This project is a hands-on lab simulating automated incident response using Microsoft Defender for Endpoint, Microsoft Sentinel, and Logic Apps. The purpose is to demonstrate how security alerts can be detected, tagged, and responded to automatically using scalable and practical SOAR capabilities.
- Connect a virtual machine to Microsoft Defender for Endpoint.
- Simulate real-world attacks (e.g., failed logons, brute-force).
- Detect incidents using Microsoft Sentinel analytics rules.
- Trigger automated responses using Logic Apps and Automation Rules.
- Send formatted email alerts containing incident details.
| Tool | Purpose |
|---|---|
| Microsoft Defender for Endpoint | Endpoint protection & detection |
| Microsoft Sentinel | SIEM for detection & alert correlation |
| Logic Apps | Automated playbook to send email alerts |
| Azure VM (Windows) | Target system for simulating attacks |
-
VM Onboarding
A Windows VM was onboarded to Microsoft Defender for Endpoint using Microsoft security portal. -
Alert Simulation
Simulated multiple failed logon attempts and brute-force behaviors to trigger alerts. -
Analytics Rules
Custom scheduled rules were created in Microsoft Sentinel to detect:- Multiple failed logons
- Brute force behavior
-
Automation Rules
Automation rules were defined to trigger Logic Apps when an alert or incident is created. -
Logic App (Playbook)
The playbook sends an email containing:- Alert name
- Severity
- Description
- Alert timestamp
π‘ Emails were formatted professionally using HTML.
All screenshots from Logic App workflow, automation rule, Sentinel alerts, and sample email are stored in the structured folders above for clarity and traceability.
Defender-Automated-Incident-Lab/
β
βββ README.md
βββ /Defender
β βββ 3.Defender-Onboard.png
β βββ 4.EICAR-Detection.png
β βββ 5.EICAR-Attack-Graph-Details.png
βββ /Playbook
β βββ 6.Logic-App-Design.png
β βββ 7.logic-App-Run
β βββ 8.Automation-Rule.png
β βββ 9.Email-Alert
β βββ 10.Run-History.png
βββ /Sentinel
βββ 1.Analytics-Rule.png
βββ 2.Sentinel-Alert.png
βββ AnalyticsRules.kql
- Emails were successfully triggered for each simulated alert.
- Logic App executed within milliseconds.
- Demonstrated integration between Microsoft Sentinel and Defender for automated response.
Melissa Jahani
π§ melissajahani@gmail.com
π LinkedIn
π» GitHub
β Star this repo if you found it helpful, and feel free to contribute ideas or improvements!