Skip to content

TimSturgis/Azure-SIEM-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 

Repository files navigation

Azure SIEM Lab

Description

In this lab, I create a resource group in Azure containing a Windows virtual machine, setup Microsoft Sentinel (SIEM) and create a Log Analytics Workspace to capture event logs from the Windows endpoint. I then configure alerts to be triggered when login attempts are successful and demonstrate the incident.

Services and Utilities Used

  • Microsoft Sentinel
  • Azure Virtual Machine
  • Log Analytics Workspace

Project walk-through:

First I created a resource group in Azure and spun up a virtual machine (VM) running Windows 11 Pro to act as an endpoint.
VM created



Network settings were configured to allow remote desktop protocol (RDP) on port 3389 to remain open. This would usually not be a secure setting but is done here for test and demonstration purposes.

RDP open




I then deployed Microsoft Sentinel as a cloud native security information and event management (SIEM) tool and added it to the Log Analytics Workspace.

Sentinal spun up


Add Sentinal to LAW


Next, I needed to send the Windows event logs from the VM endpoint to Log Analytics Workspace to be able to manage the log data in Sentinel. To do this, I set up a data connector (Azure Monitor Agent).

install Azure Monitor Agent from content hub



connected and adding events to sentinal



I then configured a data connection rule. The rule uses a simple query to the log data that filters for activity that contains “success” to show all successful logins.

Query that shows all sign ins

The query was then modified to still contain “system” but not contain “system”, this is to avoid logging system account logins.

query for events that do not contain system account log ins

The data connection rule was then used to generate alerts when successful login events occur.

creating security alert based on the query

agan - creating the alert

Now, the successful login rule has been created and appears in the Analytics tab.

now analytics shows the new rule-successful log ins

To test and demonstrate the alert, I signed in to the endpoint using Remote Desktop Connection (RDP) to trigger an alert.

RDP sign in 1

RDP sign in

Here the alert was generated as an incident showing there was a successful login to the endpoint.

the incident

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published