Connor Panso

Questions or suggestions, note to cpanso at outlook dot com

Setting Up a Security Information and Event Management (SIEM) System Using Microsoft Sentinel

In this project, I’ll be setting up a Security Information and Event Management (SIEM) system that can monitor and generate alerts for endpoints, simulating a real-world environment. The best part is that I’ll be doing this for free using Azure trial credits.

Why I’m Building This Project

With over 95% of Fortune 500 companies utilizing Microsoft Azure, gaining a solid understanding of Azure services, specifically Microsoft Sentinel, is crucial for anyone looking to enhance their cybersecurity skills. This lab provides me with real-time security insights and the ability to detect security events, making it a valuable learning tool. As someone who is relatively new to Azure, I'm eager to explore what Sentinel has to offer. This aligns with my focus on strengthening my Blue Team skills, particularly in protecting endpoints and networks.

Getting Started: Setting Up Azure and Creating a Virtual Machine

As a first-time user of Azure, I signed up and received $200 in free credits. This amount is sufficient to set up and experiment within this lab environment.

Virtual Machine Setup Screenshot

Virtual Machine Setup Screenshot

Deploying Microsoft Sentinel

Configuring Data Collection and Monitoring

Monitoring and Analyzing Incidents

Incident Management Screenshot

Conclusion

Setting up this lab with Microsoft Sentinel in Azure has given me practical experience with cloud-based SIEM systems. This project not only helps me better understand Azure’s capabilities but also enhances my ability to detect and respond to security incidents effectively. The skills gained from this lab are directly applicable to real-world cybersecurity roles, making it a valuable addition to my professional toolkit.

With this foundational setup complete, I look forward to exploring more advanced features in Azure Sentinel, such as automating threat responses and integrating custom threat intelligence feeds.


Connor Panso