JTCyberTech / Cybersecurity-Home-Labs

5 stars 1 forks source link

Part 1: Setup Azure and VM #1

Open JTCyberTech opened 1 year ago

JTCyberTech commented 1 year ago

Description:

The project's initial phase entails the establishment of an Azure account, coupled with the activation of a free subscription. Subsequently, we proceed with the configuration of a Virtual Machine to fulfill the project's objectives. Initiate the process by establishing a log analytics workspace with concurrent log-gathering activation. Next, establish connectivity between the log analytic workspace and the virtual machine. To culminate the setup, configure Microsoft Sentinel to visualize the attack data and function as a Security Information and Event Management (SIEM) solution.

Creating an Azure Account

  1. Sign in or create a new account for Azure Trial.

    • You will have to put in your credit card information to get the trial subscription with $200 free credits.
  2. After the subscription is created, head to Azure Portal and select the account that has been associated with the trial subscription.

Creating a Virtual Machine

This is the machine that will be exposed to the attackers. (The Honeypot Machine)

  1. In Azure Portal search virtual machines and click it.

Search Bar - Virtual Machines

2. Create > Azure virtual machine

Create a Virtual Machine Page

3. Create a new resource group and name it: Lab-Honeypot

Create a new resource group

4. In the Basic tab - Change instance details: - Virtual machine name: honeypot-vm - Region: (US) West US 3 - Availability options: No infrastructure redundancy required - Security type: Standard - Image: Windows 10 Pro, version 22H2 - x64 Gen2 (free service eligible) - Size: Standard_B1s - 1 vcpu, 1 GiB memory ($7.59/month) (free service eligible) - Create your own username and password

Instance Details

5. Leave Disks tab as it is > Next Networking 6. In the Networking tab: - Change NIC network security group: Advanced - Configure network security group: create new - Delete the default inbound rule - Add an inbound rule: - Destination port ranges: * (meaning everything) - Priority: 100 - Name: DANGER

Create a new inbound rule

7. Click Review + create at the bottom left corner > create

Review + create

8. Successfully deploy a honeypot machine

Honeypot Machine Created

Creating a Log Analytics Workspace

1. In [Azure Portal](https://portal.azure.com/?quickstart=true#home) search bar, search: Log Analytics workspaces and click it > Create 2. In the Basic tab - Select Resource group and Change instance details: - Resource group: Lab-Honeypot - Name: law-honeypot - Region: West US 2

Create Log Analytics Workspace

3. Click Review + create at the bottom left corner > create 4. Successfully created a Log Analytics Workspace

Successfully created Log Analytics Workspace

Enable Log Gathering with Microsoft Defender for Cloud

1. In [Azure Portal](https://portal.azure.com/?quickstart=true#home) search bar, search: Microsoft Defender for Cloud 2. On the left side, Click on Environment settings under Management > click on Azure subscription 1 > law-honeypot

Navigating in Microsoft Defender for Cloud

3. Turn on Servers and leave SQL servers on the machine off > save

Settings | Defender Plans

4. Click on Data Collection on the left > Click on All events> save

Settings | Defender Collection

Connecting Log Analytics Workspace to the Virtual Machine

1. In [Azure Portal](https://portal.azure.com/?quickstart=true#home) search bar, search: Log Analytics workspaces 2. Click on law-honeypot > Scroll down on the left bar > click on Virtual machine (deprecated) under Classic

law-honeypot | Virtual machines (deprecated)

3. Click on connect

Successfully Connected our Log Analytics Workspace and VM (deprecated)

Setup Microsoft Sentinel

1. In [Azure Portal](https://portal.azure.com/?quickstart=true#home) search bar, search: Microsoft Sentinel > Create 2. Pick law-honeypot to add Microsoft Sentinel to a workspace > add

Successfully Added Sentinel to our Workspace (deprecated)