SIEM&XDR Demo Guide v1.2 February2023
SIEM&XDR Demo Guide v1.2 February2023
This document does not provide you with any legal rights to any intellectual property in any Microsoft product.
You may copy and use this document for your internal reference purposes.
Table of Contents
Table of Contents................................................................................................................................................... 2
What’s New............................................................................................................................................................ 3
Demo Instructions.................................................................................................................................................. 4
How to enable and access the XDR & Sentinel Demo............................................................................................................... 4
How to find relevant Demo scenarios.............................................................................................................................................. 4
How to use this demo............................................................................................................................................................................. 4
Microsoft 365 Defender (XDR) & Microsoft Sentinel Integration....................................................................5
Security Operations Demo Deep Dive.............................................................................................................................................. 6
Attack Story – AiTM Phishing........................................................................................................................................................... 6
Demo Delivery....................................................................................................................................................................................... 8
Step 1: Triage incident in Microsoft Sentinel............................................................................................................................... 9
Step 2: Investigate attack in Microsoft 365 Defender............................................................................................................ 12
Step 3: Complete investigation in Microsoft Sentinel............................................................................................................ 18
Step 4: Resolve incident in Microsoft Sentinel.......................................................................................................................... 23
Conclusion............................................................................................................................................................ 24
2
What’s New
February 2023 Update instructions to access the environment for MS employees
New attack story – AiTM Phishing
November 2022
Microsoft 365 Defender & Microsoft Sentinel SecOps demo
3
Demo Instructions
How to enable and access the XDR & Sentinel Demo
Tenant: ContosoHotels (seccxpninja.onmicrosoft.com)
Microsoft Internal: Using your Microsoft account, request access from https://aka.ms/M365dDemoAccess to
access the tenant using our B2B connection: This will allow you to access all the features of this demo. Once
your request has been automatically approved (within seconds), make sure you switch the Directory / Tenant
from Microsoft to contosohotels as shown on the screenshot below. If you don’t see it, Sign-out from the Azure
portal and login again. If you need our help, you can contact us at the bottom of this page.
Partners: Credentials will be provided through the CDX experience card. These credentials will change daily at
6:00 am UTC. To obtain the daily password to enable you to access the shared demo environment, please do
the following:
1. Open the Microsoft Sentinel & Microsoft 365 Defender (SIEM & XDR)
2. Enter and select a customer in the customer field
3. Click Add
4. Click Start
5. Accept the Terms of Use by checking the box and click Accept and Continue
6. Click on Launch after it appears and click Accept and Continue again
7. A new window containing login credentials will open on the right side of your screen
If you are logged in with credentials when the new daily password is generated, your session will not be
terminated. However, if your session times out after the password is changed, you will need to obtain the new
daily password to log in again.
We’ve given you rights to perform actions on the environment for you to have a more complete experience to
show to your customers, please revert any changes you made, and do not interfere with “DoNotTouch” entities.
5
Microsoft 365 Defender (XDR) & Microsoft Sentinel Integration
Microsoft Sentinel's Microsoft 365 Defender incident integration allows you to stream all Microsoft 365
Defender incidents into Microsoft Sentinel and keep them synchronized between both portals. Incidents from
Microsoft 365 Defender include all associated alerts, entities, and relevant information, providing you with
enough context to perform triage and preliminary investigation in Microsoft Sentinel. Once in Sentinel,
incidents will remain bi-directionally synced with Microsoft 365 Defender, allowing you to take advantage of
the benefits of both portals in your incident investigation. More information on M365 Defender integration
with Sentinel is available on this link: Microsoft 365 Defender integration with Microsoft Sentinel | Microsoft
Learn
This integration gives Microsoft 365 security incidents the visibility to be managed from within Microsoft
Sentinel, as part of the primary incident queue across the entire organization, so you can see – and correlate –
Microsoft 365 incidents together with those from all your other clouds, third party services or applications and
on-premises systems. At the same time, it allows you to take advantage of the unique strengths and
capabilities of Microsoft 365 Defender for in-depth investigations and a Microsoft 365-specific experience
across the Microsoft 365 ecosystem. Microsoft 365 Defender enriches, and groups alerts from multiple
Microsoft 365 products, both reducing the size of the SOC’s incident queue and shortening the time to resolve.
The component services that are part of the Microsoft 365 Defender stack are:
Other services whose alerts are collected by Microsoft 365 Defender include:
6
Security Operations Demo Deep Dive
Attack Story – AiTM Phishing
This demo story is based on the AiTM (Adversary in The Middle) Phishing attack.
Find more about this attack in Microsoft Security Blog.
Polly Watkins is working as a cloud architect in the Azure Infrastructure department, when she receives and
opens a spear phish email from someone who was impersonating a co-worker. She clicks on the link in the
email on Workstation 8, which redirects to attacker’s proxy that impersonates a Microsoft login page
(login.microsoftonline.com). After Polly enters her credentials and successfully authenticates via MFA, the
attacker obtains the session cookie (ESTSAUTH) and successfully authenticates to a session on the user’s behalf
to both the Office 365 & Azure Portal from a TOR IP Address. In the Office 365 portal, the attacker creates a
forwarding rule in Polly’s inbox to exfiltrate her email messages. In the Azure Portal, the attacker leverages
Polly’s privileged permissions for a specific resource group to create a new Azure storage container and
uploads a weaponized Microsoft Word document. The attacker generates a URL to the document with a
Shared Access Signature (SAS key and sends an internal phishing email to Karla Dickens, working in the Sales
Department. Karla receives and opens the email and clicks on the link to download the document on
Workstation 6. The document contains a malicious macro that executes a PowerShell script to create a
backdoor via the task scheduler.
7
Attack Steps
Steps Details
Phishing email sent (link is safe) to Dan and Polly
1
Link is weaponized
2 Polly clicks on the link
3 Polly’s ESTSAUTH Cookies stolen
4 Polly’s ESTSAUTH Cookies imported in session
5 The attacker creates an inbox forwarding rule in Polly’s email account in Office 365
The attacker creates a new container in an Azure Storage account in the Azure Portal
6
The attacker uploads a malicious file to the container, and generates an URL w/ SAS key
7 The attacker (as Polly) sends an internal phishing email to Karla including link to file
8 Karla clicks on the link, downloads file, and executes the payload
9 Backdoor created in endpoint via task scheduler
8
Demo Delivery
Log in to the Microsoft Sentinel portal with the following credentials
After you have signed into the portal, you can stage the correct incident list view by performing the following
steps:
9
Step 1: Triage incident in Microsoft Sentinel
In this demo we will conduct a blue team exercise, deep diving into every step taken in the AiTM phishing
attack, to fully narrate the attack story.
Important: Entity information highlighted (ex. URLs, email subject, Azure storage container name, IP Address) is
subject to change on every attack execution.
10
This incident is composed of all the Microsoft 365 Defender
stack, and the alerts cover all the MITRE categories.
Investigation insights
- Multistage targeted attack may have occurred
From the Entities list, we can see that Microsoft Azure is part
of this incident, which needs to be investigated.
4. Navigate to the Entities, scroll down to find
Top insights in the right pane provides great insights for Microsoft Azure but do not click
entities of an incident, including VIP information from
watchlist, IP reputation, anomalies seen for an account, etc. 5. In the Entities, search for adm_pwatkins and
navigate to the Top Insights on the right of
In the Activity Log, output results of the following the page
playbooks are included. 6. Expand the insights below
- Watchlist Insights (Preview) for
- IP reputation: Get virus total Ip reputation of all external Ips adm_pwatkins
associated to the incident, and the geo location of each IPs
Reputation is the IP's score calculated from the votes of the
VirusTotal's community.
- User Account Risk Details: Get risk details from the
IdentityInfo table of all users associated to the incident
- Threat Indicators related to user
- Endpoint Health Status: Get endpoint security configuration
status from Microsoft Defender for Vulnerability
Management of all devices associated to the incident
Investigation insights
- Misconfigured device: Workstation6 (Realtime Protection &
8. Navigate to the results of each playbook
Cloud Protection are turned OFF)
results
- VIP User: adm_pwatkins
a. Virus Total IP Reputation
*As polly has high privileges, added to the VIP watchlist
b. User Account Risk Details
- User at Risk
11
- Karla: High risk, Confirmed Compromised c. Endpoint Health Status
- Polly (admin): Medium risk, At Risk
- Multiple malicious URLs / IPs are related to adm_pwatkins
- Multiple IP Address with Reputation under 0 in Virus Total >
malicious indication
- Microsoft Azure is part of the incident and needs to be
investigated
As there are high risks for user Polly and Karla, let’s take the
steps to block both user accounts in Azure AD.
12
Step 2: Investigate attack in Microsoft 365 Defender
In the email entity page, we see that same email 7. Click on Open email entity from the alert details
was delivered to another user.
14
If you pin all the alerts above, you will see that
suspicious sign-ins coming from different IP are
related to adm_pwaktins account.
Later, we will investigate further in Microsoft 27. Click on any Log on Activity (bottom pane) and point
Sentinel what exactly happened in the Azure out the logon details (right pane) to see that MFA has
Storage account. been successful.
16
conducting malicious/suspicious activities in
Office 365 & Microsoft Azure environment.
17
We can also see that this file is doing a network 34. Navigate then to the powershell.exe executed a script
connection to an IP that we have declared as AMSI data to clearly see the script content. Try to
malicious. highlight the fact that the script is downloading a
content that is then written to an Alternate Data Stream
named admin.exe of a file name itplaceholder.txt. And
that this file is then registered to launch with a
scheduled task at every startup and right now.
Looking into details of the related alert (either of
below)
18
36. Click on Email messages containing malicious URL
removed after delivery alert
37. Click on the message (bottom pane) to see the email
details (right pane)
Point out that this email is sent from user adm_pwatkins
to kdickens, and included a URL that user kdickens has
clicked to download and execute
(generateAccountPlan.doc).
19
Step 3: Complete investigation in Microsoft Sentinel
Note
6. Point out to the Entities
If alert is not shown under “Similar Incidents”, search for
“adm_pwatkins” from the MAIN incident page (Azure portal >
7. Click on Investigate button on the
Microsoft Sentinel > CyberSecSOC > Incidents), and make sure to bottom left of this page to view the
select Entities as the scope for search. investigation graph
Under the related entities, you can see the entities we had
investigated in Microsoft 365 Defender including blob storage,
file, user account, and an IP Address.
Note
Sentinel playbooks has 3 triggers, so make sure to run the playbook
from the correct place.
- Incident Trigger
- Alert Trigger
- Entity Trigger
Important steps to execute
1. Get User Confirmation on Incident (Alert Trigger) SIEMXDR-Request-UserConfirmation
First, we want to get user’s confirmation on whether this playbook
suspicious activity was conducted by the user or not.
Note 1. Add a new task with title as below and
Though we understand that adm_pwatkins account is compromised click save
from our investigation, we want to showcase the option of getting UserConfirm youralias
user confirmation on an alert. (ex. UserConfirm tamuto)
This email is sending user confirmation to the affected user 4. Click on the ellipsis icon next to the alert,
Polly Watkins, her manager Dan Williams, and your email and click Run playbook
22
address. 5. A right pane with the list of playbooks
In the middle section, you can see the alert details including will be shown. Search for playbook
the entities. SIEMXDR-Request-UserConfirmation
On the very bottom, is where you can confirm on behalf of 6. Scroll to the very right, and click on Run
Polly whether it was her activity or not. to execute the playbook
7. An email will be sent out to your email
address (Account logged into the portal),
with details and options.
8. In the email, review the information and
click on No – this was not me button
Task
24
Step 4: Resolve incident in Microsoft Sentinel
Demo Script Instructions
After we have conducted all the necessary steps for this Note
incident, we can close this incident. - DO NOT conduct this step
25
Conclusion
In this demo, we have demonstrated the value of Microsoft 365 Defender, together with Microsoft Sentinel,
allowing security teams to effectively monitor and hunt for incidents in their environment and take action to
prevent attacks from recurring.
For more information about the integration of Microsoft Defender with Microsoft Sentinel and resources to
help you demonstrate the value to your customers, visit this link Microsoft 365 Defender integration with
Microsoft Sentinel | Microsoft Learn.
An interactive guide to detect and respond to modern attacks with unified SIEM and XDR capabilities
Microsoft 365 Defender integration with Microsoft Sentinel
Join our Microsoft Security Community
Microsoft 365:
An interactive guide to show how users can Protect their organization with Microsoft 365 Defender
Security Resources for Microsoft 365 Defender including white papers and webinars
Microsoft 365 Defender Blog and Tech Community
Microsoft Sentinel:
26