Skip to content

BitNomad17/Azure-Sentinel-Monitoring

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 

Repository files navigation

Azure-Sentinel-Monitoring

Microsoft Sentinel + Log Analytics demo lab for security monitoring, KQL detections and incident workflows.

Azure Sentinel Monitoring – Demo Lab

This repository contains sample Kusto Query Language (KQL) queries and a reference workflow for building a basic security monitoring lab using Microsoft Sentinel and Azure Log Analytics.

The goal is to demonstrate how to:

  • Ingest Azure AD and Azure Activity data into a Log Analytics workspace
  • Enable Microsoft Sentinel
  • Create analytics rules using KQL
  • Investigate suspicious sign-ins and privilege escalations

Architecture Overview

High-level flow:

  1. Azure resources send logs to Log Analytics workspace
  2. Microsoft Sentinel is enabled on that workspace
  3. Sentinel uses KQL queries to detect:
    • Sign-in anomalies
    • High-privilege role assignments
  4. Incidents are created in Sentinel for security investigation

You can later extend this with:

  • Logic Apps playbooks (SOAR)
  • Workbooks and dashboards
  • Alerts integration with email, Teams, ITSM

Prerequisites

  • Azure subscription
  • Log Analytics workspace
  • Microsoft Sentinel enabled on the workspace
  • Data connectors configured for:
    • Azure Active Directory sign-in logs
    • Azure Active Directory audit logs
    • Azure Activity

How to Use the Queries

  1. Open the Azure portal and go to Microsoft Sentinel.
  2. Select your Sentinel-enabled workspace.
  3. Go to Logs.
  4. Open the queries folder in this repo.
  5. Copy the contents of .kql files and paste into the Log query window.
  6. Run the query and verify the results.
  7. Convert validated queries into Scheduled analytics rules:
    • Sentinel → Analytics → + Create → Scheduled query rule
    • Set frequency and lookback period
    • Configure incident creation and severity

Files

queries/signin-anomalies.kql

Detects suspicious sign-in activity such as:

  • Multiple failed sign-ins
  • Sign-ins from multiple countries in a short period
  • Sign-ins from high-risk countries

queries/privilege-escalation.kql

Detects privileged role assignments such as:

  • Global Administrator
  • Privileged Role Administrator
  • User Access Administrator
  • Security Administrator

Future Ideas

  • Add Logic Apps playbooks to:
    • Disable user on confirmed compromise
    • Notify security team via email or Teams
  • Build a Sentinel workbook with:
    • Failed sign-in trends
    • High-risk IP addresses
    • Admin role changes over time

This lab is for learning and demonstration. Always tune detections for your environment before production use.

Demo Status

This lab has been tested in a personal Azure subscription with:

  • Azure AD sign-in logs
  • Azure Activity logs
  • Microsoft Sentinel enabled on a single workspace

Screenshots

Below are sample screenshots (sourced from public Microsoft documentation/demo environments) that illustrate how Microsoft Sentinel visualizes logs, runs queries, and generates incidents.

🔹 Sentinel Overview Dashboard

Provides a high-level summary of alerts, incidents, events, and security trends. Sentinel Overview

🔹 Sentinel Incidents Page

Shows incidents generated by analytics rules, anomaly detections, and log-based alerts. Sentinel Incidents

🔹 KQL Query Execution (Logs Workspace)

KQL query results for sign-in anomalies and privilege escalations. KQL Query Results

🔹 Scheduled Analytics Rule (Query Rule)

How a custom KQL detection is operationalized into an automated rule. Analytics Rule

🔹 Azure Log Analytics – Query Results

Shows structured log events feeding into Sentinel analytics. Log Analytics Query

🔹 Workbook Dashboard Visualization

Sample dashboard visualizing trends and incidents using Sentinel Workbooks. Sentinel Workbook

About

Microsoft Sentinel + Log Analytics demo lab for security monitoring, KQL detections and incident workflows.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors