Midnight theme

Midnight is a theme for GitHub Pages.


Project maintained by GiBoris Hosted on GitHub Pages — Theme by mattgraham

Lab 03 — Microsoft Sentinel Configuration & Data Connectors 🔎☁️

Platform: Microsoft Sentinel / Azure / Microsoft Defender
Focus: SIEM deployment, data ingestion, connectors, and log collection


Objective

This lab demonstrates hands-on experience with Microsoft Sentinel, focusing on:


Lab Environment

All activities were performed in a controlled, non-production environment.


Part 1 — Microsoft Sentinel Configuration

1.1 Sentinel Deployment

Deployed Microsoft Sentinel to an existing Log Analytics workspace.

1


1.2 Data Retention Configuration

Adjusted retention settings to control storage and align with monitoring requirements.

2


1.3 Watchlist Creation

Created a watchlist to support detection and enrichment of threat intelligence.

3


1.4 Watchlist Validation

Verified that the watchlist was successfully created and available for use.

4


1.5 Threat Indicator Creation

Created a threat indicator in Microsoft Defender portal.

5


1.6 Indicator Visibility in Sentinel

Confirmed that the indicator is accessible within Sentinel.

6


1.7 Log Search for Indicator

Performed log search to validate that the indicator is usable in detection scenarios.

7


1.8 Security Event Retention

Configured retention for the Security Event table.

8


Part 2 — Connecting Azure Data Sources

2.1 Defender for Cloud Solution Installation

Installed the Defender for Cloud solution from the Sentinel content hub.

9


2.2 Data Connector Enablement

Enabled the Defender for Cloud connector.

10


2.3 Azure Activity Connector Installation

Installed Azure Activity connector from Content Hub.

11


2.4 Connector Configuration

Configured Azure Activity data connector to ingest logs.

12


Part 3 — Connecting Windows Machine

3.1 Windows Security Events Setup

Configured Windows Security Events data collection.

13


3.2 Data Collection Rule Creation

Created a Data Collection Rule (DCR) for Windows logs.

14


3.3 DCR Validation

Verified that logs are successfully collected.

15


Part 4 — Connecting Linux Host

4.1 Azure CLI Installation

Installed Azure CLI on Ubuntu VM.

16


4.2 Azure Arc Agent Deployment

Installed Azure Arc agent on Linux machine.

17


4.3 Host Connection

Connected Linux machine to Azure.

18


4.4 CEF Solution Installation

Installed Common Event Format (CEF) solution.

19


4.5 CEF Data Collection Rule

Created DCR for CEF logs.

20


4.6 Forwarder Installation (CEF)

Configured log forwarder on Linux host.

21


4.7 Syslog Solution Installation

Installed Syslog connector.

22


4.8 Syslog Data Collection Rule

Configured DCR for Syslog ingestion.

23


4.9 Forwarder Validation

Verified successful log forwarding.

24


Part 5 — Connecting Defender XDR

5.1 Defender Solution Installation

Installed Microsoft Defender solution via Sentinel.

25


5.2 Connector Status Validation

Verified connector status is “Connected”.

26


5.3 Workspace Integration

Confirmed workspace visibility in Defender portal.

27


Investigation Value

This configuration enables:


Skills Demonstrated


Disclaimer

All activities were performed in a controlled lab environment using simulated data.