Midnight is a theme for GitHub Pages.
Platform: Microsoft Sentinel / Microsoft Defender XDR
Focus: Detection engineering, automation (SOAR), UEBA, and incident response
This lab demonstrates end-to-end SOC detection and response workflow in Microsoft Sentinel:
All activities were performed in a controlled, non-production environment.
Installed Sentinel SOAR Essentials to enable automation capabilities.

Created a playbook to automate incident response actions.

Configured connections and permissions required for playbook execution.

Created an automation rule to trigger the playbook upon incident creation.


Created a scheduled query rule to detect suspicious activity.

Verified that the rule is active and running.

Enabled User and Entity Behaviour Analytics to enhance detection capability.

Confirmed that UEBA-related analytic rules are enabled.

Simulated persistence via registry modification.

Simulated user creation and privilege escalation activity.

Simulated DNS-based C2 communication.

Developed a query to detect registry-based persistence.

Created an analytic rule based on the persistence detection query.


Developed a query to detect group membership changes.

Created detection rule to alert on privilege escalation activity.

Reviewed generated incidents in Microsoft Defender portal.

Executed playbook on selected incident.

Created investigation task within the incident.

Updated incident status to resolved after investigation.

This lab demonstrates a complete SOC workflow:
All activities were performed in a controlled lab environment using simulated attack scenarios.