Azure: Deployment Guide

Document created by RSA Information Design and Development on Aug 4, 2017
Version 1Show Document
  • View in full screen mode
  

Before you can deploy Security Analytics in Azure you need to:

  • Understand the requirements of your enterprise.
  • Know the scope of a Security Analytics deployment.

When you are ready to begin deployment:

  • Make sure that you have a Security Analytics"Throughput" license.
  • Use Chrome for your browser (Internet Explorer is not supported).

Azure Environment Recommendations

Azure instances have the same functionality as the Security Analytics hardware hosts. RSA recommends that you perform the following tasks when you set up your Azure environment.

  • Based on the resource requirements of the different components, follow best practices to use the system and dedicated storage appropriately.
  • Build Concentrator directory for index database on SSD.

Abbreviations and Other Terminology Used in this Guide

                                                                                       
AbbreviationsDescription
AzureAzure is Microsoft's public cloud computing platform. It provides a range of cloud services, including those for compute, analytics, storage and networking. You can pick and choose from these services to develop and scale new applications, or run existing applications, in the public cloud.

BYOL

Bring your own licensing

CPUCentral Processing Unit
EPSEvents Per Second
GBGigabyte. 1GB = 1,000,000,000 bytes
GbGigbit. 1Gb = 1,000,000,000 bits.
GbpsGigabits per second or billions of bits per second. It measures bandwidth on a digital data transmission medium such as optical fiber.
GHzGigaHertz 1 GHz = 1,000,000,000 Hz
HDDHard Disk Drive
IOPSInput/Output Operations Per Second
MbpsMegabits per second or millions of bits per second. It measures bandwidth on a digital data transmission medium such as optical fiber.
On-PremiseOn-premise hosts are installed and run on computers on the premises (in the building) of the organization using the hosts, rather than in the Azure.
RAMRandom Access Memory (also known as memory)
Security Set of firewall rules. Refer to Deployment: Network Architecture and Ports (https://community.rsa.com/docs/DOC-74061) for a comprehensive list of the ports you must set up for all Security Analytics components.
SSD Solid-State Drive
vCPUVirtual Central Processing Unit (also known as a virtual processor)

VHD

Virtual Hard Disk

VMVirtual Machine
vRAMVirtual Random Access Memory. This is the memory for a virtual machine.

Azure Deployment Scenarios

The following diagrams illustrate some common Azure deployment scenarios. In the diagrams, the:

  • Log Decoder receives logs collected by the Log Collector. The Log Collector collects log events from hundreds of devices and event sources.
  • Concentrator indexes metadata extracted from network or log data and makes it available for enterprise-wide querying and real-time analytics while facilitating reporting and alerting.

  • Security Analytics Server hosts Incident Management, Reporting, Investigation, Live Content Management, Administration and other aspects of the user interface.

Full Security Analytics Stack Azure Visibility

This diagram shows all Security Analytics components (full stack) deployed in Azure.


Hybrid Deployment - Log Decoder

This diagram shows the Log Decoder and Archiver deployed in Azure with all other Security Analytics components deployed on your premises.

Supported Services

RSA provides the following Security Analytics services.

  • Security Analytics Server
  • Archiver
  • Broker
  • Concentrator
  • Event Stream Analysis
  • Log Decoder
  • Remote Log Collector

 

You are here
Table of Contents > Azure Deployment

Attachments

    Outcomes