SIEM Tutorial for Beginners | Azure Sentinel Tutorial MAP with LIVE CYBER ATTACKS!

  Рет қаралды 133,546

Josh Madakor

Josh Madakor

Күн бұрын

Пікірлер: 1 100
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Edit: Microsoft has changed the Azure portal and other things so much this lab is going to be difficult to follow. I will remake this video later, but a full up-to-date version of this is included on my cyber course below: joshmadakor.tech/cyber
@Prajesh-vu1ji
@Prajesh-vu1ji Жыл бұрын
I dont know how but my event count on map is decreasing.. how to solve this??
@leisureclub_
@leisureclub_ Жыл бұрын
Will be waiting for that....
@navidniknezhad9379
@navidniknezhad9379 Жыл бұрын
Heyy Josh, Thanks for this tutorial. I have almost managed to get everything right but just now got stuck on extracting values from RawData. I can't simply find any options or buttons for that on the panel. If you have the solution please let me know. Thanks again, looking forward to hearing back from you :)
@homeland_fitness8431
@homeland_fitness8431 Жыл бұрын
@@navidniknezhad9379 its a reccurring issue. we have a solution that somebody else told me. Will be posting it soon with credits.
@hishamaqueel432
@hishamaqueel432 Жыл бұрын
@@homeland_fitness8431 did you resolve it ?
@DrZona19
@DrZona19 2 жыл бұрын
For anyone else having issues finding the Security Center, it's been renamed Microsoft Defender for the Cloud, and Pricing and Settings are now Environment Settings.
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Thanks so much for this
@DrZona19
@DrZona19 2 жыл бұрын
@@JoshMadakor Thank you so much for making these labs!
@danpetak1359
@danpetak1359 2 жыл бұрын
not to be dramatic but you just saved my life
@SS-uq6wv
@SS-uq6wv 2 жыл бұрын
THANK YOU
@cedriclindor8157
@cedriclindor8157 2 жыл бұрын
I appreciate this so much lol
@Eze_Cloud
@Eze_Cloud 3 жыл бұрын
Its crazy that these labs don't seem to do as well on your channel but they're arguably the most valuable information on here. Your active directory lab, Security+, and your resume tips got me a job. Keep up the great content!
@JoshMadakor
@JoshMadakor 3 жыл бұрын
Lol, I complain to this about my friends all the time. "Nobody cares about my videos that are actually good 😡" lmao 😂. I just try to balance them though. And super glad to hear about your job. Great work!! And thanks for watching :)
@brianturney7599
@brianturney7599 2 жыл бұрын
@@JoshMadakor This is crazy that people don't watch this video more than the others. I'm in it for the deep dive into the nitty gritty like this. This stuff is WAY valuable info. I wonder if most people are just too lazy so they skip past videos like these. You know what they say.. It's lonely at the top. When you do high quality videos such as this the top high quality viewers watch it while the 'lesser sages' skip it. haha
@roadtoexoneration3960
@roadtoexoneration3960 2 жыл бұрын
I guarantee if you went and got into a fight at Walmart -- 1 million views in 24 hours. Great stuff! #Wegottadobetter
@MrSamachia
@MrSamachia 2 жыл бұрын
@@roadtoexoneration3960 hahahahah you said it alright ...😂😂😂😂😂😂
@scottspa74
@scottspa74 Жыл бұрын
@joshmadakor, this stuff is absolute gold! Thanks SOOOO much for sharing this. I wish I'd have had you as an instructor when I was getting my cybersecurity degrees at Edmonds; It sounds like I missed your time there by just a few quarters.
@G1V3M3URTAGS
@G1V3M3URTAGS Жыл бұрын
For anyone who is having trouble with the creating the custom log, azure has updated their selection panes for Log Analytics, tou can create custom logs by selecting Tables > Create> New Custom Log ( MMA-Based).
@shingen8914
@shingen8914 Жыл бұрын
Thank you!
@jeremychi5674
@jeremychi5674 Жыл бұрын
Thanks!
@aakashm4930
@aakashm4930 Жыл бұрын
You my friend, stay happy!
@bujaay2924
@bujaay2924 Жыл бұрын
Nearly gave up the search, thank you Sir
@attackofthemutant
@attackofthemutant 10 ай бұрын
I should have read the comments section before going nuts, thanks for the info this will be helpful for everyone who is halfway this project
@heyjanellj
@heyjanellj 8 ай бұрын
This was my very first cybersecurity project. Creating the honeypot and seeing the live attacks was so exciting and helpful, as I am in the beginning stages of this journey. Thank you so much!
@JoshMadakor
@JoshMadakor 8 ай бұрын
Great job!
@fromthemoonandmybed
@fromthemoonandmybed Жыл бұрын
Josh has taught me more about SIEM in 53 minutes than any prof I've had in college
@TheAllegiance1
@TheAllegiance1 2 ай бұрын
need to allow pings through via defender
@Jester4tw
@Jester4tw 3 жыл бұрын
This video helped me land a job as a Security Analyst. It really impressed them. I appreciate your channel and all you do. I'll be looking out for your other Tutorials for sure.
@JoshMadakor
@JoshMadakor 3 жыл бұрын
That is beautiful, super congratulations!!! Thank you for sharing. I wish I could have seen what your attack map looked like. Everyone's is different and it's so interesting to me :> Again, huge congrats!
@vijaykishorea3987
@vijaykishorea3987 3 жыл бұрын
Hi Ronny firstly congrats on your job , how did you express this project to your interviewer, did you make any documentation of this project and added it to your resume?
@Jester4tw
@Jester4tw 3 жыл бұрын
@@vijaykishorea3987 I waited until they asked me a relevant question, and when they did I used that as a chance to bring it up. I believe the question was "What do you do at home to improve your skillset?" Or something like that. I pulled up the map of the countries that have already tried to get into my honeypot and mentioned what it is and how I did it. Giving credit to Josh, of course.
@JoshMadakor
@JoshMadakor 3 жыл бұрын
⭐️⭐️⭐️ UPDATE TO INSTRUCTIONS ⭐️⭐️⭐️ *Microsoft Azure changed the GUI for the portal! See below for Instructions!* 8:38 - When you go to enable Security Center, this is now called "Microsoft Defender for Cloud" 9:07 - For the Data Collection from VMs to the Log Analytics Workspace, this is now done in a different area under "Microsoft Defender for Cloud". See here for complete instructions: docs.microsoft.com/en-us/azure/defender-for-cloud/enable-data-collection#enable-auto-provisioning-of-the-log-analytics-agent-and-extensions-
@victormaymt4830
@victormaymt4830 3 жыл бұрын
Thanks for the amazon video for some reason i cant find the auto provision on the defender cloud menu.
@victormaymt4830
@victormaymt4830 3 жыл бұрын
found it
@Verbal27
@Verbal27 3 жыл бұрын
@@victormaymt4830 Where did you find it? Having trouble locating it
@BigHud83
@BigHud83 2 жыл бұрын
Thanks Josh I was stuck.
@Sequel7
@Sequel7 2 жыл бұрын
I dont see the raw data column on my end.
@KI5IJB
@KI5IJB 2 жыл бұрын
For anyone else that was having trouble getting the "Store additional raw data - Windows security events" part to work like it does in the video (since the update), go to 'Microsoft Defender for Cloud', select the specific resource under your subscription, in my case 'law-honeypot', 'Enable all Microsoft Defender for Cloud Plans', uncheck 'SQL servers on machines' like Josh did, click Save, go to 'Data Collection' on the left side, select 'All Events', click Save and you should be good to go now. It took me a minute to figure this out, hope this helps someone else!
@kevingardocki
@kevingardocki Жыл бұрын
For those that need to find "custom log" tab , it is now "Tables" and then click create sample log!
@nappy203
@nappy203 Жыл бұрын
Thank you. How did you extract the fields after that?
@ElTerceroCharles
@ElTerceroCharles Жыл бұрын
@@nappy203 custom logs as a setting in Log Analytics workspaces go to the Log Analytics workspace that you want to add the custom logs to. In the left navigation pane, select Tables. In the Tables blade, select New custom log (MMA-based). In the New custom log blade, enter the following information: Log name: The name of the custom log. Description: A description of the custom log. Source: The source of the custom log. This can be a specific Azure resource, such as a virtual machine, or a generic source, such as all Azure resources. Query: The query that will be used to extract data from the custom log. Select Create. Once you have created the custom log, it will be available in the Tables blade. You can then use the Query editor to query the custom log and view the data.
@Itzviktur
@Itzviktur Жыл бұрын
@@ElTerceroCharlesi cant seems to enable the ability in security center cos the log analystic can't be found. can you help. thanks
@HalalFitLife
@HalalFitLife Жыл бұрын
@@ElTerceroCharles thank u. I'm not sure I understood all of that but I appreciate it nonetheless.
@scottspa74
@scottspa74 Жыл бұрын
I mmi would think ssh would be a more compelling Honeypot than RDP. But, what do I know.
@debprasadbanerjee5005
@debprasadbanerjee5005 2 жыл бұрын
Actually good non-clickbait and career-oriented content. Pure gold channel
@JoshMadakor
@JoshMadakor 2 жыл бұрын
I'm seriously honored to receive this comment, lol. Thank you :)
@chrisbohon
@chrisbohon 3 жыл бұрын
I know these labs probably don't get you the most views like other videos, but this stuff is very valuable. Thanks!
@JoshMadakor
@JoshMadakor 3 жыл бұрын
Lol thanks so much, and yeah. It's really funny and something I complain a lot about to my friends. "nobody likes my videos that are actually good." 😭🤣🤣
@mgray999
@mgray999 3 жыл бұрын
This is insanely valuable. I'm a year and 2 months in, and I haven't touched the SIEM yet
@JoshMadakor
@JoshMadakor 3 жыл бұрын
@@mgray999 I noticed it's really hard to get SIEM experience without already having it. Luckily we can now setup our own cloud SIEM and throw a bunch of dangerous VMs out on the internet to be attacked :D, hahaha
@mgray999
@mgray999 3 жыл бұрын
@@JoshMadakor I'm so excited to mess around with this on Wednesday. I love the thought of looking at an active attack
@basemmahmoud9850
@basemmahmoud9850 2 жыл бұрын
@@JoshMadakor it is amazing Josh, very helpful. Thank you
@SimplyCyber
@SimplyCyber 3 жыл бұрын
Just finished entire video. Excellent content and delivery. Appreciate the tech deep dive and the best practice too from grc perspective on mfa for all and not using default username/pass. Cheers
@JoshMadakor
@JoshMadakor 3 жыл бұрын
Hey man! Honored to see you here. I actually discovered DSU CyberOps PhD through your channel. After watching your videos, I actually got my Masters in Cyber and BS in Computer science for the sole purpose of being able to apply to that program....then I started doing KZbin more seriously haha. I don't know what I'll do in the future, but your videos impacted me, so thank you :)
@jorgelucero9829
@jorgelucero9829 2 жыл бұрын
Thank you Mr. Madakor. Having this on the resume really impressed my interviewers and I was able to finally land a job in the field. I greatly appreciate you for sharing this walk-through.
@Dxhard
@Dxhard 2 жыл бұрын
can you please tell me how you added it to your resume ?
@abhinavkohli4293
@abhinavkohli4293 5 ай бұрын
how did u apply
@-0.0
@-0.0 8 ай бұрын
As soon as I ran the script I was getting bombarded with login attempts from China, Russia, Belize, and more. Super interesting. Thanks Josh, I'm really excited to add this to my portfolio.
@JoshMadakor
@JoshMadakor 8 ай бұрын
Thanks for sharing! ^^
@abbasjon4520
@abbasjon4520 2 жыл бұрын
I am out of words to thank you! Im almost done with my cybersecurity bootcamp and this video is PRICELESS!!! if I find a SOC analyst job, its going to be because of you!! thank you sooooo much!!!!
@dummyahh8470
@dummyahh8470 Жыл бұрын
how is it going with the job search?
@dilpreetkohli6630
@dilpreetkohli6630 Жыл бұрын
At 21:44 for those who can't find custom logs under settings tabs >> Go to Tables >> Create >> New Custom log (MMA - Based)
@sohannath4053
@sohannath4053 Жыл бұрын
thanks for this 👍
@williamthomas3233
@williamthomas3233 Жыл бұрын
How to extract custom fields?
@gustavoclaudino5256
@gustavoclaudino5256 Жыл бұрын
did you know how? im stuck@@williamthomas3233
@gustavoclaudino5256
@gustavoclaudino5256 Жыл бұрын
the code to extract:| extend username = extract(@"username:([^,]+)", 1, RawData), timestamp = extract(@"timestamp:([^,]+)", 1, RawData), latitude = extract(@"latitude:([^,]+)", 1, RawData), longitude = extract(@"longitude:([^,]+)", 1, RawData), sourcehost = extract(@"sourcehost:([^,]+)", 1, RawData), state = extract(@"state:([^,]+)", 1, RawData), label = extract(@"label:([^,]+)", 1, RawData), destination = extract(@"destinationhost:([^,]+)", 1, RawData), country = extract(@"country:([^,]+)", 1, RawData) | project username, timestamp, latitude, longitude, sourcehost, state, label, destination, country
@eemotion
@eemotion 2 жыл бұрын
For anyone having issues launching the VM using Azure: I live on the East Coast, so naturally I was basing my VM out of the auto-selected East Coast server. I could never create the VM, it was just perpetually loading. I talked to support and they said that they're having capacity issues in the US East Coast specifically. I changed it to an Australian server and it worked just fine.
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Ty for posting this :)
@TheRealMrOR
@TheRealMrOR 2 жыл бұрын
If only I had gone to the comments before spending 30 minutes just trying to re-do everything in another browser...
@dirty_mike
@dirty_mike 2 жыл бұрын
1 month later and same issues on East Coast server (for anyone else trying this)
@DrZona19
@DrZona19 2 жыл бұрын
Can confirm Azure is still having the same issues on the East Coast.
@DrZona19
@DrZona19 2 жыл бұрын
26:20 Azure does not have the three dots with an action option anymore. Instead, just right-click on the log you want and there's an extract fields option.
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Thanks so much for commenting this!
@belaq1336
@belaq1336 2 жыл бұрын
Hi Austin, did you see the data displayed? I am stuck in that part because right-click on the log, the window opens but nothing appears? Can someone guide me? @josh? Thanks
@MrSamachia
@MrSamachia 2 жыл бұрын
@@belaq1336 hey same here as well. that is where i am stuck
@danpetak1359
@danpetak1359 2 жыл бұрын
I spoke too soon, theres no extract fields option when i right-click on the record :/ any help would be much appreciated!
@Nothing-pb5ml
@Nothing-pb5ml Жыл бұрын
@@danpetak1359 Im stuck here as well :( and the legacy docs dont help. :|
@WhosKoozko
@WhosKoozko 3 жыл бұрын
You weren’t lying when you said 1k API requests weren’t a lot to work with. Woke up this morning to the API tapped out because some Chad in Ukraine tried to brute force the VM. I also installed sysmon on the VM. So I’m working on getting those events imported to sentinel as well. Great video. Very valuable.
@JoshMadakor
@JoshMadakor 3 жыл бұрын
_>Woke up this morning to the API tapped out because some Chad in Ukraine tried to brute force the VM._ Lmao, I'm dead, hahaha. Yeah, they will eat it up real quick. _>I also installed sysmon on the VM. So I’m working on getting those events imported to sentinel as well. _ Cool, I'll check this out sometime! I also learned of another services that gives Geolocation from IP address. I guess you can get 25k requests for free from here, but it will require you to rework the PowerShell script a bit: ipinfo.io/ Thanks for watching and thanks for the funny/good info lol
@dariusvlogs3634
@dariusvlogs3634 2 жыл бұрын
@@JoshMadakor I cannot get any logs out using the query. It states " No results found from the last 7 days Try selecting another time range " I connected the vm to the log management
@Nobomboclat-
@Nobomboclat- Жыл бұрын
Josh, you are amazing man... im realizing how much initiative and knowledge it takes to bless the field like this, walking us through important maps of the CyberSecurity and IT field so casually and comprehensively truly an inspiration.
@tonynoel286
@tonynoel286 Жыл бұрын
For anyone having trouble with the data extraction and map, plot paste this script in your workbook (where you plot the map) : FAILED_RDP_WITH_GEO_CL | extend username = extract(@"username:([^,]+)", 1, RawData), timestamp = extract(@"timestamp:([^,]+)", 1, RawData), latitude = extract(@"latitude:([^,]+)", 1, RawData), longitude = extract(@"longitude:([^,]+)", 1, RawData), sourcehost = extract(@"sourcehost:([^,]+)", 1, RawData), state = extract(@"state:([^,]+)", 1, RawData), label = extract(@"label:([^,]+)", 1, RawData), destination = extract(@"destinationhost:([^,]+)", 1, RawData), country = extract(@"country:([^,]+)", 1, RawData) | where destination != "samplehost" | where sourcehost != "" | summarize event_count=count() by latitude, longitude, sourcehost, label, destination, country This is just a combination of @MIAMIHACKER and Josh Madakor's queries so shout out to the both of you!
@TripElectronic
@TripElectronic Жыл бұрын
Thank you for posting this! Small modification to the last line to display the query like seen in the data extraction part: | summarize event_count=count() by timestamp, label, country, state, sourcehost, username, destination, longitude, latitude
@dummyahh8470
@dummyahh8470 Жыл бұрын
So does this basically mean why bypass the whole step he did for extracting data right? just wanna make sure im doing this right? Thanks btw
@TripElectronic
@TripElectronic Жыл бұрын
⁠@@dummyahh8470 Yes where you would enter the query (35:40 for reference) you would enter the script above instead of just the “FAILED_RDP_WITH_GEO_CL” or whatever you named your log file. This “bypasses” the whole extraction portion of the video. Keep in mind you will need to paste this same script into the map workbook when you create it.
@dummyahh8470
@dummyahh8470 Жыл бұрын
@@TripElectronic when i run this in the workbook i get failed to extract latitude etd
@dummyahh8470
@dummyahh8470 Жыл бұрын
etc*
@darkeststudio9607
@darkeststudio9607 2 жыл бұрын
im think youre the only creator i came accross that aint gate keeping informations like this. I appreciate what youre doing. you have my support good sir!
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Thanks so much! I really appreciate that
@kennyayala6189
@kennyayala6189 2 жыл бұрын
Hey Josh -- I'm trying to break into cyber security (just passed my Security+!) and your videos have been a HUGE help. Thank you for all you do! This video in particular made for a really fun and rewarding project -- I put my SIEM together today following your instructions and it's awesome seeing it all come together. Thanks again, and stay well!
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Hey Kenny, glad you liked the lab and the content! Appreciate you
@TheRealMrOR
@TheRealMrOR 2 жыл бұрын
Is it still possible to do it for free? I'm being told I need to upgrade to Security Center-Standard
@dummyahh8470
@dummyahh8470 Жыл бұрын
Did you get a job yet? I just passed my security + as well.
@kennyayala6189
@kennyayala6189 Жыл бұрын
@@dummyahh8470 I'm currently working IT helpdesk at an MSP but am working my way into Cyber Security specifically. Gotta start somewhere! Congrats on your Sec+!
@iMentorCloud
@iMentorCloud 3 жыл бұрын
I highly recommend this for every Microsoft Shop. this can land you a job fairly quickly easy.
@JoshMadakor
@JoshMadakor 3 жыл бұрын
Hey! It's funny, I've actually had a couple people tell me they talked about this lab in their interview and then they subsequently got hired, haha. I'm sure they brought other stuff to the table, but it's nice to see!
@iMentorCloud
@iMentorCloud 3 жыл бұрын
@@JoshMadakor I doubt it - you can’t just get the job like that. You got to have hands on skills unless they got hired for monitoring Sentinel- Sentinel is one one of the easiest way to learn any SIEM specifically if you are running M365 services. This where you get to do the Engineering work
@tobiaseks
@tobiaseks 2 жыл бұрын
Thank you so much for this Lab Josh, it was a pleasure to follow through with you, and I have learned a lot. A quick note for anyone who made the mistake I did. When its time to create the custom log at minute 25:00 I made the mistake of having two lines of code so it was 1 FAILED_RDP_WITH_GEO_CL 2 | this will give you an error code so delete line 2 and it should run perfectly, took me over an hour to figure out why I kept getting the error. I Also re-ran the powershell script just in case.
@slagrajag
@slagrajag 2 жыл бұрын
Thank you, this was my problem too
@DrZona19
@DrZona19 2 жыл бұрын
I wish that was my problem. For some reason I keep getting no results found from that last [whatever time frame I choose]
@tashaylablue925
@tashaylablue925 2 жыл бұрын
Thank you for sharing. Just had this issue.
@ty6512
@ty6512 2 жыл бұрын
@@DrZona19 where you able to fix this?
@TimnGregsMagic
@TimnGregsMagic 2 жыл бұрын
@@ty6512 have you figured it out? lmao
@Alpha-Omega33
@Alpha-Omega33 Жыл бұрын
I am gonna work on this project today before I apply for any more jobs and I'll keep you posted! Thank you for the videos! Seems VERY valuable information and it is exactly what's missing on my resume-actual hands-on projects. I can't thank you enough!
@nappy203
@nappy203 Жыл бұрын
Hi there. Were u able to finish this? I got stuck in the middle and I wasn't able to finish.
@Alpha-Omega33
@Alpha-Omega33 Жыл бұрын
@@nappy203 yes I was able to finish it
@oagengmabiletsa281
@oagengmabiletsa281 Жыл бұрын
@@nappy203 Hey, I also got stuck when extracting the logs-> Custom fields part. The 3 dots to extract are no longer there as MS azure is updated. Do you perhaps know where I can find it?
@Alpha-Omega33
@Alpha-Omega33 Жыл бұрын
@@oagengmabiletsa281 I posted here what I did with links but the comments got deleted. So I don’t know how to help you. I made a channel “Cyber blogpost” on KZbin. I posted the video there. It’s only one.
@SimplyCyber
@SimplyCyber 3 жыл бұрын
Just popped in my feed. Great video and look fwd to checking out your other vids. I make similar content on KZbin and will be “borrowing” the idea of throwing up the resume bullet the person gets after executing the lab. Brilliant idea!
@JoshMadakor
@JoshMadakor 3 жыл бұрын
Thank you and for sure! I _borrow_ stuff all the time 😎
@farhafatima1594
@farhafatima1594 Жыл бұрын
@Josh Madakor Thank you immensely for offering this incredible hands-on lab experience. I've learned the entire setup cycle from the basics in the simplest way possible. Hats off to you, and I'm eagerly looking forward to continuing my learning journey with you.
@lukewomble2528
@lukewomble2528 Жыл бұрын
When setting up the labels and extracting the raw data I had to do it in Microsoft Sentinel, then to custom logs. I would run the failed_rdp query and then would be able to check mark on the left of all the data. from there i would right click and it would let me extract and there I could do the custom fields! I hope this helps What an amazing lab. This blew my mind as I started to get people trying to log in within 10 minutes of running the powershell code! Thank you so much!
@dinolefevre8492
@dinolefevre8492 Жыл бұрын
That sure helped me
@nappy203
@nappy203 Жыл бұрын
I tried doing this in Sentinel and it didn't work... I'm right clicking and there's no extract fields.
@Hinksmn
@Hinksmn 8 ай бұрын
mine is not lettingg me extract the data any tips
@Noobmaster-yu2qz
@Noobmaster-yu2qz 8 ай бұрын
@@HinksmnBro im not getting any traffic any help??
@Noobmaster-yu2qz
@Noobmaster-yu2qz 8 ай бұрын
@@HinksmnAlso im not able to find RawData column which shows the latitude and longitude
@ArizeOnubiyiC
@ArizeOnubiyiC Жыл бұрын
Thank you Mr Josh I am now a real cyber security graduate with your videos. A million Thanks.
@ToukeeVang
@ToukeeVang 2 жыл бұрын
WOW!! This is a goal mine!! Awesome job, I just set mine up took about 2-3 hours but its up and running! Great skill to learn. Looking forward doing your other labs!! Thank you!
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Hey Toukee! Glad you liked the lab! 2-3 hours is quite fast for this actually. it takes a while to get stuff working and then can take some time before the bad guys notice it and start attacking haha. Thanks for commenting :)
@Josephmargay
@Josephmargay 2 жыл бұрын
Thank you so much Josh Madakor for this video, i was able to set mine in space of two hours. I will definitely use it on my resume.
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Oh you got it working? super! And good luck with it. I know a few people used this with success :)
@MrTheRipgut
@MrTheRipgut Жыл бұрын
Great Content Josh. Even though I am late to the party and Azure has been through multiple updates so the steps get out of wack in some instances, your community has come through like champs and I was able to finish this project. It was cool running through some roadblocks and trying to figure out how to get it to work and actually being able to implement some of the fixes provided. Hell of a first project.
@Z-life-online
@Z-life-online Жыл бұрын
Just finished the lab and really enjoyed it. I’d say it took about 3-4 hours including some troubleshooting as things have changed since the video was made. Hopefully to save people time Azure Defender is now Microsoft Defender. I enabled Foundation CSPM and Servers which then allowed me to enable ALL ENTRIES Data Collection. Custom Logs is now called Tables and you will want to Create New and use MMA-Based. Lastly I started to get a “Invoke-WebRequest : The remote server returned an error: (429) Too Many Request.” in my Powershell output. I assume this means I went over my 1000 queries. I stopped the script and will enable again tomorrow to see if it works. Overall great lab, just a few things have moved or changed since 2021! Thank you Josh!
@eddiegomez376
@eddiegomez376 Жыл бұрын
@zacharywilliams6632 How long did it take for your logs to come in and start reading in custom logs page? This is the step at 25:00
@claytonreardon42069
@claytonreardon42069 Жыл бұрын
How the heck did you get the extract fields to work at 26:20? From my reading, it seems like it's deprecated.
@Z-life-online
@Z-life-online Жыл бұрын
@@eddiegomez376 I don't remember exactly, but maybe 10-15 minutes. Double check you included the .log append (and not .txt or something).
@Z-life-online
@Z-life-online Жыл бұрын
@@claytonreardon42069 I didn't end up extracting the data myself, but copied the template from the top pinned comment.
@eddiegomez376
@eddiegomez376 Жыл бұрын
@@Z-life-online I will attempt again later I waited 2 hours and nothing going to have to start from the beginning. Thanks though i appreciate any help :).
@Omni-knight
@Omni-knight Жыл бұрын
I'm glad I found this channel. The explanations are very straight forward and clear.
@wc4483
@wc4483 2 жыл бұрын
I just finished this lab and it was very detailed and easy to follow. I got everything set up except for one issue: When copying and pasting the Sentinel Map Query as is, it would say the query had no output. I had to delete this line "| where sourcehost_CF != "" " and then I was able to continue along and finish it all up.
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Shoot, thanks so much for bringing that up. I'm def going to remake this lab at some point and release it on youtube :P
@lesandjackonwriting
@lesandjackonwriting 2 жыл бұрын
Thanks, fixed my hours long search for the answer to this problem!
@bilalahmad-fd1wt
@bilalahmad-fd1wt 8 ай бұрын
@@lesandjackonwriting hello can you please help me to solve it at the end in field extraction.
@ArtisticByte-i6h
@ArtisticByte-i6h 3 ай бұрын
Phewwwww, I managed to get get the lab done. I just finished the lab and have to leave it running and come back tomorrow as I already hit my 1000 limit with the ipgeolocation. Josh, thanks a lot.
@prateek2655
@prateek2655 2 ай бұрын
How did you manage to extract the Rawdata can you share??
@MargaretIlesanmi
@MargaretIlesanmi 3 жыл бұрын
Hi Josh, thanks for doing this. I'm so excited to try this now. I am just transitioning into this cybersecurity space with no previous IT experience and I must say your videos have been really helpful.
@JoshMadakor
@JoshMadakor 3 жыл бұрын
Hey Margaret! Thanks for watching! It was a lot of fun to make honestly, hope you have fun with it! I'm glad the content has been helpful :)
@happie1271
@happie1271 3 жыл бұрын
Hi margaret did you finish this project?
@Taianii
@Taianii 8 ай бұрын
First Cybersec project I've done and wow how intersting was that. Thank you so much for the video Josh, hope to see more from you in the future, much appriciated.
@Robert-x3q1b
@Robert-x3q1b 2 жыл бұрын
Azure portal just loves being difficult. I have to use it at work so I thought this would be a quick lab (since I'm familiar) but NOPE. Thanks for the labs as always, Josh!
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Hey again William! Haha sorry about that. I know...they change it so often. Maybe the next Azure lab I will do everything with raw rest API requests so it changes less lmao 😂
@bryantvivar5697
@bryantvivar5697 Жыл бұрын
Man I love the labs that you put out! Super helpful especially for us trying to break into the industry
@ElTerceroCharles
@ElTerceroCharles Жыл бұрын
custom logs as a setting in Log Analytics workspaces go to the Log Analytics workspace that you want to add the custom logs to. In the left navigation pane, select Tables. In the Tables blade, select New custom log (MMA-based). In the New custom log blade, enter the following information: Log name: The name of the custom log. Description: A description of the custom log. Source: The source of the custom log. This can be a specific Azure resource, such as a virtual machine, or a generic source, such as all Azure resources. Query: The query that will be used to extract data from the custom log. Select Create. Once you have created the custom log, it will be available in the Tables blade. You can then use the Query editor to query the custom log and view the data.
@nappy203
@nappy203 Жыл бұрын
so, excuse my ignorance, but how did you extract the fields after that?
@ramirras
@ramirras Жыл бұрын
MMA-based doesn't work like that any longer. Now, after I select MMA-based, it asks me to upload a sample of the custom log. Any idea how to get around that???
@dilpreetkohli6630
@dilpreetkohli6630 Жыл бұрын
@@ramirras Upload that sample log file on your host machine first
@dilpreetkohli6630
@dilpreetkohli6630 Жыл бұрын
Did you find that? @@nappy203
@austinmolinaro7103
@austinmolinaro7103 8 ай бұрын
You're the real MVP... I was stuck googling and chatgpt-ing how to work around this. Thanks!
@lsam9082
@lsam9082 7 ай бұрын
Thank you Josh, for your invaluable assistance! I'm delighted to inform you that I've successfully completed this project and have incorporated it into my resume. The experience garnered from this endeavor has been immensely enriching and educational, contributing significantly to my professional growth. I am deeply grateful for your guidance and support throughout this process. Once again, thank you for the invaluable learning opportunity. ☺
@VeenoBoomin
@VeenoBoomin 10 ай бұрын
Just completed this lab - set it up 3 days ago, got caught up and didn't get to finish till today. Had an absolute unit from the Netherlands log over 14k logon attempts. Next up is to configure a lockout policy lol. Incredible lab and a lot of the comments in here helped me navigate the changes. Can't say thank you enough, Josh!
@weavingthevaluess
@weavingthevaluess 9 ай бұрын
did you figure out the "extract fields" part @ 26:20?
@kogei
@kogei 9 ай бұрын
am three also bro any help @@weavingthevaluess
@professorfroopynoopers1171
@professorfroopynoopers1171 9 ай бұрын
that's what I'm stuck on as well@@weavingthevaluess
@professorfroopynoopers1171
@professorfroopynoopers1171 9 ай бұрын
how did you "extract fields"?
@DH-rf3nd
@DH-rf3nd 9 ай бұрын
How did you use your keygen ,keypair, to connect to your VM in microsoft remote connection?
@urz2ruly
@urz2ruly 2 ай бұрын
Thank you for all you do Josh! You are amazing!
@R0ck3tC0w
@R0ck3tC0w 2 жыл бұрын
Hey Josh, great tutorial but it seems hard to cintue after 23.:30 as azure seems to have changed. There is no location in the Security Event Display for me to view the raw data containing Longitude and Latitude and finish the project
@denziledwards1213
@denziledwards1213 3 жыл бұрын
your channel is GOLDEN josh.... Im really glad you started youtube and was lucky to have found you bro!!!!!!
@JoshMadakor
@JoshMadakor 3 жыл бұрын
Aw, thank you so much. I'm really glad you are enjoying the content and it's helpful. Really appreciate you watching and taking your time to comment!
@jq1187
@jq1187 Жыл бұрын
@JoshMadakor The option to extract data and create custom fields has been removed by Microsoft and replaced with "Data Collection Transformations", rendering this project extremely difficult to continue with if one is not familiar with Microsoft Azure. If you can somehow update this video, I think that would be a huge help! Thank you for all of your hard work!
@keithimmaculate6783
@keithimmaculate6783 Жыл бұрын
Where would I find the "Data Collection Transformation" option in order to extract data and collect custom fields? Appreciate you for commenting.
@x1dragon102
@x1dragon102 Жыл бұрын
and now data collection cannot be stored in Defender for cloud - free you'd need to upgrade to be able to carry on with this project
@bennythedennis
@bennythedennis Жыл бұрын
You’re the best Josh. These videos have really helped me in my WGU journey. Six months ago I left healthcare and got my first tech support job, and now I’m transitioning to another one with even more pay and a better commute. I still haven’t cracked into cyber security yet, but I’m networking with my security analyst and SOC analyst friends to make inroads. These labs will certainly make my resume standout too! Hey, maybe when I get my first info sec job by this time next year you can interview me too! Only half kidding about that 😂
@benjaminstewart716
@benjaminstewart716 2 жыл бұрын
Josh pinned the comment for the Security Center/Data Collection, but here's full instructions so y'all don't have to suffer like I did. > Watch Josh's awesome video until 8:38 (VM and LAW are set up) and then go to "Microsoft Defender for Cloud" > Find and click on "Environment Settings" in lefthand toolbar > Find and click on the dropdown arrow immediately next to your Azure subscription to reveal the NAME of your workspace (this is a critical detail that cost me a lot of time and pain, also bear in mind everything has to be deployed in order for this step to work) > Click on the workspace name to open its settings > In settings, disable "SQL servers on machines" > In settings, enable "Servers" > click the save button in the top left next to the search bar > click on "Data Collection" in the lefthand toolbar > Select "All Events" and save by clicking on the "Save" button > jump back to Josh's awesome video and connect the VM to your LAW > ... > profit ALSO bear in mind that there is regional weirdness with Sentinel. For whatever reason, I could not add Sentinel to a US West 3 workspace even though the documentation said it Sentinel was "non-regional"...anyway, I used US East and it worked like a charm. Good luck lads and lasses, and thanks again Josh for the amazing content! :)
@benjaminstewart716
@benjaminstewart716 2 жыл бұрын
Also, at 26:24 you have to right click directly on the log entry to extract the fields - it looks like that little three-dot field has been removed.
@JoshMadakor
@JoshMadakor 2 жыл бұрын
I pinned this. Seriously thank you for taking the time.
@JoshMadakor
@JoshMadakor 2 жыл бұрын
I wish i could super-thank this lmao
@benjaminstewart716
@benjaminstewart716 2 жыл бұрын
​@@JoshMadakor if we're being #real though, I was writing this all down because I am gonna turn it into a blog/LinkedIn post, so happy to re-post it here and someone else from banging their head against the documentation / Azure interface like I did lmao. It took
@TheNeveraaron2
@TheNeveraaron2 2 жыл бұрын
It’s not giving me an option for US East. The only us option I’m seeing is US West 3
@invader703
@invader703 Жыл бұрын
Josh I really want to thank you for making these videos. They're easy to follow and seriously helping me beef up my resume. Keep it up!
@c12651
@c12651 Жыл бұрын
can you provide the updated steps please ?
@kirennguyen1140
@kirennguyen1140 Жыл бұрын
First of all, thank you so much for this video Josh Madakor. I started to study IT for almost a year now and I know nothing before, Cloud compute still a strange thing for me but this lab was so amazing experience. 2nd for those who confuse about how to extract Rawdata to split table in Log Analytic, you can input: failed_rdp_withGEO_CL #as in video | extend CSVFields = split(RawData, ',') #this line use to split output after comma into seperate value with "" and create new column | extend timestamp_CF = todatetime(CSVFields[8]) #choose value 9th in " " | extend label_CF = tostring(CSVFields[7]) | extend country_CF = tostring(CSVFields[6]) | extend state_CF = tostring(CSVFields[5]) | extend source_CF = tostring(CSVFields[4]) | extend user_CF = tostring(CSVFields[3]) | extend dest_CF = tostring(CSVFields[2]) | extend longitude_CF = tostring(CSVFields[1]) | extend latitude_CF = tostring(CSVFields[0]) | summarize event_count=count() by source_CF, tostring(latitude_CF), tostring(longitude_CF), country_CF, label_CF, dest_CF then go to Josh's script and delete other before ':' such as timestamp: or source: .The purpose is to show only data we want without explaination and ':' before value. You can find this line near the end of script It will show clear table with clear data and then continue with Azure Sentinel as video. Thank you
@Tosaaa
@Tosaaa 10 ай бұрын
im having a bit of trouble with this. line 2 and 3 is a little confusing.What should I put after rawdata ? and what is value 9th in " " ?
@zeke546
@zeke546 10 ай бұрын
@@Tosaaa same, I am still trying to figure out how this is even relevant Fuck microsoft till my grave, making things needlessly difficult
@theAlmightyGod09
@theAlmightyGod09 4 ай бұрын
It's helped to resolved the error I got. Thank you.
@user_data
@user_data Жыл бұрын
I just finished this video!! I can't Thank you enough!!! Thanks for sharing a such valuable information... You are helping and inspiring new cybersecurity students to get the experience we need! THANNK YOU!!!
@JoshMadakor
@JoshMadakor Жыл бұрын
Thanks so much!
@WhoElseLikesPortal
@WhoElseLikesPortal 4 ай бұрын
PEOPLE IN 2024: Microsoft has CHANGED MANY FEATURES in Azure that are used in this video. For the query, ignore the part about extracting to custom fields and instead put in this KQL: FAILED_LOG_GEO_LC_CL |extend username = extract(@"username:([^,]+)", 1, RawData), timestamp = extract(@"timestamp:([^,]+)", 1, RawData), latitude = extract(@"latitude:([^,]+)", 1, RawData), longitude = extract(@"longitude:([^,]+)", 1, RawData), sourcehost = extract(@"sourcehost:([^,]+)", 1, RawData), state = extract(@"state:([^,]+)", 1, RawData), label = extract(@"label:([^,]+)", 1, RawData), destination = extract(@"destinationhost:([^,]+)", 1, RawData), country = extract(@"country:([^,]+)", 1, RawData) |where destination != "samplehost" |where sourcehost != "" |summarize event_count=count() by timestamp, label, country, state, sourcehost, username, destination, longitude, latitude medium.com/@michaellopezcs17/how-to-create-a-siem-microsoft-sentinel-2024-46ab6c7cfb8c
@PIBoost
@PIBoost 4 ай бұрын
where can i find the KQL?
@PIBoost
@PIBoost 4 ай бұрын
nvm i got it, thanks man!
@yonitonii
@yonitonii 4 ай бұрын
Thanks so much man!!
@prateek2655
@prateek2655 2 ай бұрын
yeah it works thanks alot
@princeudoka1177
@princeudoka1177 5 күн бұрын
Please I need your help. How do I put this in KQL
@activplayz-6272
@activplayz-6272 2 жыл бұрын
Took me close to 5 hours but its up and running. Looking forward to more projects.
@TechTualChatter
@TechTualChatter 3 жыл бұрын
ive been looking into setting up sentinel lol i think itll be a major player one day seeing as alot of environments use O365 and Azure
@JoshMadakor
@JoshMadakor 3 жыл бұрын
Yeah for sure, and the fact than you can literally spin up a pay-as-you-go SIEM in like 1 minute. Seems absolutely great! I want to explore it more myself :)
@devonburelle400
@devonburelle400 2 жыл бұрын
This was super interesting, im working on a research assignment for SIEMs and now I really want to try this lab! All your videos have been really informative and interesting thank you!
@aldov369
@aldov369 8 ай бұрын
Great video, thank you for helping me fill some experience on my resume!
@belloabdulmuizz9156
@belloabdulmuizz9156 Жыл бұрын
@joshMadakor Microsoft has changed the Custom fields option , so right clicking on the result from a query does not show the extract fields option, any ideas to extract the raw data columns to get longitude , latitude etc would be appreciated
@JoshMadakor
@JoshMadakor Жыл бұрын
You can use KQL Regex. I would ask chatgpt to make a KQL regex to extract the latitude and longitude, then you can use that KQL query it generates. I know this answer is kinda wishywashy, but it's the best way that comes to mind :)
@MIAMIHACKER
@MIAMIHACKER Жыл бұрын
​@@JoshMadakor yup this worked, the script below should be able to parse the data and create the columns. FailedRDP_CL | extend username = extract(@"username:([^,]+)", 1, RawData), timestamp = extract(@"timestamp:([^,]+)", 1, RawData), latitude = extract(@"latitude:([^,]+)", 1, RawData), longitude = extract(@"longitude:([^,]+)", 1, RawData), sourcehost = extract(@"sourcehost:([^,]+)", 1, RawData), state = extract(@"state:([^,]+)", 1, RawData), label = extract(@"label:([^,]+)", 1, RawData), destination = extract(@"destinationhost:([^,]+)", 1, RawData), country = extract(@"country:([^,]+)", 1, RawData) | project username, timestamp, latitude, longitude, sourcehost, state, label, destination, country
@belloabdulmuizz9156
@belloabdulmuizz9156 Жыл бұрын
@@MIAMIHACKER thank you KQL commands. Worked like a charm. Curious to know if you saw event_count while setting up the Map also?
@MIAMIHACKER
@MIAMIHACKER Жыл бұрын
@@belloabdulmuizz9156 nope, still working on setting up the map.
@callums8138
@callums8138 10 ай бұрын
@@MIAMIHACKER Does this change what query I run in the workbook? The one Josh provided isnt working
@sieffy91
@sieffy91 3 жыл бұрын
Glad I stumbled across this! I work in the Microsoft space (MSFT partner) and we're slowing moving away from just a UC shop to encompass the entire M365 suite (and eventually Azure security), so this is extremely helpful! Hope you continue to do more content like this!
@JoshMadakor
@JoshMadakor 3 жыл бұрын
Hey! I'm glad you like the content. I'm sure I will do more like this in the future. I really enjoy SIEM/live stuff. Seeing people try to break into my stuff is really hilarious lol
@Geomaverick124
@Geomaverick124 3 жыл бұрын
This was a very interesting sim. I will remember to recommend it to those looking to get into cyber security. Are there other projects that you can create for experience?
@JoshMadakor
@JoshMadakor 3 жыл бұрын
Hey man! Yeah, I'm going to make a few more, but right now I have a playlist with a few technical demos! Check it out: kzbin.info/aero/PLqBeiU46hx1H--SNfTrohTOWeqkK-M2Y0
@japanesecinema6736
@japanesecinema6736 3 ай бұрын
I watched the video and I'm gonna tackle the lab soon. Very cool!
@calculated4927
@calculated4927 Жыл бұрын
Hello Josh, thank you so much for taking the time to make videos like these. I plan to do a few of your projects to beef up my resume. But when doing this one, I keep getitng the error saying that I can't connect to the VM with an RDP. I've run all the necessary tests and it should be up and running, but something is keeping me from connecting. I have even tried it with my firewall completely turned off and still nothing. Getting error code 0x204. I even bought Pro just for this and it still isn't working :/
@yahyamaneer931
@yahyamaneer931 Жыл бұрын
Did you manage to fix this??
@nappy203
@nappy203 Жыл бұрын
I'm having the same issue.
@TheExaltedHerobrine
@TheExaltedHerobrine 2 жыл бұрын
Man these labs really need attention from the cybersecurity audience.
@JoshMadakor
@JoshMadakor 2 жыл бұрын
I can only hope! lol
@AlexHernandez-ml7we
@AlexHernandez-ml7we Жыл бұрын
Pretty nice, thanks for sharing, I am not a cybersecurity, but l would love to try this. This is vey cool.
@noahshrader4440
@noahshrader4440 2 жыл бұрын
Hey Josh. When creating the custom log, the Log Analytics Workspace keeps throwing the error, "Query could not be parsed at '' on line [3,0] Token: Line: 3 Position: 0" when I try to run the custom log. It throws the same error for all commands including the Security event. Any ideas? Edit: I had to run the logs from Sentinel and not the LAW. Talked to the support team and it was a weird bug. Everything else went great. Thanks so much for the help. I am going to school in the fall for cybersecurity at a local college. You have inspired me! Looking forward to the next video!
@danielopara1006
@danielopara1006 2 жыл бұрын
Hi Noah, I am currently facing this problem and I tried running the logs from Sentinel and returns the same error message.
@okuneyevictor6426
@okuneyevictor6426 2 жыл бұрын
@@danielopara1006 did you get it fixed? Im having problems with same error but in LAW and sentinel. if you got it fixed, can you share the solution here? thanks
@maxwellab4519
@maxwellab4519 2 жыл бұрын
@@okuneyevictor6426 same here
@mattmalott9489
@mattmalott9489 2 жыл бұрын
hey guys, you have to delete the lines below the first line. Only the first line in your query should be showing. He mumbles something about it if you watch that part again.
@owensirois3881
@owensirois3881 Жыл бұрын
Thank you so much for this video. I cannot stress enough how much you have done for my professionalism and resume. You are the man!!!
@MrKeKsst
@MrKeKsst 2 жыл бұрын
Dump question but how do we make sure that nobody actually get to log on into the machine by brute forcing the password/exploiting other weaknesses ?
@JoshMadakor
@JoshMadakor 2 жыл бұрын
It's not a dumb question at all! There are a couple options: 1) Using 2-factor-authentication somehow (windows hello, etc) 2) Using a password lockout policy that will lock the account after x-failed attempts 3) Using a really strong password helps. And remember, there is always a way in if the attacker has enough time and money :)
@vpatterson87
@vpatterson87 Жыл бұрын
Hey everyone, I know I'm a bit late to the party on this project, but I just finished it up today (12/15/2023)! Due to some recent changes in the Microsoft Azure portal, the setup process is slightly different now compared to what you might have seen earlier this year. However, the overall steps are still quite similar. Big thanks to @Josh Madakor for this awesome lesson - I learned a ton!
@psychog3520
@psychog3520 11 ай бұрын
Hi, how many hours did it take you? Asking to see if I can get the project done using the free credit from Azure.
@weavingthevaluess
@weavingthevaluess 9 ай бұрын
hey man how did you do the 'Extract Fields' part at 16:20? cant seem to find how to create new fields 😭
@JohnCutter317
@JohnCutter317 2 жыл бұрын
The three dots next to the logs aren't there anymore and you don't have to expand the field just right click the title of log to extract
@lesandjackonwriting
@lesandjackonwriting 2 жыл бұрын
Thanks for pointing that out.
@ArtisticByte-i6h
@ArtisticByte-i6h 3 ай бұрын
Further to my comment below a couple minutes ago, During the first try of setting up custom log, I was able to ingest the logs in log analytics. I could see the output to the query "Failed_RDP_Log_Geo_CL" but then trying to extract the fields from it never worked. So, I tried creating the new custom log (DCR-based) but this was way too difficult for me.... Anyhoo, appreciate all the help you have been providing. Cheers Josh
@Makonnen92
@Makonnen92 Жыл бұрын
How the hell do we 'extract fields' ??? I'm stuck smh
@JoshMadakor
@JoshMadakor Жыл бұрын
Sorry, Microsoft deprecated this :(
@Makonnen92
@Makonnen92 Жыл бұрын
@@JoshMadakor 😢
@homeland_fitness8431
@homeland_fitness8431 Жыл бұрын
@@JoshMadakor Is there an alternative ?
@MrZaytova
@MrZaytova Жыл бұрын
Appreciate the video. Great and clear information. Really enjoyed getting some exposure to Azure Sentinel as well as a data from active attacks.
@JoshMadakor
@JoshMadakor Жыл бұрын
Hehe thank you, glad you enjoyed that
@AdityaKumar-ei4ch
@AdityaKumar-ei4ch Жыл бұрын
2 minutes into this video and its awesome! waiting for new videos Josh! Thankyou!!
@abdulkadirosman2816
@abdulkadirosman2816 9 ай бұрын
Half way through and it's a great tutorial. I tried geolocating my IP address on the website you recommended and it said Birmingham UK when I live in London UK. There are other websites that came within a couple miles though!
@anthonymolina6461
@anthonymolina6461 3 жыл бұрын
Great video Josh! This was a lot of fun to set up. Love how well you explain everything
@JoshMadakor
@JoshMadakor 3 жыл бұрын
Hey Anthony, glad you liked it!! And thank you :). I will expand on this lab some time in the future :p
@nickbrutanna9973
@nickbrutanna9973 Жыл бұрын
One obvious thing you can do to help you think which machine you are on (your native machine or the VM) is to change the appearance of the VM from your native one -- change the fonts it uses for display, some of the colors, things like that, so it looks radically different from your "normal" machine. Your brain will learn to key in on this info automatically, so it won't attempt to let you do something "in the wrong place".
@cheviot2988
@cheviot2988 2 жыл бұрын
Bro this is so much fun, I've got two from Iran a few hundred from the netherlands and even a few from my own country UK :) this was a really great video thank you
@cybermom3330
@cybermom3330 Ай бұрын
Great video!
@JoshMadakor
@JoshMadakor Ай бұрын
Thank you! I'm thinking to update this in the near future!
@ausmanx1161
@ausmanx1161 3 жыл бұрын
Great video! I just finished this project last night and it was a fun awesome experience. You did a great job instructing us through and explaining each step. I’m going to make write my first blog post, thank you for all you do and your videos!
@JoshMadakor
@JoshMadakor 3 жыл бұрын
Heck yeah, good job setting it up. This was one of my favorite ones so I'm glad you liked it. GL with the blog post. I'm uploaded a video (not yet live) where I go over sample resume and a sample blog that includes this lab. Feel free to check it out ahead of time :) kzbin.info/www/bejne/j5Ckqnt4qbZgi5o
@ausmanx1161
@ausmanx1161 3 жыл бұрын
@@JoshMadakor definitely watching that video rn, it implies directly to me also, thank you!
@jamesharden1495
@jamesharden1495 7 ай бұрын
Hello could you help me please I can’t seem to get the custom logs to have the query and run panel at the top ?
@Sadie_Studies
@Sadie_Studies 2 жыл бұрын
Gonna try this out today ! I just spun up two VMs yesterday
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Cool! Good luck with it! I know the Azure Portal has changed a bit since I made this video, but there are some comments talking about how to navigate it
@michaelbrown7142
@michaelbrown7142 2 жыл бұрын
Thanks Josh, this helped to understand how we can track cyber attacks.
@JoshMadakor
@JoshMadakor 2 жыл бұрын
For sure!!! Ty for watching :) (also Ty for taking the time to comment!)
@hrishikeshkshirsagar6738
@hrishikeshkshirsagar6738 2 жыл бұрын
Josh Kudos for your efforts.. this is brilliant..
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Thanks so much!! I hope to do another, more updated lab like this!
@kad151
@kad151 2 жыл бұрын
Great content. Thanks again for this tutorial with this parctice lab. This was a well worth 52:44 time.
@shuttlecrab
@shuttlecrab 2 жыл бұрын
Great video man, was really fun following along you this. Invaluable stuff, thank you very much
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Hey! Glad you enjoyed the lab. This was probably my favorite video to make. Love watching people try to break into stuff, it's hilarious lol
@rhmcneil
@rhmcneil 3 жыл бұрын
Thanks for the excellent video man. I had some trouble with setting up Azure Defender as the process you explained changed literally in the short timeframe in which you uploaded this video. I stayed with it thou and eventually found the section to enable it for my test vm and was able to follow all of the other steps with no problems. Currently studying the SSCP and just listened to a DarkNet diary per your recommendation in another one of your videos. So glad YT recommended you man, keep doing your thing.
@JoshMadakor
@JoshMadakor 3 жыл бұрын
Ah yeah, omg defender seriously changed right when I released this. I knew that would happen. I'll have to research it and pin a comment or something lol 😩. Glad you did the lab! Hope it was fun! . Glad you found the channel! Thanks for watching and best of luck :) (Darknet is so dope, haha)
@Kevin-zy5jm
@Kevin-zy5jm 3 жыл бұрын
Hey @MackXXI, where’d you find it? I can’t get to security center… I’m stuck!
@rhmcneil
@rhmcneil 3 жыл бұрын
@@Kevin-zy5jm so I kind if stumbled upon after going through different sections of the azure portal. It’s on the bottom of the page of either Azure Sentinel or Log Analytics workspaces if I recall correctly. Sorry, I should have better documented what I did since things changed up.
@TheMocutMiester
@TheMocutMiester 2 жыл бұрын
Great content. Your channel will blow up in 2 years 100% guaranteed.
@istaahify
@istaahify 2 жыл бұрын
this channel has been a god send for me!
@melvinesteban8773
@melvinesteban8773 Жыл бұрын
Thank you so much, Josh for this content. This was a very awesome lab to follow along to. Happy New Year!
@humoful
@humoful Жыл бұрын
Bro awesome content keep making impressions you are helping lots of people
@glory-okwata
@glory-okwata Жыл бұрын
In love with this channel
@JoshMadakor
@JoshMadakor Жыл бұрын
Really appreciate that
@DeepFriedFrog516
@DeepFriedFrog516 2 жыл бұрын
Thank you so much for this!! You kept it so simple and straight forward.
@ibrahimYODA-qk1ng
@ibrahimYODA-qk1ng 5 ай бұрын
for anyone having troubles with security center type data collection rules in azure search bar then click create and set your window event logs ingestions rules right there also for custom logs to be ingested you have to create another DCR with a data collection endpoint with a path pointing to the failed_rdp.log . To make it simple monitor section is the new security center in Azure. Lastly make sure you rdp into your windows vm and run the log exporter powershell script if you're not getting the failed_rdp_with_geo log populated in azure
@karthikrenganathan173
@karthikrenganathan173 5 ай бұрын
Hello @ibrahimYODA-qk1ng I am encountering another issue after fetching the Event Viewer logs from the VM and transferring them to the user's Windows machine. I created a custom log table and proceeded with the custom logs and steps. When I started using the Logs option in Log Analytics and performed the SecurityEvent query, it returned "No results found." Could you kindly guide me on this? I am unable to view the event logs when running the query as discussed at 24:16. Please support me with these steps.
@arafathazeem6537
@arafathazeem6537 2 жыл бұрын
I did this on my home lab and I'm curious to do more tweaking on sentinel. Keep up the good work and thanks for sharing this valuable content. It helps security professionals and cloud engineers to break into job market or learn a new tech. You're the best.
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Thanks so much for the kind words! really appreciate it. I will def develop some more content like this in the future :)
@QuoVadisGates
@QuoVadisGates 5 ай бұрын
Thanks a lot… this is on my resume, LinkedIn and I will do a video recap. Appreciate it
@romeofongang6995
@romeofongang6995 Жыл бұрын
Hi Josh, you make me wish to do Cyber security. Keep up with the good work.
@robelseyum162
@robelseyum162 2 жыл бұрын
Hey josh, please create more videos like this. This is really helpful.
@JoshMadakor
@JoshMadakor 2 жыл бұрын
Thanks so much! Glad you like it. I will def create some more at some point
@melroy16
@melroy16 Жыл бұрын
Thank you Josh , Took me an entire day getting this done , but hats off to you . Amazing content , will definitely be getting this on my Cv .
@crownfelicia6202
@crownfelicia6202 Жыл бұрын
Oh now I don’t feel bad lol about taking forever I’m so lost
@nappy203
@nappy203 Жыл бұрын
Hey man. I'd really appreciate it if you could tell me how you extracted the fields from the custom logs. I've been stuck on this since yesterday.
@hishamaqueel432
@hishamaqueel432 Жыл бұрын
@@nappy203 yea me too
@dummyahh8470
@dummyahh8470 Жыл бұрын
Just finished this lab! THX you so much. I am going to put this on my resume. I definitely think this will help since i just got my sec+
coco在求救? #小丑 #天使 #shorts
00:29
好人小丑
Рет қаралды 100 МЛН
Get Started with Azure Sentinel
18:22
Andy Malone MVP
Рет қаралды 43 М.
TOP 50 Cybersecurity Interview Questions and Answers 2024
1:20:12
Josh Madakor
Рет қаралды 105 М.
Beginner's Guide to the Bash Terminal
1:14:37
Joe Collins (EzeeLinux)
Рет қаралды 2,3 МЛН
Video-1 AWS VPC Part 1 [ EC2 Instance, Security Group, Public Subnet, Elastic IP ]
46:00
you need this FREE CyberSecurity tool
32:06
NetworkChuck
Рет қаралды 1,3 МЛН
How to get into Cybersecurity with NO Experience - The Ultimate Guide
23:28
coco在求救? #小丑 #天使 #shorts
00:29
好人小丑
Рет қаралды 100 МЛН