This project simulates a real-world Security Operations Center (SOC) workflow using Microsoft Sentinel. The lab focuses on detecting, investigating, and responding to suspicious authentication activity using Entra ID sign-in logs and custom detection logic.
The objective is to demonstrate hands-on experience with SIEM configuration, log analysis, threat detection, and incident response in a cloud-based security environment.
- Deploy and configure Microsoft Sentinel
- Connect and ingest Entra ID sign-in logs
- Simulate suspicious authentication activity
- Develop custom detection rules using KQL
- Investigate security incidents within Sentinel
- Document findings using SOC-style reporting
- Map activity to MITRE ATT&CK techniques
| Component | Technology |
|---|---|
| SIEM | Microsoft Sentinel |
| Log Storage | Azure Log Analytics Workspace |
| Identity Source | Microsoft Entra ID |
| Cloud Platform | Microsoft Azure |
| Query Language | Kusto Query Language (KQL) |
- Created an Azure Log Analytics Workspace
- Deployed Microsoft Sentinel
- Connected Entra ID data connector to ingest sign-in logs
- Generated simulated authentication activity
- Created detection rules using KQL
- Investigated triggered incidents in Sentinel
Architecture diagram available in: /architecture/
The following behaviors were generated to simulate potential malicious activity:
- Multiple failed login attempts (brute-force simulation)
- Successful login following repeated failures
- Authentication attempts from different geographic locations
- Suspicious IP address activity
Simulation steps documented in: /attack-simulation/
Custom detection logic was created using KQL to identify suspicious patterns.
SigninLogs
| where ResultType != 0
| summarize FailedAttempts = count() by UserPrincipalName, IPAddress
| where FailedAttempts > 5
| Folder | Description |
|---|---|
architecture/ |
Environment design and architecture diagrams |
data-sources/ |
Log ingestion configuration and connector validation |
attack-simulation/ |
Steps used to generate simulated suspicious activity |
detections/ |
KQL queries and detection rule configuration |
incidents/ |
Incident investigation reports and analysis |
evidence/ |
Screenshots and supporting investigation artifacts |