• About
  • Disclaimer
  • Privacy Policy
  • Contact
Sunday, June 15, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Computer Networking

Sentinel Lab Notes – 51 Safety

Md Sazzad Hossain by Md Sazzad Hossain
0
Sentinel Lab Notes – 51 Safety
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

You might also like

Addressing Vulnerabilities in Positioning, Navigation and Timing (PNT) Companies

Powering All Ethernet AI Networking

5G is Shifting Downstream to Enterprises


This submit is to report some key factors to arrange a Sentinel Lab

 

Information Sources

  • Digital Community (VNet)
  • Community Safety Group (NSG)
  • Digital Machines (2 home windows with 1 MS SQL DB, 1 linux)
  • Log Analytics Workspace
  • Azure Key Vault
  • Azure Storage Account
  • Microsoft Sentinel

Create Log Analytics Workspace and Sentinel

Create Log Analytics Workspace

Create Sentinel

Add watchlist in, which is used to generate geography map primarily based on IP

https://github.com/kphillip1/azure-soc-honeynet/blob/foremost/geoip-summarized.csv

Searchkey = community

Confirm it from Log analytics workspace: 

  • _GetWatchlist(“geoip”)
  • _GetWatchlist(“geoip”) | rely

be sure scope is the one you add the watchlist. 

Set up Microsoft Monitoring Agent for Log Analytics Workspace

Legacy manner: 

Obtain Home windows Agent 64b (Leagcy Log Analytics Agent) and set up it to your Home windows machine with Workspace ID and Key.

Confirm the set up on the native machine:

Azure Arc script is for use on the machine exterior of Azure setting. 

For those who instantly obtain the shopper to put in from Information Assortment Rule’s Assets web page:

You’re going to get an alert to say utilizing Home windows installer will not be supported on Azure VM. Use VM Extension as a substitute. 

Allow Logs for Digital Machine Monitoring

Microsoft Defender for Cloud

Go to Microsoft Defender for Cloud -> Administration -> Environments Settings

Select the subscription -> Analytics Workspace -> JYLogs

Create Information Assortment Guidelines:

For all occasions.

@subscription stage,

Click on on settings in earlier screenshot:

You can also edit configuraiton from earlier screenshot to configure Auto-provisioning configuraiton

@subscription stage

Allow steady export to Log Analytics workspace

Be certain logs exported to appropriate useful resource group and workspace.

Onboard Entra ID Logs

Entra ID – Monitoring – Diagnostic Settings

Looking from following tables in Log Analytics Workspace:

Onboard Monitor Logs

Monitor – Exercise Log – Export Exercise Logs

Ship to Log Analytics workspace:

Checking desk: AzureActivity

Storage Account – Monitoring – Diagnostic settings

Choose any of the sources to view diagnostic settings:

Create a circulate log 

choose goal useful resource and storage account

Allow Site visitors Analytics

Create Information Assortment Guidelines for Home windows & Llnux Servers

You would possibly wish to create an azure monitor workspace first

then you may ship all Home windows logs and Linux Logs to Azure Monitor Workspace

Add customized XPath queries:

Examples:

  • Utility!*[System[(Level=1 or Level=2 or Level=3 or Level=4 or Level=0)]]
  • Safety!*[System[(band(Keywords,13510798882111488))]]
  • System!*[System[(Level=1 or Level=2 or Level=3 or Level=4 or Level=0)]]

https://github.com/kphillip1/azure-soc-honeynet/blob/foremost/Xpath.txt

// Home windows Defender Malware Detection XPath Question

  • Microsoft-Home windows-Home windows Defender/Operational!*[System[(EventID=1116 or EventID=1117)]]

// Home windows Firewall Tampering Detection XPath Question

  • Microsoft-Home windows-Home windows Firewall With Superior Safety/Firewall!*[System[(EventID=2003)]]

Onboard Key Vault Logs

Key Vaults – > Monitoring -> Diagnostic settings

Verify desk: AzureDiagnostics

Movies

 

Like this:

Like Loading…

Associated

Submit navigation

Tags: LabNotesSecuritySentinel
Previous Post

Knowledge Scientist: From College to Work, Half I

Next Post

Response to Hearth Injury in Okeechobee, FL

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

Addressing Vulnerabilities in Positioning, Navigation and Timing (PNT) Companies
Computer Networking

Addressing Vulnerabilities in Positioning, Navigation and Timing (PNT) Companies

by Md Sazzad Hossain
June 14, 2025
Powering All Ethernet AI Networking
Computer Networking

Powering All Ethernet AI Networking

by Md Sazzad Hossain
June 14, 2025
5G is Shifting Downstream to Enterprises
Computer Networking

5G is Shifting Downstream to Enterprises

by Md Sazzad Hossain
June 14, 2025
That is Extending to GreenOps – IT Connection
Computer Networking

AWS Summit Sydney – Accelerating AI from Prospects to Manufacturing – IT Connection

by Md Sazzad Hossain
June 13, 2025
Is WiFi 7 Value It? Evaluating Early Wi-Fi 7 Adoption Advantages, Community Throughput & Extra.
Computer Networking

Is WiFi 7 Value It? Evaluating Early Wi-Fi 7 Adoption Advantages, Community Throughput & Extra.

by Md Sazzad Hossain
June 13, 2025
Next Post
Response to Hearth Injury in Okeechobee, FL

Response to Hearth Injury in Okeechobee, FL

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Structured-Then-Unstructured Pruning for Scalable MoE Pruning [Paper Reflection]

Structured-Then-Unstructured Pruning for Scalable MoE Pruning [Paper Reflection]

June 6, 2025
Remodeling Restoration: AI’s Influence on Operations by 2025

Remodeling Restoration: AI’s Influence on Operations by 2025

February 6, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

Ctrl-Crash: Ny teknik för realistisk simulering av bilolyckor på video

June 15, 2025
Addressing Vulnerabilities in Positioning, Navigation and Timing (PNT) Companies

Addressing Vulnerabilities in Positioning, Navigation and Timing (PNT) Companies

June 14, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In