The SIEM Lab project focused on creating a secure environment for simulating and analyzing cyber attacks using Azure Sentinel as a SIEM solution. The primary goal was to ingest and process logs, extract metadata, and generate insights to detect attack patterns. Through this hands-on experience, the project helped build a deeper understanding of network security, attack telemetry, and geolocation-based threat analysis.
- Advanced understanding of Azure Sentinel and SIEM implementation.
- Proficiency in PowerShell scripting for log extraction and manipulation.
- Expertise in configuring and analyzing network logs for geolocation data.
- Ability to map and visualize attack patterns based on geographic information.
- Enhanced critical thinking for real-world cyber threat detection and mitigation.
-
Azure Sentinel: Configured for log ingestion and visualization of attack data.
-
PowerShell: Used to develop scripts for extracting and manipulating metadata.
-
Log Analytics Workspace: Configured for custom log ingestion and field mapping.
-
Telemetry Generation: Created realistic attack data for analysis and testing.
-
Network Analysis Tools (e.g., Wireshark): Used to capture and analyze network traffic related to attacks.
-
Developed custom PowerShell scripts
Created scripts to extract metadata from the Windows Event Viewer logs. This metadata included crucial details such as event types, timestamps, and user activities, which were essential for understanding the system's state. -
Forwarded extracted metadata to third-party API
The metadata extracted from Event Viewer logs was sent to an external API for geolocation data enrichment. The API derived information such as latitude, longitude, state/province, and country based on the IP addresses found in the logs. -
Configured Log Analytics Workspace
Log Analytics Workspace was set up to ingest and process the custom logs containing geographic information. This involved configuring data inputs, creating custom fields, and mapping the enriched geolocation data. -
Created custom fields in Log Analytics Workspace
Developed custom fields within Log Analytics to map and display the geolocation data. These fields were used to visualize the geographic distribution of incoming data, allowing better analysis of attack origins. -
Configured an Azure Sentinel workbook
A custom workbook was created in Azure Sentinel to display brute force RDP attacks on a world map. This visualization provided a global view of attack sources and magnitudes, helping to identify regions with higher attack frequencies.