Building a Honeynet in Azure With Azure Sentinel (SIEM)
In this guide, I’ll walk you through setting up a honeypot, capturing real-world attack attempts, forwarding logs to a SIEM, visualizing attacker locations using Microsoft Sentinel and implementing automated security responses to detect and mitigate threats in real-time.
Step 1: Setting Up an Azure Environment
- Get an Azure Subscription
- Sign up for Azure Free Subscription.
- If you’re unable to get a free account, consider:
- A pay-as-you-go subscription (monitor costs carefully).
- Log in to the Azure Portal.
Step 2: Deploying a Honeypot (Azure Virtual Machine)
- Create a resource group
- Create a Virtual Network
- Create a Windows 10 VM
- Select Windows 10 as the operating system.
- Choose an affordable VM size to avoid high costs.
- Set up a username and password for remote access.
- Modify the Network Security Group (NSG) to allow all inbound traffic.
- Deploy the VM.
- Disable Windows Firewall
Run wf.msc
and turn off all profiles.
Step 3: Monitoring logs in Event Viewer
- Capturing Failed Logins
Fail some login attempts when logging to windows VM.
Now login to the VM.
In event viewer (eventvwr.msc)
you can see the failed login attempts we made.
Navigate to Windows Logs > Security to analyze failed login attempts (Event ID 4625).
Step 4: Forwarding Logs to Microsoft Sentinel
- Set Up Log Analytics Workspace (LAW)
In Azure, create a Log Analytics Workspace.
Deploy Microsoft Sentinel and link it to the LAW.
Enable the Windows Security Events via AMA connector.
Set up a Data Collection Rule (DCR) to send logs from the VM.
Step 5: Querying Logs with KQL
Once logs are collected in Microsoft Sentinel, we can analyze them using Kusto Query Language (KQL) to extract valuable insights.
- Retrieving Failed Login Attempts
SecurityEvent
| where EventID == 4625
| order by TimeGenerated desc
This command retrieves all failed login attempts in descending order of time.
- Filtering by Specific Account Name
SecurityEvent
| where EventID == 4625
| where Account == "\\ADMINISTRATOR"
| order by TimeGenerated desc
This query isolates failed login attempts targeting the \ADMINISTRATOR
account in descending order.
- Identifying Top Attacking IPs
SecurityEvent
| where EventID == 4625
| summarize Count = count() by IpAddress
| order by Count desc
This helps identify which IP addresses are attempting the most failed logins.
- Detecting Brute-Force Attacks (Multiple Failures in a Short Time Frame)
SecurityEvent
| where EventID == 4625
| summarize FailedAttempts = count() by bin(TimeGenerated, 10m), IpAddress
| order by FailedAttempts desc
This groups failed login attempts by 10-minute intervals, helping detect brute-force attack patterns.
Step 5: Enhancing Logs with Geolocation Data
- Importing GeoIP Data for Better Analysis
- Download geoip-summarized.csv (contains IP-to-location mapping).
- Upload the file as a Sentinel Watchlist:
- Watchlist Name:
geoip
- Search Key:
network
- Watchlist Name:
- Wait for full import (~54,000 records).
- Enhancing logs with Locations
let GeoIPDB_FULL = _GetWatchlist("geoip");
let WindowsEvents = SecurityEvent
| where EventID == 4625
| order by TimeGenerated desc
| evaluate ipv4_lookup(GeoIPDB_FULL, IpAddress, network);
WindowsEvents
This enriches log data by mapping attacker IP addresses to real-world locations.
Step 6: Creating a Visual Attack Map in Sentinel
- Building the Attack Visualization
- Open Sentinel > Workbooks.
- Create a new Workbook and enter the advanced editor.
- Paste the JSON code for the attack map.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
{
"type": 3,
"content": {
"version": "KqlItem/1.0",
"query": "let GeoIPDB_FULL = _GetWatchlist(\"geoip\");\nlet WindowsEvents = SecurityEvent;\nWindowsEvents | where EventID == 4625\n| order by TimeGenerated desc\n| evaluate ipv4_lookup(GeoIPDB_FULL, IpAddress, network)\n| summarize FailureCount = count() by IpAddress, latitude, longitude, cityname, countryname\n| project FailureCount, AttackerIp = IpAddress, latitude, longitude, city = cityname, country = countryname,\nfriendly_location = strcat(cityname, \" (\", countryname, \")\");",
"size": 3,
"timeContext": {
"durationMs": 2592000000
},
"queryType": 0,
"resourceType": "microsoft.operationalinsights/workspaces",
"visualization": "map",
"mapSettings": {
"locInfo": "LatLong",
"locInfoColumn": "countryname",
"latitude": "latitude",
"longitude": "longitude",
"sizeSettings": "FailureCount",
"sizeAggregation": "Sum",
"opacity": 0.8,
"labelSettings": "friendly_location",
"legendMetric": "FailureCount",
"legendAggregation": "Sum",
"itemColorSettings": {
"nodeColorField": "FailureCount",
"colorAggregation": "Sum",
"type": "heatmap",
"heatmapPalette": "greenRed"
}
}
},
"name": "query - 0"
}
- Save it as Win-Attack-Map.
- Customize map settings for a better view.
- Observing the Attack Trends
- The attack map plots incoming failed logins by location.
- Patterns emerge, identifying high-activity attack regions.
- This visualization provides valuable insights into global cyber threats.
Step 7: Automating Security Responses
- Configuring Sentinel Alerts
Automating alert mechanisms in Microsoft Sentinel ensures a swift response to potential security threats.
1. Create an Alert Rule in Microsoft Sentinel
- Go to Microsoft Sentinel in the Azure Portal.
- Navigate to Analytics > Create a New Rule.
- Choose Scheduled Query Rule and configure:
- Rule Name: “Multiple Failed Logins Alert”
- Query:
SecurityEvent
| where EventId == 4625
| summarize FailedAttempts = count() by bin(TimeGenerated, 10m), IpAddress
| where FailedAttempts > 5
- Trigger: When more than 5 failed login attempts occur from the same IP .
- Severity: Set to Medium or High based on your security policy.
- Action: Select Create an Incident.
This alert helps detect brute-force login attempts, allowing security teams to take action before a successful compromise.
2. Set Up an Automated Playbook to Send Emails
This can’t be done with a azure Free trial subscription.
To send an email when this alert is triggered, use Azure Logic Apps to create an automated Playbook.
- In Microsoft Sentinel, go to Automation > Playbooks.
- Click Create a Playbook.
- Select Blank Logic App.
- Choose When an alert is triggered in Microsoft Sentinel as the trigger.
- Add an Office 365 Outlook or SendGrid Email action:
- Select Send an email (V2).
- Configure:
- To: Security team email (e.g.,
security@example.com
). - Subject: “Security Alert: Multiple Failed Login Attempts Detected!”
- Body: Include dynamic alert details such as IP address and time.
- To: Security team email (e.g.,
- Save and enable the Playbook.
3. Link the Playbook to the Alert Rule
- Go back to Sentinel > Analytics.
- Open the alert rule you created.
- Under Automated response, select Add Playbook.
- Choose the Playbook you created and save.
Conclusion
What We Achieved
- Built an Azure-based Honeynet to capture real attacks.
- Forwarded logs to Microsoft Sentinel for centralized monitoring.
- Used GeoIP data to track attacker locations.
- Created a visual attack map to analyze real-time threats.
- Implemented automated alerts and incident response mechanisms.
Why This Matters
- This setup mirrors real-world SOC environments, making it invaluable for security professionals.
- Monitoring live attacks gives hands-on threat analysis experience.
- The skills learned here—KQL queries, Sentinel integration, threat hunting
What’s Next?
Who knows, I will be Back !