A Beginner’s Guide to Setting Up a SIEM with Microsoft Azure

Ibitola Akindehin
3 min readNov 6, 2023

--

Protecting Your Digital Assets with Microsoft Sentinel

In today’s interconnected world, cybersecurity is paramount. To safeguard your digital assets and monitor potential threats, setting up a Security Information and Event Management (SIEM) system is a smart move. In this step-by-step guide, I’ll walk you through how to open a SIEM using Microsoft Azure, specifically Microsoft Sentinel. Even if you’re a beginner, don’t worry — I’ve got you covered.

Introduction

A SIEM is a powerful tool that helps you detect and respond to security incidents in real-time. Microsoft Sentinel, integrated with Microsoft Azure, makes it accessible and efficient. So, let’s get started.

Prerequisites

Before we dive in, you’ll need:

- A Microsoft Azure account
- Basic knowledge of cloud services

Step 1: Creating an Azure Account

If you don’t have an Azure account, visit [azure.com](https://azure.com) and sign up. Microsoft often offers free credits to new users, which is perfect for getting started.

Step 2: Launch a Virtual Machine

1. Log in to your Azure portal.
2. In the search bar, type “Virtual Machine” and select “Create.”
3. Fill in the necessary details, such as naming your resource group and VM.
4. Set up a username and password for remote access.
5. Continue through the setup, and ensure you keep your VM open to incoming traffic.

Step 3: Set Up Log Analytics Workspace

1. In the search bar, type “Log Analytics Workspace” and click “Create.”
2. Name your workspace and keep it in the same resource group.
3. Choose a region and proceed with the default settings.
4. Create your log analytics workspace.

Step 4: Configure Microsoft Defender for Cloud

1. In the search bar, type “Microsoft Defender for Cloud.”
2. Click on “Environment Settings” on the left sidebar.
3. Under “Azure subscription 1,” find and enable the necessary settings.
4. Next, navigate to “Data Collection” under “Defender plans,” select “All events,” and save your changes.

Step 5: Connect Your VM

1. Once again, type “Log Analytics Workspace” in the search bar.
2. Click on your workspace, then select “Virtual Machines (deprecated),” and choose your VM.
3. Click “Connect” to establish a connection between your VM and Log Analytics Workspace.

Step 6: Set Up Microsoft Sentinel

1. In the search bar, type “Sentinel,” and click on “Microsoft Sentinel.”
2. Select “Create Microsoft Sentinel” and link it to your log analytics workspace.

Step 7: Remote Desktop Connection

1. Find your VM’s public IP address in your Azure portal.
2. On your local machine, open “Remote Desktop Connection.”
3. Paste the public IP address into the appropriate field.
4. Enter your password to initiate the remote desktop connection.

Step 8: Monitor and Analyze

1. Inside your VM, open “Event Viewer” from the start menu.
2. Go to “Windows Logs” and select “Security.”
3. Wait for the logs to populate. Look for “4625” audit failure codes, indicating failed login attempts.

Audit Failure spotted.

Step 9: Identifying Attackers

1. Click on a “4625” log to see details of failed login attempts.
2. Note the IP address of potential attackers.

Step 10: Determine Geolocation

1. Use an online service like [https://ipgeolocation.io/](https://ipgeolocation.io/) to identify the geographical location of the attacker based on their IP address.

Congratulations! You’ve set up your SIEM using Microsoft Azure and Microsoft Sentinel. You can now monitor and respond to potential threats effectively.

Conclusion

Cybersecurity is an ongoing process, and setting up a SIEM with Microsoft Azure is a significant step in protecting your digital assets. Remember, ethical and legal considerations are vital in any cybersecurity experiment. Happy safeguarding!

--

--

Ibitola Akindehin

Passionate data analyst and cybersecurity enthusiast skilled in unraveling complex data, enhancing cybersecurity defenses, ensuring data integrity.