Microsoft Advanced Threat Analytics Setup – Part 1

So as you may have seen recently Microsoft released their latest threat analytics product “Microsoft Advanced Threat Analytic’s” to the public. To get it you can visit the following link, login with a live ID and then register for the download.

Once you have the ISO image you are good to start setting up the system. For me quick demonstration environment I have the following:

  1. Firewall / Gateway Device
  2. Domain Controller running Windows Server 2012 R2, also configured as Certificate Root Authority
  3. Member Server running Windows Server 2012 R2 on which the ATA Center will be installed
  4. Member Server running Windows Server 2012 R2 on which the ATA Gateway will be installed
  5. Other member servers for SharePoint, SQL and a Client Workstation

To perform the installation we need to install the ATA Center, which is done on the Member Server. To ensure this works as expected it is best to have two IP addresses on the same subnet. The reason for this, is that the application uses port mirroring, and needs to assign one IP address to the ATA Center and then one to the IIS Service for the console.

For me my IP Addresses are:

ATA Center =

IIS Service =

Now we are ready to perform the installation. On the ISO, there is an application called “Microsoft ATA Center Setup“, simply click that to start the installation.

Next we can follow through the installation wizard,

Next we are presented with the configuration of IP Addresses and SSL Certificates along with locations.

For my environment I have already added a wildcard certificate into the ATA Center Server which was issued by the Root Certificate Authority for my domain. To select an existing certificate simply click the “key” icon and you are then presented with the currently installed certificates.

The installation will take care of all the needed components and roles that for the ATA Center.

During the installation, the server may require rebooting, you will be notified when this I needed.

NOTE: If you don’t want to have the reboot then Install KB2934520 on the ATA Center server and on the ATA Gateway servers before beginning installation.

After the restart, the wizard will continue with the installation automatically after login.

It should now complete successfully and you can then click the “Launch” button to enter the console.

When clicking to launch the console, it will be default, load the site by IP address over SSL. This means that your browser will complain about the certificate as it does match. You can live with this for testing but for production or if you are like you me, you may want to edit the IIS bindings for the console site to be tied to a URL that makes more sense. I created a local entry for and have associated that.

Typing the new URL will then load the console.

To login, use the same account that you used for installed the ATA Center, for me it was the Administrator account. This should get to the core site displaying an expiration message if you are using the trial.

Now we need to actually configure the platform, to do this we will need to access the configuration option from the menu at the top right.

We are then redirected to the “ATA Gateways” screen where we can connect the ATA Center to the domain using a specific account. I am using a domain user account called “ATA“.

It is important that you enter the complete FQDN of the domain where the user is located. For example, if the user’s account is in “” you need to enter “” not ““.

Once the credentials are saved the “Download ATA Gateway Setup” link becomes available. Download the files and then copy them to the server that will be dedicated to being a gateway.

In the next post we will look at installing and setting up the ATA Gateway.

Liam Cleary

Liam began his career as a Trainer of all things computer-related. He quickly realized that programming, breaking, and hacking was a lot more fun. He spent the next few years working within core infrastructure and security services until he found SharePoint. He is the founder and owner of SharePlicity, a consulting company that focuses on all areas of Technology. His role within SharePlicity is to help organizations implement technology that will enhance internal and external collaboration, document and records management, automate business processes, and of course security controls and protection. Liam also serves as the Principal Technology Advisor at Rencore, where he is helping to develop offerings that help organizations further understand and mitigate security and compliance risks, within SharePoint and Office 365 customization's. His core focus will is to identify, control, and protect whether they are full-fledged customization's or out-of-the-box Office 365 functionality. He is also a thirteen-time Microsoft MVP focusing on Architecture but also crosses the boundary into Development. He is also a Microsoft Certified Trainer (MCT). His specialty over the past few years has been security in SharePoint and its surrounding platforms. He can often be found at user groups or conferences speaking, offering advice, spending time in the community, teaching his kids how to code, raspberry PI programming, hacking the planet or building Lego robots.

You may also like...