVNet>"

$SUBNET_NAME="<MySubnet>"

$SUBNET_PREFIX=”<x.x.x.x/x>”

$NSG_NAME=””<MyNSG>”

$IMAGE=”/subscriptions/0e28f851-f477-4f2d-94bc-35c00d3d5fd8/resourceGroups/Stellar/providers/Microsoft.Compute/galleries/StellarCyberSoftwares/images/Stellar-ModularSensor/versions/<version>”

$ADMIN_USERNAME="azureuser"

$ADMIN_PASSWORD="P@ssw0rd#2022"

 

#Create Modular Sensor VM using variable values

az vm create --size Standard_B12ms --resource-group $RESOURCE_GROUP --name $VM_NAME --vnet-name $VNET_NAME --subnet $SUBNET_NAME --subnet-address-prefix $SUBNET_PREFIX --nsg $NSG_NAME --image $IMAGE --admin-username $ADMIN_USERNAME --admin-password $ADMIN_PASSWORD --storage-sku StandardSSD_LRS --os-disk-size-gb 128

Refer to this article on Microsoft Learn for more information on using variables in the Azure CLI.


4. Connecting the Sensor to the Stellar Cyber Platform

To connect the sensor to the Stellar Cyber Platform:

  1. Log in to your new sensor. The default username/password is aella/changeme. You are immediately prompted to change the password.
  2. Change the password.
    1. After you change the password, your session closes automatically. When you log back in with your new credentials, the prompt changes to DataSensor>.
  3. Set the host name. The host name is displayed in Stellar Cyber and should be unique for each sensor:
    1. set hostname <new hostname>
  4. Assign the tenant
    1. The Tenant ID was provided in the ticket.
    2. set tenant_id <Tenant ID from Stellar Cyber>
  5. Use the set cm command to specify the hostname to reach the management interface of the Data Processor.
    1. When specifying a hostname, the system attempts to verify the hostname with the DNS server. If the DNS server is not reachable, the system reports the error and lets you either proceed with the configured hostname or quit.
    2. <Applicable CM URL from below>
      1. NOAM Console: cm-solutionsgrantedinc.stellarcyber.cloud
      2. EMEA Console: cm-emea-snwl.stellarcyber.cloud
  6. Verify with the show cm command. You should see the IP address of the DP listed as the CM Controller and the Status should be Established.
  7. Log out with the quit command.

5. Sensor Authorization

Once complete, please reply to your engineer’s email with the following information so we can confirm that we are seeing the sensor and authorize it.

Sensor Details

  • Sensor Hostname
  • Sensor IP Address

Related Articles

  • NDR: Supported Firewalls & Sensor Options
    Read More
  • NDR: Virtual Sensor Deployment (VMware)
    Read More
  • NDR: Virtual Sensor Deployment (OCI)
    Read More
not finding your answers?
was this article helpful?