SIEM Tutorial for Beginners | Azure Sentinel Tutorial MAP with LIVE CYBER ATTACKS!

Поділитися
Вставка
  • Опубліковано 8 вер 2024

КОМЕНТАРІ • 1,1 тис.

  • @JoshMadakor
    @JoshMadakor  Рік тому +22

    Edit: Microsoft has changed the Azure portal and other things so much this lab is going to be difficult to follow. I will remake this video later, but a full up-to-date version of this is included on my cyber course below:
    joshmadakor.tech/cyber

    • @Prajesh-vu1ji
      @Prajesh-vu1ji Рік тому

      I dont know how but my event count on map is decreasing.. how to solve this??

    • @leisureclub_
      @leisureclub_ Рік тому +6

      Will be waiting for that....

    • @navidniknezhad9379
      @navidniknezhad9379 Рік тому +5

      Heyy Josh, Thanks for this tutorial. I have almost managed to get everything right but just now got stuck on extracting values from RawData. I can't simply find any options or buttons for that on the panel. If you have the solution please let me know. Thanks again, looking forward to hearing back from you :)

    • @homeland_fitness8431
      @homeland_fitness8431 Рік тому

      @@navidniknezhad9379 its a reccurring issue. we have a solution that somebody else told me. Will be posting it soon with credits.

    • @hishamaqueel432
      @hishamaqueel432 Рік тому

      @@homeland_fitness8431 did you resolve it ?

  • @DrZona19
    @DrZona19 2 роки тому +248

    For anyone else having issues finding the Security Center, it's been renamed Microsoft Defender for the Cloud, and Pricing and Settings are now Environment Settings.

    • @JoshMadakor
      @JoshMadakor  2 роки тому +26

      Thanks so much for this

    • @DrZona19
      @DrZona19 2 роки тому +8

      @@JoshMadakor Thank you so much for making these labs!

    • @danpetak1359
      @danpetak1359 2 роки тому +13

      not to be dramatic but you just saved my life

    • @SS-uq6wv
      @SS-uq6wv 2 роки тому +2

      THANK YOU

    • @cedriclindor8157
      @cedriclindor8157 Рік тому

      I appreciate this so much lol

  • @G1V3M3URTAGS
    @G1V3M3URTAGS Рік тому +94

    For anyone who is having trouble with the creating the custom log, azure has updated their selection panes for Log Analytics, tou can create custom logs by selecting Tables > Create> New Custom Log ( MMA-Based).

    • @shingen8914
      @shingen8914 Рік тому +3

      Thank you!

    • @jeremychi5674
      @jeremychi5674 10 місяців тому +1

      Thanks!

    • @aakashm4930
      @aakashm4930 10 місяців тому +1

      You my friend, stay happy!

    • @bujaay2924
      @bujaay2924 8 місяців тому +1

      Nearly gave up the search, thank you Sir

    • @attackofthemutant
      @attackofthemutant 7 місяців тому +1

      I should have read the comments section before going nuts, thanks for the info this will be helpful for everyone who is halfway this project

  • @Eze_Cloud
    @Eze_Cloud 2 роки тому +217

    Its crazy that these labs don't seem to do as well on your channel but they're arguably the most valuable information on here. Your active directory lab, Security+, and your resume tips got me a job. Keep up the great content!

    • @JoshMadakor
      @JoshMadakor  2 роки тому +47

      Lol, I complain to this about my friends all the time. "Nobody cares about my videos that are actually good 😡" lmao 😂. I just try to balance them though. And super glad to hear about your job. Great work!! And thanks for watching :)

    • @brianturney7599
      @brianturney7599 2 роки тому +11

      @@JoshMadakor This is crazy that people don't watch this video more than the others. I'm in it for the deep dive into the nitty gritty like this. This stuff is WAY valuable info. I wonder if most people are just too lazy so they skip past videos like these. You know what they say.. It's lonely at the top. When you do high quality videos such as this the top high quality viewers watch it while the 'lesser sages' skip it. haha

    • @roadtoexoneration3960
      @roadtoexoneration3960 2 роки тому +1

      I guarantee if you went and got into a fight at Walmart -- 1 million views in 24 hours. Great stuff! #Wegottadobetter

    • @MrSamachia
      @MrSamachia 2 роки тому +1

      @@roadtoexoneration3960 hahahahah you said it alright ...😂😂😂😂😂😂

    • @scottspa74
      @scottspa74 Рік тому +1

      @joshmadakor, this stuff is absolute gold! Thanks SOOOO much for sharing this. I wish I'd have had you as an instructor when I was getting my cybersecurity degrees at Edmonds; It sounds like I missed your time there by just a few quarters.

  • @fromthemoonandmybed
    @fromthemoonandmybed Рік тому +34

    Josh has taught me more about SIEM in 53 minutes than any prof I've had in college

  • @Jester4tw
    @Jester4tw 2 роки тому +80

    This video helped me land a job as a Security Analyst. It really impressed them. I appreciate your channel and all you do. I'll be looking out for your other Tutorials for sure.

    • @JoshMadakor
      @JoshMadakor  2 роки тому +17

      That is beautiful, super congratulations!!! Thank you for sharing. I wish I could have seen what your attack map looked like. Everyone's is different and it's so interesting to me :>
      Again, huge congrats!

    • @vijaykishorea3987
      @vijaykishorea3987 2 роки тому +2

      Hi Ronny firstly congrats on your job , how did you express this project to your interviewer, did you make any documentation of this project and added it to your resume?

    • @Jester4tw
      @Jester4tw 2 роки тому +33

      @@vijaykishorea3987 I waited until they asked me a relevant question, and when they did I used that as a chance to bring it up. I believe the question was "What do you do at home to improve your skillset?" Or something like that. I pulled up the map of the countries that have already tried to get into my honeypot and mentioned what it is and how I did it. Giving credit to Josh, of course.

  • @jayj0101
    @jayj0101 5 місяців тому +8

    This was my very first cybersecurity project. Creating the honeypot and seeing the live attacks was so exciting and helpful, as I am in the beginning stages of this journey. Thank you so much!

  • @kevingardocki
    @kevingardocki Рік тому +46

    For those that need to find "custom log" tab , it is now "Tables" and then click create sample log!

    • @nappy203
      @nappy203 Рік тому +4

      Thank you. How did you extract the fields after that?

    • @C3Cloud_
      @C3Cloud_ Рік тому +9

      @@nappy203 custom logs as a setting in Log Analytics workspaces
      go to the Log Analytics workspace that you want to add the custom logs to.
      In the left navigation pane, select Tables.
      In the Tables blade, select New custom log (MMA-based).
      In the New custom log blade, enter the following information:
      Log name: The name of the custom log.
      Description: A description of the custom log.
      Source: The source of the custom log. This can be a specific Azure resource, such as a virtual machine, or a generic source, such as all Azure resources.
      Query: The query that will be used to extract data from the custom log.
      Select Create.
      Once you have created the custom log, it will be available in the Tables blade. You can then use the Query editor to query the custom log and view the data.

    • @victorndukwe2316
      @victorndukwe2316 Рік тому +2

      @@C3Cloud_i cant seems to enable the ability in security center cos the log analystic can't be found. can you help. thanks

    • @HalalFitLife
      @HalalFitLife Рік тому

      @@C3Cloud_ thank u. I'm not sure I understood all of that but I appreciate it nonetheless.

    • @scottspa74
      @scottspa74 Рік тому

      I mmi would think ssh would be a more compelling Honeypot than RDP. But, what do I know.

  • @KI5IJB
    @KI5IJB 2 роки тому +15

    For anyone else that was having trouble getting the "Store additional raw data - Windows security events" part to work like it does in the video (since the update), go to 'Microsoft Defender for Cloud', select the specific resource under your subscription, in my case 'law-honeypot', 'Enable all Microsoft Defender for Cloud Plans', uncheck 'SQL servers on machines' like Josh did, click Save, go to 'Data Collection' on the left side, select 'All Events', click Save and you should be good to go now. It took me a minute to figure this out, hope this helps someone else!

  • @chrisbohon
    @chrisbohon 2 роки тому +67

    I know these labs probably don't get you the most views like other videos, but this stuff is very valuable. Thanks!

    • @JoshMadakor
      @JoshMadakor  2 роки тому +16

      Lol thanks so much, and yeah. It's really funny and something I complain a lot about to my friends. "nobody likes my videos that are actually good." 😭🤣🤣

    • @mgray999
      @mgray999 2 роки тому +6

      This is insanely valuable. I'm a year and 2 months in, and I haven't touched the SIEM yet

    • @JoshMadakor
      @JoshMadakor  2 роки тому +8

      @@mgray999 I noticed it's really hard to get SIEM experience without already having it. Luckily we can now setup our own cloud SIEM and throw a bunch of dangerous VMs out on the internet to be attacked :D, hahaha

    • @mgray999
      @mgray999 2 роки тому

      @@JoshMadakor I'm so excited to mess around with this on Wednesday. I love the thought of looking at an active attack

    • @basemmahmoud9850
      @basemmahmoud9850 2 роки тому

      @@JoshMadakor it is amazing Josh, very helpful. Thank you

  • @JoshMadakor
    @JoshMadakor  2 роки тому +81

    ⭐️⭐️⭐️ UPDATE TO INSTRUCTIONS ⭐️⭐️⭐️
    *Microsoft Azure changed the GUI for the portal! See below for Instructions!*
    8:38 - When you go to enable Security Center, this is now called "Microsoft Defender for Cloud"
    9:07 - For the Data Collection from VMs to the Log Analytics Workspace, this is now done in a different area under "Microsoft Defender for Cloud". See here for complete instructions: docs.microsoft.com/en-us/azure/defender-for-cloud/enable-data-collection#enable-auto-provisioning-of-the-log-analytics-agent-and-extensions-

    • @victormaymt4830
      @victormaymt4830 2 роки тому

      Thanks for the amazon video for some reason i cant find the auto provision on the defender cloud menu.

    • @victormaymt4830
      @victormaymt4830 2 роки тому

      found it

    • @Verbal27
      @Verbal27 2 роки тому

      @@victormaymt4830 Where did you find it? Having trouble locating it

    • @BigHud83
      @BigHud83 2 роки тому

      Thanks Josh I was stuck.

    • @Sequel7
      @Sequel7 2 роки тому

      I dont see the raw data column on my end.

  • @SimplyCyber
    @SimplyCyber 2 роки тому +25

    Just finished entire video. Excellent content and delivery. Appreciate the tech deep dive and the best practice too from grc perspective on mfa for all and not using default username/pass. Cheers

    • @JoshMadakor
      @JoshMadakor  2 роки тому +5

      Hey man! Honored to see you here. I actually discovered DSU CyberOps PhD through your channel. After watching your videos, I actually got my Masters in Cyber and BS in Computer science for the sole purpose of being able to apply to that program....then I started doing UA-cam more seriously haha. I don't know what I'll do in the future, but your videos impacted me, so thank you :)

  • @debprasadbanerjee5005
    @debprasadbanerjee5005 Рік тому +9

    Actually good non-clickbait and career-oriented content. Pure gold channel

    • @JoshMadakor
      @JoshMadakor  Рік тому +3

      I'm seriously honored to receive this comment, lol. Thank you :)

  • @-0.0
    @-0.0 5 місяців тому +3

    As soon as I ran the script I was getting bombarded with login attempts from China, Russia, Belize, and more. Super interesting. Thanks Josh, I'm really excited to add this to my portfolio.

  • @eemotion
    @eemotion 2 роки тому +10

    For anyone having issues launching the VM using Azure:
    I live on the East Coast, so naturally I was basing my VM out of the auto-selected East Coast server. I could never create the VM, it was just perpetually loading. I talked to support and they said that they're having capacity issues in the US East Coast specifically.
    I changed it to an Australian server and it worked just fine.

    • @JoshMadakor
      @JoshMadakor  2 роки тому +1

      Ty for posting this :)

    • @TheRealMrOR
      @TheRealMrOR 2 роки тому +1

      If only I had gone to the comments before spending 30 minutes just trying to re-do everything in another browser...

    • @dirty_mike
      @dirty_mike 2 роки тому

      1 month later and same issues on East Coast server (for anyone else trying this)

    • @DrZona19
      @DrZona19 2 роки тому

      Can confirm Azure is still having the same issues on the East Coast.

  • @jorgelucero9829
    @jorgelucero9829 2 роки тому +11

    Thank you Mr. Madakor. Having this on the resume really impressed my interviewers and I was able to finally land a job in the field. I greatly appreciate you for sharing this walk-through.

    • @Dxhard
      @Dxhard 2 роки тому +3

      can you please tell me how you added it to your resume ?

    • @abhinavkohli4293
      @abhinavkohli4293 2 місяці тому

      how did u apply

  • @Z-life-online
    @Z-life-online Рік тому +11

    Just finished the lab and really enjoyed it. I’d say it took about 3-4 hours including some troubleshooting as things have changed since the video was made. Hopefully to save people time Azure Defender is now Microsoft Defender. I enabled Foundation CSPM and Servers which then allowed me to enable ALL ENTRIES Data Collection. Custom Logs is now called Tables and you will want to Create New and use MMA-Based. Lastly I started to get a “Invoke-WebRequest : The remote server returned an error: (429) Too Many Request.” in my Powershell output. I assume this means I went over my 1000 queries. I stopped the script and will enable again tomorrow to see if it works. Overall great lab, just a few things have moved or changed since 2021! Thank you Josh!

    • @eddiegomez376
      @eddiegomez376 Рік тому +1

      @zacharywilliams6632 How long did it take for your logs to come in and start reading in custom logs page? This is the step at 25:00

    • @claytonreardon42069
      @claytonreardon42069 Рік тому +2

      How the heck did you get the extract fields to work at 26:20? From my reading, it seems like it's deprecated.

    • @Z-life-online
      @Z-life-online Рік тому +2

      @@eddiegomez376 I don't remember exactly, but maybe 10-15 minutes. Double check you included the .log append (and not .txt or something).

    • @Z-life-online
      @Z-life-online Рік тому +1

      @@claytonreardon42069 I didn't end up extracting the data myself, but copied the template from the top pinned comment.

    • @eddiegomez376
      @eddiegomez376 Рік тому +1

      @@Z-life-online I will attempt again later I waited 2 hours and nothing going to have to start from the beginning. Thanks though i appreciate any help :).

  • @abbasjon4520
    @abbasjon4520 Рік тому +4

    I am out of words to thank you! Im almost done with my cybersecurity bootcamp and this video is PRICELESS!!! if I find a SOC analyst job, its going to be because of you!! thank you sooooo much!!!!

    • @dummyahh8470
      @dummyahh8470 Рік тому

      how is it going with the job search?

  • @lukewomble2528
    @lukewomble2528 Рік тому +5

    When setting up the labels and extracting the raw data I had to do it in Microsoft Sentinel, then to custom logs. I would run the failed_rdp query and then would be able to check mark on the left of all the data. from there i would right click and it would let me extract and there I could do the custom fields! I hope this helps
    What an amazing lab. This blew my mind as I started to get people trying to log in within 10 minutes of running the powershell code! Thank you so much!

    • @dinolefevre8492
      @dinolefevre8492 Рік тому +1

      That sure helped me

    • @nappy203
      @nappy203 Рік тому

      I tried doing this in Sentinel and it didn't work... I'm right clicking and there's no extract fields.

    • @Hinksmn
      @Hinksmn 5 місяців тому

      mine is not lettingg me extract the data any tips

    • @Noobmaster-yu2qz
      @Noobmaster-yu2qz 5 місяців тому

      @@HinksmnBro im not getting any traffic any help??

    • @Noobmaster-yu2qz
      @Noobmaster-yu2qz 5 місяців тому

      @@HinksmnAlso im not able to find RawData column which shows the latitude and longitude

  • @WhosKoozko
    @WhosKoozko 2 роки тому +4

    You weren’t lying when you said 1k API requests weren’t a lot to work with. Woke up this morning to the API tapped out because some Chad in Ukraine tried to brute force the VM.
    I also installed sysmon on the VM. So I’m working on getting those events imported to sentinel as well.
    Great video. Very valuable.

    • @JoshMadakor
      @JoshMadakor  2 роки тому +2

      _>Woke up this morning to the API tapped out because some Chad in Ukraine tried to brute force the VM._
      Lmao, I'm dead, hahaha. Yeah, they will eat it up real quick.
      _>I also installed sysmon on the VM. So I’m working on getting those events imported to sentinel as well. _
      Cool, I'll check this out sometime!
      I also learned of another services that gives Geolocation from IP address. I guess you can get 25k requests for free from here, but it will require you to rework the PowerShell script a bit: ipinfo.io/
      Thanks for watching and thanks for the funny/good info lol

    • @dariusvlogs3634
      @dariusvlogs3634 Рік тому

      @@JoshMadakor I cannot get any logs out using the query. It states "
      No results found from the last 7 days
      Try selecting another time range "
      I connected the vm to the log management

  • @kirennguyen1140
    @kirennguyen1140 11 місяців тому +6

    First of all, thank you so much for this video Josh Madakor. I started to study IT for almost a year now and I know nothing before, Cloud compute still a strange thing for me but this lab was so amazing experience.
    2nd for those who confuse about how to extract Rawdata to split table in Log Analytic, you can input:
    failed_rdp_withGEO_CL #as in video
    | extend CSVFields = split(RawData, ',') #this line use to split output after comma into seperate value with "" and create new column
    | extend timestamp_CF = todatetime(CSVFields[8]) #choose value 9th in " "
    | extend label_CF = tostring(CSVFields[7])
    | extend country_CF = tostring(CSVFields[6])
    | extend state_CF = tostring(CSVFields[5])
    | extend source_CF = tostring(CSVFields[4])
    | extend user_CF = tostring(CSVFields[3])
    | extend dest_CF = tostring(CSVFields[2])
    | extend longitude_CF = tostring(CSVFields[1])
    | extend latitude_CF = tostring(CSVFields[0])
    | summarize event_count=count() by source_CF, tostring(latitude_CF), tostring(longitude_CF), country_CF, label_CF, dest_CF
    then go to Josh's script and delete other before ':' such as timestamp: or source: .The purpose is to show only data we want without explaination and ':' before value. You can find this line near the end of script
    It will show clear table with clear data and then continue with Azure Sentinel as video. Thank you

    • @Tosaaa
      @Tosaaa 7 місяців тому

      im having a bit of trouble with this. line 2 and 3 is a little confusing.What should I put after rawdata ? and what is value 9th in " " ?

    • @zeke546
      @zeke546 6 місяців тому

      @@Tosaaa same, I am still trying to figure out how this is even relevant
      Fuck microsoft till my grave, making things needlessly difficult

    • @theAlmightyGod09
      @theAlmightyGod09 Місяць тому

      It's helped to resolved the error I got. Thank you.

  • @Alpha-Omega33
    @Alpha-Omega33 Рік тому +5

    I am gonna work on this project today before I apply for any more jobs and I'll keep you posted! Thank you for the videos! Seems VERY valuable information and it is exactly what's missing on my resume-actual hands-on projects. I can't thank you enough!

    • @nappy203
      @nappy203 Рік тому

      Hi there. Were u able to finish this? I got stuck in the middle and I wasn't able to finish.

    • @Alpha-Omega33
      @Alpha-Omega33 Рік тому

      @@nappy203 yes I was able to finish it

    • @oagengmabiletsa281
      @oagengmabiletsa281 Рік тому +1

      @@nappy203 Hey, I also got stuck when extracting the logs-> Custom fields part. The 3 dots to extract are no longer there as MS azure is updated. Do you perhaps know where I can find it?

    • @Alpha-Omega33
      @Alpha-Omega33 Рік тому

      @@oagengmabiletsa281 I posted here what I did with links but the comments got deleted. So I don’t know how to help you. I made a channel “Cyber blogpost” on UA-cam. I posted the video there. It’s only one.

  • @tonynoel286
    @tonynoel286 Рік тому +82

    For anyone having trouble with the data extraction and map, plot paste this script in your workbook (where you plot the map) :
    FAILED_RDP_WITH_GEO_CL
    | extend username = extract(@"username:([^,]+)", 1, RawData),
    timestamp = extract(@"timestamp:([^,]+)", 1, RawData),
    latitude = extract(@"latitude:([^,]+)", 1, RawData),
    longitude = extract(@"longitude:([^,]+)", 1, RawData),
    sourcehost = extract(@"sourcehost:([^,]+)", 1, RawData),
    state = extract(@"state:([^,]+)", 1, RawData),
    label = extract(@"label:([^,]+)", 1, RawData),
    destination = extract(@"destinationhost:([^,]+)", 1, RawData),
    country = extract(@"country:([^,]+)", 1, RawData)
    | where destination != "samplehost"
    | where sourcehost != ""
    | summarize event_count=count() by latitude, longitude, sourcehost, label, destination, country
    This is just a combination of @MIAMIHACKER and Josh Madakor's queries so shout out to the both of you!

    • @TripElectronic
      @TripElectronic Рік тому +6

      Thank you for posting this!
      Small modification to the last line to display the query like seen in the data extraction part:
      | summarize event_count=count() by timestamp, label, country, state, sourcehost, username, destination, longitude, latitude

    • @dummyahh8470
      @dummyahh8470 Рік тому +2

      So does this basically mean why bypass the whole step he did for extracting data right? just wanna make sure im doing this right? Thanks btw

    • @TripElectronic
      @TripElectronic Рік тому +2

      ⁠@@dummyahh8470 Yes where you would enter the query (35:40 for reference) you would enter the script above instead of just the “FAILED_RDP_WITH_GEO_CL” or whatever you named your log file. This “bypasses” the whole extraction portion of the video. Keep in mind you will need to paste this same script into the map workbook when you create it.

    • @dummyahh8470
      @dummyahh8470 Рік тому +2

      @@TripElectronic when i run this in the workbook i get failed to extract latitude etd

    • @dummyahh8470
      @dummyahh8470 Рік тому

      etc*

  • @kennyayala6189
    @kennyayala6189 2 роки тому +4

    Hey Josh -- I'm trying to break into cyber security (just passed my Security+!) and your videos have been a HUGE help. Thank you for all you do!
    This video in particular made for a really fun and rewarding project -- I put my SIEM together today following your instructions and it's awesome seeing it all come together.
    Thanks again, and stay well!

    • @JoshMadakor
      @JoshMadakor  2 роки тому

      Hey Kenny, glad you liked the lab and the content! Appreciate you

    • @TheRealMrOR
      @TheRealMrOR 2 роки тому +1

      Is it still possible to do it for free? I'm being told I need to upgrade to Security Center-Standard

    • @dummyahh8470
      @dummyahh8470 Рік тому

      Did you get a job yet? I just passed my security + as well.

    • @kennyayala6189
      @kennyayala6189 Рік тому

      @@dummyahh8470 I'm currently working IT helpdesk at an MSP but am working my way into Cyber Security specifically. Gotta start somewhere! Congrats on your Sec+!

  • @tobiaseks
    @tobiaseks 2 роки тому +10

    Thank you so much for this Lab Josh, it was a pleasure to follow through with you, and I have learned a lot.
    A quick note for anyone who made the mistake I did. When its time to create the custom log at minute 25:00 I made the mistake of having two lines of code so it was
    1 FAILED_RDP_WITH_GEO_CL
    2 |
    this will give you an error code so delete line 2 and it should run perfectly, took me over an hour to figure out why I kept getting the error. I Also re-ran the powershell script just in case.

    • @slagrajag
      @slagrajag 2 роки тому

      Thank you, this was my problem too

    • @DrZona19
      @DrZona19 2 роки тому +2

      I wish that was my problem. For some reason I keep getting no results found from that last [whatever time frame I choose]

    • @tashaylablue925
      @tashaylablue925 2 роки тому +2

      Thank you for sharing. Just had this issue.

    • @ty6512
      @ty6512 2 роки тому

      @@DrZona19 where you able to fix this?

    • @TimnGregsMagic
      @TimnGregsMagic 2 роки тому

      @@ty6512 have you figured it out? lmao

  • @iMentorCloud
    @iMentorCloud 2 роки тому +2

    I highly recommend this for every Microsoft Shop. this can land you a job fairly quickly easy.

    • @JoshMadakor
      @JoshMadakor  2 роки тому

      Hey! It's funny, I've actually had a couple people tell me they talked about this lab in their interview and then they subsequently got hired, haha. I'm sure they brought other stuff to the table, but it's nice to see!

    • @iMentorCloud
      @iMentorCloud 2 роки тому

      @@JoshMadakor I doubt it - you can’t just get the job like that. You got to have hands on skills unless they got hired for monitoring Sentinel-
      Sentinel is one one of the easiest way to learn any SIEM specifically if you are running M365 services. This where you get to do the Engineering work

  • @SimplyCyber
    @SimplyCyber 2 роки тому +4

    Just popped in my feed. Great video and look fwd to checking out your other vids. I make similar content on UA-cam and will be “borrowing” the idea of throwing up the resume bullet the person gets after executing the lab. Brilliant idea!

    • @JoshMadakor
      @JoshMadakor  2 роки тому +2

      Thank you and for sure! I _borrow_ stuff all the time 😎

  • @japanesecinema6736
    @japanesecinema6736 18 днів тому

    I watched the video and I'm gonna tackle the lab soon. Very cool!

  • @wc4483
    @wc4483 Рік тому +9

    I just finished this lab and it was very detailed and easy to follow. I got everything set up except for one issue:
    When copying and pasting the Sentinel Map Query as is, it would say the query had no output. I had to delete this line "| where sourcehost_CF != "" " and then I was able to continue along and finish it all up.

    • @JoshMadakor
      @JoshMadakor  Рік тому +3

      Shoot, thanks so much for bringing that up. I'm def going to remake this lab at some point and release it on youtube :P

    • @lesandjackonwriting
      @lesandjackonwriting Рік тому

      Thanks, fixed my hours long search for the answer to this problem!

    • @bilalahmad-fd1wt
      @bilalahmad-fd1wt 4 місяці тому

      @@lesandjackonwriting hello can you please help me to solve it at the end in field extraction.

  • @activplayz-6272
    @activplayz-6272 2 роки тому +2

    Took me close to 5 hours but its up and running. Looking forward to more projects.

  • @ToukeeVang
    @ToukeeVang 2 роки тому +4

    WOW!! This is a goal mine!! Awesome job, I just set mine up took about 2-3 hours but its up and running! Great skill to learn. Looking forward doing your other labs!! Thank you!

    • @JoshMadakor
      @JoshMadakor  2 роки тому +1

      Hey Toukee! Glad you liked the lab! 2-3 hours is quite fast for this actually. it takes a while to get stuff working and then can take some time before the bad guys notice it and start attacking haha. Thanks for commenting :)

  • @C3Cloud_
    @C3Cloud_ Рік тому +5

    custom logs as a setting in Log Analytics workspaces
    go to the Log Analytics workspace that you want to add the custom logs to.
    In the left navigation pane, select Tables.
    In the Tables blade, select New custom log (MMA-based).
    In the New custom log blade, enter the following information:
    Log name: The name of the custom log.
    Description: A description of the custom log.
    Source: The source of the custom log. This can be a specific Azure resource, such as a virtual machine, or a generic source, such as all Azure resources.
    Query: The query that will be used to extract data from the custom log.
    Select Create.
    Once you have created the custom log, it will be available in the Tables blade. You can then use the Query editor to query the custom log and view the data.

    • @nappy203
      @nappy203 Рік тому +1

      so, excuse my ignorance, but how did you extract the fields after that?

    • @ramirras
      @ramirras Рік тому

      MMA-based doesn't work like that any longer. Now, after I select MMA-based, it asks me to upload a sample of the custom log. Any idea how to get around that???

    • @dilpreetkohli6630
      @dilpreetkohli6630 Рік тому +1

      @@ramirras Upload that sample log file on your host machine first

    • @dilpreetkohli6630
      @dilpreetkohli6630 Рік тому

      Did you find that?
      @@nappy203

    • @austinmolinaro7103
      @austinmolinaro7103 4 місяці тому

      You're the real MVP... I was stuck googling and chatgpt-ing how to work around this. Thanks!

  • @Josephmargay
    @Josephmargay 2 роки тому +4

    Thank you so much Josh Madakor for this video, i was able to set mine in space of two hours. I will definitely use it on my resume.

    • @JoshMadakor
      @JoshMadakor  2 роки тому +2

      Oh you got it working? super! And good luck with it. I know a few people used this with success :)

  • @lsam9082
    @lsam9082 4 місяці тому

    Thank you Josh, for your invaluable assistance! I'm delighted to inform you that I've successfully completed this project and have incorporated it into my resume. The experience garnered from this endeavor has been immensely enriching and educational, contributing significantly to my professional growth. I am deeply grateful for your guidance and support throughout this process. Once again, thank you for the invaluable learning opportunity. ☺

  • @user-oc7kd8jw7o
    @user-oc7kd8jw7o 2 роки тому +3

    Azure portal just loves being difficult. I have to use it at work so I thought this would be a quick lab (since I'm familiar) but NOPE. Thanks for the labs as always, Josh!

    • @JoshMadakor
      @JoshMadakor  2 роки тому +2

      Hey again William! Haha sorry about that. I know...they change it so often. Maybe the next Azure lab I will do everything with raw rest API requests so it changes less lmao 😂

  • @Nobomboclat-
    @Nobomboclat- Рік тому +2

    Josh, you are amazing man... im realizing how much initiative and knowledge it takes to bless the field like this, walking us through important maps of the CyberSecurity and IT field so casually and comprehensively truly an inspiration.

  • @jq1187
    @jq1187 10 місяців тому +11

    @JoshMadakor The option to extract data and create custom fields has been removed by Microsoft and replaced with "Data Collection Transformations", rendering this project extremely difficult to continue with if one is not familiar with Microsoft Azure.
    If you can somehow update this video, I think that would be a huge help!
    Thank you for all of your hard work!

    • @keithimmaculate6783
      @keithimmaculate6783 10 місяців тому

      Where would I find the "Data Collection Transformation" option in order to extract data and collect custom fields? Appreciate you for commenting.

    • @x1dragon102
      @x1dragon102 9 місяців тому

      and now data collection cannot be stored in Defender for cloud - free you'd need to upgrade to be able to carry on with this project

  • @MrTheRipgut
    @MrTheRipgut 9 місяців тому +2

    Great Content Josh. Even though I am late to the party and Azure has been through multiple updates so the steps get out of wack in some instances, your community has come through like champs and I was able to finish this project. It was cool running through some roadblocks and trying to figure out how to get it to work and actually being able to implement some of the fixes provided. Hell of a first project.

  • @VeenoBoomin
    @VeenoBoomin 6 місяців тому +3

    Just completed this lab - set it up 3 days ago, got caught up and didn't get to finish till today. Had an absolute unit from the Netherlands log over 14k logon attempts. Next up is to configure a lockout policy lol. Incredible lab and a lot of the comments in here helped me navigate the changes. Can't say thank you enough, Josh!

    • @weavingthevaluess
      @weavingthevaluess 6 місяців тому +1

      did you figure out the "extract fields" part @ 26:20?

    • @kogei
      @kogei 6 місяців тому

      am three also bro any help
      @@weavingthevaluess

    • @professorfroopynoopers1171
      @professorfroopynoopers1171 6 місяців тому

      that's what I'm stuck on as well@@weavingthevaluess

    • @professorfroopynoopers1171
      @professorfroopynoopers1171 6 місяців тому +1

      how did you "extract fields"?

    • @DH-rf3nd
      @DH-rf3nd 5 місяців тому

      How did you use your keygen ,keypair, to connect to your VM in microsoft remote connection?

  • @QuoVadisGates
    @QuoVadisGates 2 місяці тому

    Thanks a lot… this is on my resume, LinkedIn and I will do a video recap. Appreciate it

  • @benjaminstewart716
    @benjaminstewart716 2 роки тому +18

    Josh pinned the comment for the Security Center/Data Collection, but here's full instructions so y'all don't have to suffer like I did.
    > Watch Josh's awesome video until 8:38 (VM and LAW are set up) and then go to "Microsoft Defender for Cloud"
    > Find and click on "Environment Settings" in lefthand toolbar
    > Find and click on the dropdown arrow immediately next to your Azure subscription to reveal the NAME of your workspace (this is a critical detail that cost me a lot of time and pain, also bear in mind everything has to be deployed in order for this step to work)
    > Click on the workspace name to open its settings
    > In settings, disable "SQL servers on machines"
    > In settings, enable "Servers"
    > click the save button in the top left next to the search bar
    > click on "Data Collection" in the lefthand toolbar
    > Select "All Events" and save by clicking on the "Save" button
    > jump back to Josh's awesome video and connect the VM to your LAW
    > ...
    > profit
    ALSO bear in mind that there is regional weirdness with Sentinel. For whatever reason, I could not add Sentinel to a US West 3 workspace even though the documentation said it Sentinel was "non-regional"...anyway, I used US East and it worked like a charm.
    Good luck lads and lasses, and thanks again Josh for the amazing content! :)

    • @benjaminstewart716
      @benjaminstewart716 2 роки тому +2

      Also, at 26:24 you have to right click directly on the log entry to extract the fields - it looks like that little three-dot field has been removed.

    • @JoshMadakor
      @JoshMadakor  2 роки тому +2

      I pinned this. Seriously thank you for taking the time.

    • @JoshMadakor
      @JoshMadakor  2 роки тому +1

      I wish i could super-thank this lmao

    • @benjaminstewart716
      @benjaminstewart716 2 роки тому +2

      ​@@JoshMadakor if we're being #real though, I was writing this all down because I am gonna turn it into a blog/LinkedIn post, so happy to re-post it here and someone else from banging their head against the documentation / Azure interface like I did lmao.
      It took

    • @TheNeveraaron2
      @TheNeveraaron2 2 роки тому

      It’s not giving me an option for US East. The only us option I’m seeing is US West 3

  • @ibrahimYODA-qk1ng
    @ibrahimYODA-qk1ng 2 місяці тому

    for anyone having troubles with security center type data collection rules in azure search bar then click create and set your window event logs ingestions rules right there also for custom logs to be ingested you have to create another DCR with a data collection endpoint with a path pointing to the failed_rdp.log . To make it simple monitor section is the new security center in Azure. Lastly make sure you rdp into your windows vm and run the log exporter powershell script if you're not getting the failed_rdp_with_geo log populated in azure

    • @karthikrenganathan173
      @karthikrenganathan173 2 місяці тому

      Hello @ibrahimYODA-qk1ng
      I am encountering another issue after fetching the Event Viewer logs from the VM and transferring them to the user's Windows machine. I created a custom log table and proceeded with the custom logs and steps. When I started using the Logs option in Log Analytics and performed the SecurityEvent query, it returned "No results found." Could you kindly guide me on this? I am unable to view the event logs when running the query as discussed at 24:16. Please support me with these steps.

  • @itachisolosmadara
    @itachisolosmadara 11 місяців тому +1

    For those having trouble with the parsing part and creating a kql query, this worked for me.
    Failed_RDP_With_GEO_CL
    | parse RawData with * "latitude:" Latitude ",longitude:" Longitude ",destinationhost:" DestinationHost ",username:" Username ",sourcehost:" Sourcehost ",state:" State ", country:" Country ",label:" Label ",timestamp:" Timestamp
    | extend EventCount = 1
    //| summarize event_count = sum(EventCount) by Sourcehost, Latitude, Longitude, Country, Label, DestinationHost
    | summarize event_count = sum(EventCount) by Latitude, Longitude, DestinationHost, Username, Sourcehost, State, Country,Label, Timestamp
    | project Latitude, Longitude, DestinationHost, Username, Sourcehost, State, Country, Label, Timestamp
    Updated: 8/3/2024

    • @opeyemiadetola8718
      @opeyemiadetola8718 9 місяців тому

      Thanks for this @itachisolosmadara. When I try to run the query below in Sentinel I get an error:
      failed_rdp_logs_with_GEO_CL | summarize event_count=count() by Sourcehost, Latitude, Longitude, Country, Label, DestinationHost
      | where DestinationHost != "samplehost"
      | where Sourcehost != ""
      Error: 'summarize' operator: Failed to resolve scalar expression named 'sourcehost'...
      How did you pull through the stage? Thanks

  • @DrZona19
    @DrZona19 2 роки тому +50

    26:20 Azure does not have the three dots with an action option anymore. Instead, just right-click on the log you want and there's an extract fields option.

    • @JoshMadakor
      @JoshMadakor  2 роки тому +5

      Thanks so much for commenting this!

    • @belaq1336
      @belaq1336 2 роки тому +3

      Hi Austin,
      did you see the data displayed? I am stuck in that part because right-click on the log, the window opens but nothing appears? Can someone guide me? @josh?
      Thanks

    • @MrSamachia
      @MrSamachia 2 роки тому +2

      @@belaq1336 hey same here as well. that is where i am stuck

    • @danpetak1359
      @danpetak1359 2 роки тому +2

      I spoke too soon, theres no extract fields option when i right-click on the record :/ any help would be much appreciated!

    • @Nothing-pb5ml
      @Nothing-pb5ml Рік тому +2

      @@danpetak1359 Im stuck here as well :( and the legacy docs dont help. :|

  • @darkeststudio9607
    @darkeststudio9607 Рік тому +1

    im think youre the only creator i came accross that aint gate keeping informations like this. I appreciate what youre doing. you have my support good sir!

    • @JoshMadakor
      @JoshMadakor  Рік тому

      Thanks so much! I really appreciate that

  • @R0ck3tC0w
    @R0ck3tC0w 2 роки тому +12

    Hey Josh, great tutorial but it seems hard to cintue after 23.:30 as azure seems to have changed. There is no location in the Security Event Display for me to view the raw data containing Longitude and Latitude and finish the project

  • @ArizeOnubiyiC
    @ArizeOnubiyiC Рік тому

    Thank you Mr Josh I am now a real cyber security graduate with your videos. A million Thanks.

  • @TechTualChatter
    @TechTualChatter 2 роки тому +2

    ive been looking into setting up sentinel lol i think itll be a major player one day seeing as alot of environments use O365 and Azure

    • @JoshMadakor
      @JoshMadakor  2 роки тому +2

      Yeah for sure, and the fact than you can literally spin up a pay-as-you-go SIEM in like 1 minute. Seems absolutely great! I want to explore it more myself :)

  • @farhafatima1594
    @farhafatima1594 Рік тому +1

    @Josh Madakor Thank you immensely for offering this incredible hands-on lab experience. I've learned the entire setup cycle from the basics in the simplest way possible. Hats off to you, and I'm eagerly looking forward to continuing my learning journey with you.

  • @Geomaverick124
    @Geomaverick124 2 роки тому +5

    This was a very interesting sim. I will remember to recommend it to those looking to get into cyber security. Are there other projects that you can create for experience?

    • @JoshMadakor
      @JoshMadakor  2 роки тому +3

      Hey man! Yeah, I'm going to make a few more, but right now I have a playlist with a few technical demos! Check it out: ua-cam.com/play/PLqBeiU46hx1H--SNfTrohTOWeqkK-M2Y0.html

  • @abdulkadirosman2816
    @abdulkadirosman2816 6 місяців тому +1

    Half way through and it's a great tutorial. I tried geolocating my IP address on the website you recommended and it said Birmingham UK when I live in London UK. There are other websites that came within a couple miles though!

  • @bennythedennis
    @bennythedennis Рік тому +1

    You’re the best Josh. These videos have really helped me in my WGU journey. Six months ago I left healthcare and got my first tech support job, and now I’m transitioning to another one with even more pay and a better commute.
    I still haven’t cracked into cyber security yet, but I’m networking with my security analyst and SOC analyst friends to make inroads. These labs will certainly make my resume standout too!
    Hey, maybe when I get my first info sec job by this time next year you can interview me too! Only half kidding about that 😂

  • @vpatterson87
    @vpatterson87 8 місяців тому +2

    Hey everyone, I know I'm a bit late to the party on this project, but I just finished it up today (12/15/2023)! Due to some recent changes in the Microsoft Azure portal, the setup process is slightly different now compared to what you might have seen earlier this year. However, the overall steps are still quite similar. Big thanks to @Josh Madakor for this awesome lesson - I learned a ton!

    • @psychog3520
      @psychog3520 8 місяців тому

      Hi, how many hours did it take you? Asking to see if I can get the project done using the free credit from Azure.

    • @weavingthevaluess
      @weavingthevaluess 6 місяців тому

      hey man how did you do the 'Extract Fields' part at 16:20? cant seem to find how to create new fields 😭

  • @JohnCutter317
    @JohnCutter317 Рік тому +3

    The three dots next to the logs aren't there anymore and you don't have to expand the field just right click the title of log to extract

  • @MargaretIlesanmi
    @MargaretIlesanmi 2 роки тому +2

    Hi Josh, thanks for doing this. I'm so excited to try this now. I am just transitioning into this cybersecurity space with no previous IT experience and I must say your videos have been really helpful.

    • @JoshMadakor
      @JoshMadakor  2 роки тому

      Hey Margaret! Thanks for watching! It was a lot of fun to make honestly, hope you have fun with it! I'm glad the content has been helpful :)

    • @happie1271
      @happie1271 2 роки тому

      Hi margaret did you finish this project?

  • @TheExaltedHerobrine
    @TheExaltedHerobrine 2 роки тому +6

    Man these labs really need attention from the cybersecurity audience.

  • @dilpreetkohli6630
    @dilpreetkohli6630 Рік тому +2

    At 21:44 for those who can't find custom logs under settings tabs >> Go to Tables >> Create >> New Custom log (MMA - Based)

    • @sohannath4053
      @sohannath4053 Рік тому +1

      thanks for this 👍

    • @williamthomas3233
      @williamthomas3233 Рік тому

      How to extract custom fields?

    • @gustavoclaudino5256
      @gustavoclaudino5256 Рік тому

      did you know how? im stuck@@williamthomas3233

    • @gustavoclaudino5256
      @gustavoclaudino5256 Рік тому

      the code to extract:| extend username = extract(@"username:([^,]+)", 1, RawData),
      timestamp = extract(@"timestamp:([^,]+)", 1, RawData),
      latitude = extract(@"latitude:([^,]+)", 1, RawData),
      longitude = extract(@"longitude:([^,]+)", 1, RawData),
      sourcehost = extract(@"sourcehost:([^,]+)", 1, RawData),
      state = extract(@"state:([^,]+)", 1, RawData),
      label = extract(@"label:([^,]+)", 1, RawData),
      destination = extract(@"destinationhost:([^,]+)", 1, RawData),
      country = extract(@"country:([^,]+)", 1, RawData)
      | project username, timestamp, latitude, longitude, sourcehost, state, label, destination, country

  • @calculated4927
    @calculated4927 Рік тому +3

    Hello Josh, thank you so much for taking the time to make videos like these. I plan to do a few of your projects to beef up my resume.
    But when doing this one, I keep getitng the error saying that I can't connect to the VM with an RDP. I've run all the necessary tests and it should be up and running, but something is keeping me from connecting. I have even tried it with my firewall completely turned off and still nothing.
    Getting error code 0x204. I even bought Pro just for this and it still isn't working :/

  • @user_data
    @user_data Рік тому +1

    I just finished this video!! I can't Thank you enough!!! Thanks for sharing a such valuable information... You are helping and inspiring new cybersecurity students to get the experience we need! THANNK YOU!!!

  • @MrKeKsst
    @MrKeKsst 2 роки тому +3

    Dump question but how do we make sure that nobody actually get to log on into the machine by brute forcing the password/exploiting other weaknesses ?

    • @JoshMadakor
      @JoshMadakor  2 роки тому +2

      It's not a dumb question at all! There are a couple options:
      1) Using 2-factor-authentication somehow (windows hello, etc)
      2) Using a password lockout policy that will lock the account after x-failed attempts
      3) Using a really strong password helps.
      And remember, there is always a way in if the attacker has enough time and money :)

  • @Omni-knight
    @Omni-knight Рік тому +2

    I'm glad I found this channel. The explanations are very straight forward and clear.

  • @belloabdulmuizz9156
    @belloabdulmuizz9156 Рік тому +3

    @joshMadakor Microsoft has changed the Custom fields option , so right clicking on the result from a query does not show the extract fields option, any ideas to extract the raw data columns to get longitude , latitude etc would be appreciated

    • @JoshMadakor
      @JoshMadakor  Рік тому +1

      You can use KQL Regex. I would ask chatgpt to make a KQL regex to extract the latitude and longitude, then you can use that KQL query it generates. I know this answer is kinda wishywashy, but it's the best way that comes to mind :)

    • @MIAMIHACKER
      @MIAMIHACKER Рік тому +8

      ​@@JoshMadakor
      yup this worked, the script below should be able to parse the data and create the columns.
      FailedRDP_CL
      | extend username = extract(@"username:([^,]+)", 1, RawData),
      timestamp = extract(@"timestamp:([^,]+)", 1, RawData),
      latitude = extract(@"latitude:([^,]+)", 1, RawData),
      longitude = extract(@"longitude:([^,]+)", 1, RawData),
      sourcehost = extract(@"sourcehost:([^,]+)", 1, RawData),
      state = extract(@"state:([^,]+)", 1, RawData),
      label = extract(@"label:([^,]+)", 1, RawData),
      destination = extract(@"destinationhost:([^,]+)", 1, RawData),
      country = extract(@"country:([^,]+)", 1, RawData)
      | project username, timestamp, latitude, longitude, sourcehost, state, label, destination, country

    • @belloabdulmuizz9156
      @belloabdulmuizz9156 Рік тому +2

      @@MIAMIHACKER thank you KQL commands. Worked like a charm. Curious to know if you saw event_count while setting up the Map also?

    • @MIAMIHACKER
      @MIAMIHACKER Рік тому

      @@belloabdulmuizz9156 nope, still working on setting up the map.

    • @callums8138
      @callums8138 7 місяців тому

      @@MIAMIHACKER Does this change what query I run in the workbook? The one Josh provided isnt working

  • @AlexHernandez-ml7we
    @AlexHernandez-ml7we 11 місяців тому +1

    Pretty nice, thanks for sharing, I am not a cybersecurity, but l would love to try this. This is vey cool.

  • @noahshrader4440
    @noahshrader4440 2 роки тому +3

    Hey Josh. When creating the custom log, the Log Analytics Workspace keeps throwing the error, "Query could not be parsed at '' on line [3,0] Token: Line: 3 Position: 0"
    when I try to run the custom log. It throws the same error for all commands including the Security event. Any ideas?
    Edit: I had to run the logs from Sentinel and not the LAW. Talked to the support team and it was a weird bug. Everything else went great. Thanks so much for the help. I am going to school in the fall for cybersecurity at a local college. You have inspired me! Looking forward to the next video!

    • @danielopara1006
      @danielopara1006 2 роки тому

      Hi Noah, I am currently facing this problem and I tried running the logs from Sentinel and returns the same error message.

    • @okuneyevictor6426
      @okuneyevictor6426 2 роки тому +1

      @@danielopara1006 did you get it fixed? Im having problems with same error but in LAW and sentinel. if you got it fixed, can you share the solution here? thanks

    • @maxwellab4519
      @maxwellab4519 2 роки тому

      @@okuneyevictor6426 same here

    • @mattmalott9489
      @mattmalott9489 2 роки тому +1

      hey guys, you have to delete the lines below the first line. Only the first line in your query should be showing. He mumbles something about it if you watch that part again.

  • @sieffy91
    @sieffy91 2 роки тому +1

    Glad I stumbled across this! I work in the Microsoft space (MSFT partner) and we're slowing moving away from just a UC shop to encompass the entire M365 suite (and eventually Azure security), so this is extremely helpful! Hope you continue to do more content like this!

    • @JoshMadakor
      @JoshMadakor  2 роки тому +1

      Hey! I'm glad you like the content. I'm sure I will do more like this in the future. I really enjoy SIEM/live stuff. Seeing people try to break into my stuff is really hilarious lol

  • @Makonnen92
    @Makonnen92 Рік тому +3

    How the hell do we 'extract fields' ??? I'm stuck smh

  • @devonburelle400
    @devonburelle400 2 роки тому +2

    This was super interesting, im working on a research assignment for SIEMs and now I really want to try this lab! All your videos have been really informative and interesting thank you!

  • @Taianii
    @Taianii 5 місяців тому

    First Cybersec project I've done and wow how intersting was that. Thank you so much for the video Josh, hope to see more from you in the future, much appriciated.

  • @JohnCutter317
    @JohnCutter317 Рік тому

    The comments help alot. As of today save time and select UK south as region for everything or you have to delete and start over it won't move right

  • @nickbrutanna9973
    @nickbrutanna9973 8 місяців тому

    One obvious thing you can do to help you think which machine you are on (your native machine or the VM) is to change the appearance of the VM from your native one -- change the fonts it uses for display, some of the colors, things like that, so it looks radically different from your "normal" machine. Your brain will learn to key in on this info automatically, so it won't attempt to let you do something "in the wrong place".

  • @dmorgan3082
    @dmorgan3082 8 місяців тому +2

    Issue: no results returned when querying SecurityEvent in log analytics workspace logs.
    To Fix: Search diagnostic setting - Edit settings - toggle allLogs - toggle Send to Log Analytics workspace.

  • @michaelbrown7142
    @michaelbrown7142 2 роки тому +1

    Thanks Josh, this helped to understand how we can track cyber attacks.

    • @JoshMadakor
      @JoshMadakor  2 роки тому

      For sure!!! Ty for watching :) (also Ty for taking the time to comment!)

  • @aldov369
    @aldov369 5 місяців тому +1

    Great video, thank you for helping me fill some experience on my resume!

  • @blkwomenread
    @blkwomenread 2 роки тому +1

    Gonna try this out today ! I just spun up two VMs yesterday

    • @JoshMadakor
      @JoshMadakor  2 роки тому +2

      Cool! Good luck with it! I know the Azure Portal has changed a bit since I made this video, but there are some comments talking about how to navigate it

  • @yeaiknowkd
    @yeaiknowkd Рік тому +1

    Sensi Josh lol, Thank you again for this, i feel like I have set up correctly I have my maps with my 5 attempts but after 20 mins no one is attempting my Honey pot, Im go to sleep and check again tomorrow! will update.Thanks again

    • @yeaiknowkd
      @yeaiknowkd Рік тому +1

      update over night have over 2k and the winner this time is the netherlands with over 1k attempts thanks again and only one from DC lol thanks again

  • @invader703
    @invader703 Рік тому +1

    Josh I really want to thank you for making these videos. They're easy to follow and seriously helping me beef up my resume. Keep it up!

    • @c12651
      @c12651 Рік тому

      can you provide the updated steps please ?

  • @denziledwards1213
    @denziledwards1213 2 роки тому +1

    your channel is GOLDEN josh.... Im really glad you started youtube and was lucky to have found you bro!!!!!!

    • @JoshMadakor
      @JoshMadakor  2 роки тому +1

      Aw, thank you so much. I'm really glad you are enjoying the content and it's helpful. Really appreciate you watching and taking your time to comment!

  • @bryantvivar5697
    @bryantvivar5697 10 місяців тому +1

    Man I love the labs that you put out! Super helpful especially for us trying to break into the industry

  • @cybertooth-rjgl5889
    @cybertooth-rjgl5889 2 роки тому

    Thank You, for making this. Great exposure to azure and its capabilities. Just finished this Project - Cant Wait to add it on the resume.
    Watch your Spelling people! I had an Azure Sentinel query error- only because I called the LAW query a different name!
    I did re train - country 2x - as I Found Belize & Taiwan messing up the posted query Results.

  • @arafathazeem6537
    @arafathazeem6537 2 роки тому +1

    I did this on my home lab and I'm curious to do more tweaking on sentinel. Keep up the good work and thanks for sharing this valuable content. It helps security professionals and cloud engineers to break into job market or learn a new tech. You're the best.

    • @JoshMadakor
      @JoshMadakor  2 роки тому

      Thanks so much for the kind words! really appreciate it. I will def develop some more content like this in the future :)

  • @christianjavier1776
    @christianjavier1776 2 роки тому +2

    Love these videos! Thank you! Great way to addy his to my list of projects. Unfortunately my company does not have sentinel in our subscription plan and this will be some great experience down the line. Thank you

    • @JoshMadakor
      @JoshMadakor  2 роки тому

      No problem! Glad you liked it! If you wanna play with it, I would just make a free sub, just make sure to clean it up afterwards so MS doesn't take all of your coins lol.

  • @andrewherlache5248
    @andrewherlache5248 Рік тому

    For the sentinel map query people are having issues with, I was able to get it to work by matching the query to the extract filters exactly. I extracted my filters in ALL CAPS, and i realized the query would only work if I entered them in ALL CAPS to match.

  • @MrZaytova
    @MrZaytova Рік тому +1

    Appreciate the video. Great and clear information. Really enjoyed getting some exposure to Azure Sentinel as well as a data from active attacks.

    • @JoshMadakor
      @JoshMadakor  Рік тому

      Hehe thank you, glad you enjoyed that

  • @ausmanx1161
    @ausmanx1161 2 роки тому +1

    Great video! I just finished this project last night and it was a fun awesome experience. You did a great job instructing us through and explaining each step. I’m going to make write my first blog post, thank you for all you do and your videos!

    • @JoshMadakor
      @JoshMadakor  2 роки тому +2

      Heck yeah, good job setting it up. This was one of my favorite ones so I'm glad you liked it. GL with the blog post. I'm uploaded a video (not yet live) where I go over sample resume and a sample blog that includes this lab. Feel free to check it out ahead of time :)
      ua-cam.com/video/Y_AyHBtQ-U8/v-deo.html

    • @ausmanx1161
      @ausmanx1161 2 роки тому

      @@JoshMadakor definitely watching that video rn, it implies directly to me also, thank you!

    • @jamesharden1495
      @jamesharden1495 4 місяці тому

      Hello could you help me please I can’t seem to get the custom logs to have the query and run panel at the top ?

  • @Minoru72991
    @Minoru72991 2 роки тому +1

    This was really awesome to do and gain experience with, I may be able to implement this with my new position since we're cloud based anyway. But at least knowing how to do this is incredibly valuable, thanks so much Josh!

    • @JoshMadakor
      @JoshMadakor  2 роки тому

      Glad you liked the lab? Ty for watching!!

  • @omersiddiq3764
    @omersiddiq3764 2 роки тому +2

    Thanks Josh for the labs and information regarding cybersecurity. Really helpful and they have inspired me to start thinking about a career in cybersecurity seriously. I am trying out this lab however I am kinda stuck trying to connect to VM through Remote Connection (RDP). I am able to ping the public IP for the VM but just can't connect through remote connection. Anyone else who may have seen something similar e and how they got around it? I have copied the failed connection message below while trying to connect through remote connection.
    [Window Title]
    Remote Desktop Connection
    [Content]
    Remote Desktop can't connect to the remote computer for one of these reasons:
    1) Remote access to the server is not enabled
    2) The remote computer is turned off
    3) The remote computer is not available on the network
    Make sure the remote computer is turned on and connected to the network, and that remote access is enabled.
    [^] Hide details [OK]
    [Expanded Information]
    Error code: 0x204
    Extended error code: 0x0

    • @kunalpatel9832
      @kunalpatel9832 2 роки тому +2

      when first installing check the image that you chose , I think it might be linux , so try deleting the whole setup and try again.
      but this time when setting up the VM , select the windows 10 pro image instead of linux which prompts up manually.and try all those steps , it would work a charm!!

    • @nappy203
      @nappy203 Рік тому

      @@kunalpatel9832 Thank u. I was having the same issue and was looking for a solution. Thank u so much.

  • @Vhunter088
    @Vhunter088 2 роки тому +2

    Thanks for this lab Josh!!! We need more hands on tutorials like this on UA-cam, for those who are transferring into the field. I'm 90% done and ran into the "summarize' operator:" error. I found no answers that worked, but I've learned so much already. I'm still going to put this on my resume. I just shut down the machine as I saw a success Brute Force attack. This was a very interesting experience, thanks again!

    • @Dxhard
      @Dxhard 2 роки тому

      can you please tell me how you added it to your resume ?

    • @Vhunter088
      @Vhunter088 2 роки тому

      @@Dxhard Sample resumes with these projects are in the description of this video.
      I just used some of the concepts and added the learning experience I had during the project.

    • @FishHuntGrowBuild
      @FishHuntGrowBuild Рік тому +1

      I just ran into the same issue. Turns out, I hadn't extracted destinationhost_CF. Once I went back to the analytics and added that extraction field, ran it again in sentinel everything ran smoothly!

  • @owensirois3881
    @owensirois3881 11 місяців тому

    Thank you so much for this video. I cannot stress enough how much you have done for my professionalism and resume. You are the man!!!

  • @cheviot2988
    @cheviot2988 2 роки тому

    Bro this is so much fun, I've got two from Iran a few hundred from the netherlands and even a few from my own country UK :) this was a really great video thank you

  • @rhmcneil
    @rhmcneil 2 роки тому +1

    Thanks for the excellent video man. I had some trouble with setting up Azure Defender as the process you explained changed literally in the short timeframe in which you uploaded this video. I stayed with it thou and eventually found the section to enable it for my test vm and was able to follow all of the other steps with no problems. Currently studying the SSCP and just listened to a DarkNet diary per your recommendation in another one of your videos. So glad YT recommended you man, keep doing your thing.

    • @JoshMadakor
      @JoshMadakor  2 роки тому +4

      Ah yeah, omg defender seriously changed right when I released this. I knew that would happen. I'll have to research it and pin a comment or something lol 😩. Glad you did the lab! Hope it was fun! . Glad you found the channel! Thanks for watching and best of luck :) (Darknet is so dope, haha)

    • @Kevin-zy5jm
      @Kevin-zy5jm 2 роки тому

      Hey @MackXXI, where’d you find it? I can’t get to security center… I’m stuck!

    • @rhmcneil
      @rhmcneil 2 роки тому

      @@Kevin-zy5jm so I kind if stumbled upon after going through different sections of the azure portal. It’s on the bottom of the page of either Azure Sentinel or Log Analytics workspaces if I recall correctly. Sorry, I should have better documented what I did since things changed up.

  • @dummyahh8470
    @dummyahh8470 Рік тому

    Just finished this lab! THX you so much. I am going to put this on my resume. I definitely think this will help since i just got my sec+

  • @cybermentee3658
    @cybermentee3658 2 роки тому +1

    Pretty dope project. I mixed your project with the cyber mentor AD lab setup, and I think I have something solid now. I plan to add more alert capabilities and dashboards in the future.

    • @JoshMadakor
      @JoshMadakor  2 роки тому +1

      Haha nice name. Thanks for watching!! I should check out his AD lab. I really like TCM, he is one of the reasons I started doing UA-cam at all haha. It'd be cool to hear about the dashboards you end up making :p

  • @efemboygg
    @efemboygg Рік тому

    Aye, just did some Splunk training and realised that me thinking to pay for the more api calls was dumb cause it does it for free via geostats/iplocation. anyways, been modifying my siem enviroment over time and its been looking really cool. plus once i finally figure out how to setup these forwarders, the homelab will🔥🔥🔥

  • @hrishikeshkshirsagar6738
    @hrishikeshkshirsagar6738 2 роки тому +2

    Josh Kudos for your efforts.. this is brilliant..

    • @JoshMadakor
      @JoshMadakor  2 роки тому

      Thanks so much!! I hope to do another, more updated lab like this!

  • @jeremygreenwood8127
    @jeremygreenwood8127 3 місяці тому

    Thanks Josh for the great project idea and the video. The way things have changed in the azure portal, just felt insane to get field extraction done. Was able to get the data and additional fields returned through KQL, and getting a DCR setup, but I ran into so many hurdles. I don’t know why Microsoft/azure has to make things so difficult.

  • @robelseyum162
    @robelseyum162 2 роки тому +1

    Hey josh, please create more videos like this. This is really helpful.

    • @JoshMadakor
      @JoshMadakor  2 роки тому +1

      Thanks so much! Glad you like it. I will def create some more at some point

  • @kouyang2869
    @kouyang2869 2 роки тому +1

    Had to rewatch beginning couple of times because I couldn't login, figured it out, I had ubuntu as the default instead of Windows

    • @JoshMadakor
      @JoshMadakor  2 роки тому

      Glad you caught it! It's good running into this like this because you can always learn something :)

  • @kishorevrk6697
    @kishorevrk6697 Рік тому +1

    Thank you sir for this wonderful project which I used in information security course 👍 and I learnt many information from it, ofcourse I got good marks, 🤙

  • @solido888
    @solido888 2 роки тому +1

    Thanks for this video, it is really helpful to see a live use practical exercise for Azure.

    • @JoshMadakor
      @JoshMadakor  2 роки тому

      No problem! Glad you liked it. It was really fun to make lol

  • @gloryokwata1912
    @gloryokwata1912 2 роки тому +1

    I lOVE YOU SIR. FROM NIGERIA, I JUST STARTED MY MSC IN CYBER SECURITY, AND I CURRENTLY INTERN WITH A COMPANY IN LAGOS ONLINE. I'M LEARNING A PATH IN THE BLUETEAM, AND I FIND YOUR CONTENT JUST PERFECT FOR ME AT THE MOMENT. I'D LIKE TO CONNECT WITH YOU SIR.