Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update and rename another-page.md to soc.md #176

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 0 additions & 9 deletions another-page.md

This file was deleted.

61 changes: 61 additions & 0 deletions soc.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,61 @@
---
layout: default
---

# Creating My Own SOC Using Microsoft Azure

I created my own Security Operations Center (SOC) by deploying my own SIEM that monitors and generates alerts for all of the devices in my personal home business lab.

I also set up a threat intelligence feed that sends our SIEM commonly seen and newly found indicators of comprimise.


## Setting Up The Virtual Machine

First, I set up a Virtual Machine (VM) so I can monitor it's traffic flow.

![VM](1.png)

When setting up the VM, I opened it to port 3389 (RDP), an insecure port, so I could test the application in a timely manner.

![RDP](2.png)


## Setting Up The SIEM

Next, I launched my own Microsoft Sentinel as my SIEM.

![Sentinel](3.png)

Then, I added the event logs from the VM I created to my newly deployed SIEM using a data connector.

![DataConnectors](4.png)

Finally, I set up a rule that checks for successful sign-ins via RDP (brute force attacks) using the following code.

```js
SecurityEvent
|where Activity contains "success" and Account contains "system"
```


## Results

After letting the system run for a while, these were the results/ proof that the SIEM is working as intended.

![Incidents](5.png)

![Events](6.png)


## Conclusion

After testing the system and verifying that it works, I turned off port 3389 and switched to the secure port 443.

![3389](7.png)

![443](8.png)

And with that I have successfully created my own SOC and secured my system using the information the SOC provided.


[back](./)