<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Hyacienth Ugochukwu</title>
    <description>The latest articles on Forem by Hyacienth Ugochukwu (@vincenthyacienth).</description>
    <link>https://forem.com/vincenthyacienth</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1152667%2F4d526147-47a2-4166-a59a-b7dc98762ca6.png</url>
      <title>Forem: Hyacienth Ugochukwu</title>
      <link>https://forem.com/vincenthyacienth</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/vincenthyacienth"/>
    <language>en</language>
    <item>
      <title>How To Record And Resolve Domain Names Internally</title>
      <dc:creator>Hyacienth Ugochukwu</dc:creator>
      <pubDate>Thu, 05 Sep 2024 13:14:16 +0000</pubDate>
      <link>https://forem.com/vincenthyacienth/how-to-record-and-resolve-domain-names-internally-oem</link>
      <guid>https://forem.com/vincenthyacienth/how-to-record-and-resolve-domain-names-internally-oem</guid>
      <description>&lt;p&gt;In this article, we will discuss how to; create and configure a private DNS zone, create and configure DNS records, and, configure DNS settings on a virtual net.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Create a private DNS zone&lt;/strong&gt;&lt;br&gt;
Azure Private DNS provides a reliable, secure DNS service to manage and resolve domain names in a virtual network without adding a custom DNS solution. Private DNS zones allow you to use your custom domain names rather than the Azure-provided ones available today.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;On the portal search bar, type Private DNS zones in the search text box and select Private DNS zones from the results.&lt;/li&gt;
&lt;li&gt;Select + Create.&lt;/li&gt;
&lt;li&gt;On the Basics tab of Create private DNS zone, enter the information listed below:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Subscription    &lt;strong&gt;Select your subscription&lt;/strong&gt;&lt;br&gt;
Resource group  &lt;strong&gt;YOUR RESOURCE GROUP&lt;/strong&gt;&lt;br&gt;
Name    &lt;strong&gt;contoso.com&lt;/strong&gt;&lt;br&gt;
Region  &lt;strong&gt;East US&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select Review + Create and then select Create.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Create a virtual network link to your private DNS zone&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;On the portal search bar, type Private DNS zones in the search text box and select Private DNS zones from the results.&lt;/li&gt;
&lt;li&gt;Select contoso.com.&lt;/li&gt;
&lt;li&gt;Select + Virtual network link.&lt;/li&gt;
&lt;li&gt;Select + Add&lt;/li&gt;
&lt;li&gt;On the Basics tab of Create Virtual Network link, enter the information listed below:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Link name   &lt;strong&gt;app-vnet-link&lt;/strong&gt;&lt;br&gt;
Virtual network &lt;strong&gt;app-vnet&lt;/strong&gt;&lt;br&gt;
Enable auto registration    &lt;strong&gt;Enabled&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select OK&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Create a DNS record set&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;On the portal search bar, type Private DNS zones in the search text box and select Private DNS zones from the results.&lt;/li&gt;
&lt;li&gt;Select contoso.com.&lt;/li&gt;
&lt;li&gt;Select + Record set.&lt;/li&gt;
&lt;li&gt;On the Basics tab of Create record set, enter the information listed below:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Name    &lt;strong&gt;backend&lt;/strong&gt;&lt;br&gt;
Type    &lt;strong&gt;A&lt;/strong&gt;&lt;br&gt;
TTL &lt;strong&gt;1&lt;/strong&gt;&lt;br&gt;
IP address  &lt;strong&gt;10.1.1.4&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select OK&lt;/li&gt;
&lt;li&gt;Verify that contoso.com has a record set named backend&lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>How To Route Traffic To The Firewall</title>
      <dc:creator>Hyacienth Ugochukwu</dc:creator>
      <pubDate>Wed, 04 Sep 2024 01:49:30 +0000</pubDate>
      <link>https://forem.com/vincenthyacienth/how-to-route-traffic-to-the-firewall-3ceg</link>
      <guid>https://forem.com/vincenthyacienth/how-to-route-traffic-to-the-firewall-3ceg</guid>
      <description>&lt;p&gt;Now that a firewall is in place with policies that enforce your organization's security requirements, you need to route your network traffic to the firewall subnet so it can filter and inspect the traffic. Route tables provide control over the routing of network traffic to and from the web application. Network Traffic is subject to the firewall rules when you route your network traffic to the firewall as the subnet default gateway. Routing traffic to a firewall is the process of directing network traffic to a firewall subnet so that it can be inspected and filtered.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;We create a route table first&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Record the private and public IP address of app-vnet-firewall.
a. In the search box at the portal's top, enter Firewall. Select Firewall in the search results.
b. Select app-vnet-firewall.
c. Select Overview.
i. Record the Private IP address.
d. In the Overview pane select fwpip
e. Record the Public IP address.&lt;/li&gt;
&lt;li&gt;In the search box, enter Route tables. When the Route table appears in the search results, select it.&lt;/li&gt;
&lt;li&gt;In the Route table page, select + Create.&lt;/li&gt;
&lt;li&gt;On the Basics tab of Create Route table, enter the information as listed below:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Subscription    &lt;strong&gt;Select your subscription&lt;/strong&gt;&lt;br&gt;
Resource group  &lt;strong&gt;YOUR RESOURCE GROUP&lt;/strong&gt;&lt;br&gt;
Region  &lt;strong&gt;East US&lt;/strong&gt;&lt;br&gt;
Name    &lt;strong&gt;app-vnet-firewall-rt&lt;/strong&gt;&lt;br&gt;
Select &lt;strong&gt;Review + Create&lt;/strong&gt; and then select &lt;strong&gt;Create.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;We then associate the route table to the subnets&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the search box, enter Route tables. and select Route Tables from the search results.&lt;/li&gt;
&lt;li&gt;Select app-vnet-firewall-rt.&lt;/li&gt;
&lt;li&gt;Select Subnets.&lt;/li&gt;
&lt;li&gt;Select + Associate.&lt;/li&gt;
&lt;li&gt;On the Associate subnet page, enter the information listed below:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Virtual network &lt;strong&gt;app-vnet (YOUR RESOURCE GROUP)&lt;/strong&gt;&lt;br&gt;
Subnet  &lt;strong&gt;frontend&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select OK.&lt;/li&gt;
&lt;li&gt;Repeat the steps above to associate the &lt;strong&gt;app-vnet-firewall-rt&lt;/strong&gt; route table to the &lt;strong&gt;backend&lt;/strong&gt; subnet in app-vnet.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Lastly, we will create a route in the route table&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the search box, enter Route tables. and select Route Tables from the search results.&lt;/li&gt;
&lt;li&gt;Select app-vnet-firewall-rt.&lt;/li&gt;
&lt;li&gt;Select Routes.&lt;/li&gt;
&lt;li&gt;Select + Add.&lt;/li&gt;
&lt;li&gt;On the Add route page, enter the information listed below:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Route name  &lt;strong&gt;outbound-firewall&lt;/strong&gt;&lt;br&gt;
Destination type    &lt;strong&gt;IP addresses&lt;/strong&gt;&lt;br&gt;
Destination IP addresses/CIDR range &lt;strong&gt;0.0.0.0/0&lt;/strong&gt;&lt;br&gt;
Next hop type   &lt;strong&gt;Virtual appliance&lt;/strong&gt;&lt;br&gt;
Next hop address    &lt;strong&gt;private IP address of the firewall recorded earlier&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select Add.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Now the outbound traffic from the front end and backend subnet will route to the firewall.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Protecting The Web Application From Malicious Traffic And Blocking Unauthorized Access</title>
      <dc:creator>Hyacienth Ugochukwu</dc:creator>
      <pubDate>Wed, 04 Sep 2024 01:08:19 +0000</pubDate>
      <link>https://forem.com/vincenthyacienth/protecting-the-web-application-from-malicious-traffic-and-blocking-unauthorized-access-5goj</link>
      <guid>https://forem.com/vincenthyacienth/protecting-the-web-application-from-malicious-traffic-and-blocking-unauthorized-access-5goj</guid>
      <description>&lt;p&gt;In this article, I will be showing the steps to take to protect the web application from malicious traffic and block unauthorized access.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;We will start by creating an Azure Firewall subnet in our existing virtual network&lt;/strong&gt;&lt;br&gt;
In the search box at the top of the portal, enter Virtual networks. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select Virtual networks in the search results.&lt;/li&gt;
&lt;li&gt;Select app-vnet.&lt;/li&gt;
&lt;li&gt;Select Subnets.&lt;/li&gt;
&lt;li&gt;Select + Subnet.&lt;/li&gt;
&lt;li&gt;Enter the following information and select Save.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Name    &lt;strong&gt;AzureFirewallSubnet&lt;/strong&gt;&lt;br&gt;
Address range   &lt;strong&gt;10.1.63.0/26&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Note: Leave all other settings as default.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next, we create an Azure Firewall&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the search box at the portal's top, enter Firewall. Select Firewall in the search results.&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Select + Create.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Create a firewall by using the following values. For any property that is not specified, use the default value.&lt;br&gt;
&lt;em&gt;Note: Azure Firewall can take a few minutes to deploy.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Resource group  &lt;strong&gt;YOUR RESOURCE GROUP&lt;/strong&gt;&lt;br&gt;
Name    &lt;strong&gt;app-vnet-firewall&lt;/strong&gt;&lt;br&gt;
Firewall SKU    &lt;strong&gt;Standard&lt;/strong&gt;&lt;br&gt;
Firewall management &lt;strong&gt;Use a Firewall Policy to manage this firewall&lt;/strong&gt;&lt;br&gt;
Firewall policy &lt;strong&gt;select Add new&lt;/strong&gt;&lt;br&gt;
Policy name &lt;strong&gt;fw-policy&lt;/strong&gt;&lt;br&gt;
Region  &lt;strong&gt;East US&lt;/strong&gt;&lt;br&gt;
Policy Tier &lt;strong&gt;Standard&lt;/strong&gt;&lt;br&gt;
Choose a virtual network    &lt;strong&gt;Use existing&lt;/strong&gt;&lt;br&gt;
Virtual network &lt;strong&gt;app-vnet (YOUR RESOURCE GROUP)&lt;/strong&gt;&lt;br&gt;
Public IP address   &lt;strong&gt;Add new: fwpip&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select Review + Create and then select Create.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;We update the Firewall Policy next.&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the search box at the portal's top, enter Firewall Policy. Select Firewall Policies in the search results.&lt;/li&gt;
&lt;li&gt;Select fw-policy.&lt;/li&gt;
&lt;li&gt;Select Application rules.&lt;/li&gt;
&lt;li&gt;Select on ”+ Application rule collection”.&lt;/li&gt;
&lt;li&gt;Use the values in the following table. For any property that is not specified, use the default value.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Name    &lt;strong&gt;app-vnet-fw-rule-collection&lt;/strong&gt;&lt;br&gt;
Rule collection type    &lt;strong&gt;Application&lt;/strong&gt;&lt;br&gt;
Priority    &lt;strong&gt;200&lt;/strong&gt;&lt;br&gt;
Rule collection action  &lt;strong&gt;Allow&lt;/strong&gt;&lt;br&gt;
Rule collection group   &lt;strong&gt;DefaultApplicationRuleCollectionGroup&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;a. Under &lt;strong&gt;Rules&lt;/strong&gt; use the values in the below&lt;/p&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Name    &lt;strong&gt;AllowAzurePipelines&lt;/strong&gt;&lt;br&gt;
Source type &lt;strong&gt;IP address&lt;/strong&gt;&lt;br&gt;
Source  &lt;strong&gt;10.1.0.0/23&lt;/strong&gt;&lt;br&gt;
Protocol    &lt;strong&gt;https&lt;/strong&gt;&lt;br&gt;
Destination type    &lt;strong&gt;FQDN&lt;/strong&gt;&lt;br&gt;
Destination &lt;strong&gt;dev.azure.com, azure.microsoft.com&lt;/strong&gt;&lt;br&gt;
and select &lt;strong&gt;Add&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Note: The AllowAzurePipelines rule allows the web application to access Azure Pipelines. The rule allows the web application to access the Azure DevOps service and the Azure website.&lt;/em&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Create a network rule collection that contains a single IP Address rule by using the values in the following table. For any property that is not specified, use the default value.&lt;/li&gt;
&lt;li&gt;Select Network rules.&lt;/li&gt;
&lt;li&gt;Select on ”+ Network rule collection”.&lt;/li&gt;
&lt;li&gt;Use the values in the following table. For any property that is not specified, use the default value.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Name    &lt;strong&gt;app-vnet-fw-nrc-dns&lt;/strong&gt;&lt;br&gt;
Rule collection type    &lt;strong&gt;Network&lt;/strong&gt;&lt;br&gt;
Priority    &lt;strong&gt;200&lt;/strong&gt;&lt;br&gt;
Rule collection action  &lt;strong&gt;Allow&lt;/strong&gt;&lt;br&gt;
Rule collection group   &lt;strong&gt;DefaultNetworkRuleCollectionGroup&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;a. Under &lt;strong&gt;Rules&lt;/strong&gt; use the values in the following table&lt;/p&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Rule    &lt;strong&gt;AllowDns&lt;/strong&gt;&lt;br&gt;
Source  &lt;strong&gt;10.1.0.0/23&lt;/strong&gt;&lt;br&gt;
Protocol    &lt;strong&gt;UDP&lt;/strong&gt;&lt;br&gt;
Destination ports   &lt;strong&gt;53&lt;/strong&gt;&lt;br&gt;
Destination addresses   &lt;strong&gt;1.1.1.1, 1.0.0.1&lt;/strong&gt;&lt;br&gt;
And select &lt;strong&gt;Add&lt;/strong&gt;.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;To verify that the Azure Firewall and Firewall Policy provisioning state shows Succeeded.&lt;/li&gt;
&lt;li&gt;In the search box at the portal's top, enter Firewall. Select Firewall in the search results.&lt;/li&gt;
&lt;li&gt;Select app-vnet-firewall.&lt;/li&gt;
&lt;li&gt;Validate that the Provisioning state has Succeeded.&lt;/li&gt;
&lt;li&gt;In the search box at the portal's top, enter Firewall policies. Select Firewall policies in the search results&lt;/li&gt;
&lt;li&gt;Select fw-policy.&lt;/li&gt;
&lt;li&gt;Validate that the Provisioning state is Succeeded &lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>How To Control The Network Traffic To And From The Web Application</title>
      <dc:creator>Hyacienth Ugochukwu</dc:creator>
      <pubDate>Tue, 03 Sep 2024 23:04:26 +0000</pubDate>
      <link>https://forem.com/vincenthyacienth/how-to-control-the-network-traffic-to-and-from-the-web-application-60</link>
      <guid>https://forem.com/vincenthyacienth/how-to-control-the-network-traffic-to-and-from-the-web-application-60</guid>
      <description>&lt;p&gt;This is a continuation of my &lt;a href="https://dev.to/vincenthyacienth/how-to-provide-a-shared-services-hub-virtual-network-with-isolation-and-segmentation-1b4c"&gt;previous&lt;/a&gt; post.&lt;/p&gt;

&lt;p&gt;Here, we will be talking about;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Creating an NSG&lt;/li&gt;
&lt;li&gt;Creating NSG rules&lt;/li&gt;
&lt;li&gt;Associating an NSG to a subnet&lt;/li&gt;
&lt;li&gt;Creating and using Application Security Groups in NSG rules.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;What is NSG: In Azure, a Network Security Group (NSG) is a tool that controls network traffic in a virtual network (VNet) using rules to allow or deny access. NSGs are a key component of Azure's security fabric. &lt;br&gt;
Also, in Azure, a network security group (NSG) rule is a security rule that controls network traffic to and from Azure resources. NSG rules can allow or deny traffic based on conditions such as: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Source and destination: The IP addresses of the source and destination &lt;/li&gt;
&lt;li&gt;Ports: The ports or range of ports that initiate network traffic &lt;/li&gt;
&lt;li&gt;Protocols: The protocol used for the network traffic &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Here are some other things to know about NSG rules: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Priority: Each rule in an NSG collection must have a unique priority number between 100 and 4096. The lower the number, the higher the priority. &lt;/li&gt;
&lt;li&gt;Direction: Rules can be set to apply to either inbound or outbound traffic. &lt;/li&gt;
&lt;li&gt;Action: Rules can be set to "Allow" or "Deny". &lt;/li&gt;
&lt;li&gt;Logging: Logging can be enabled for an NSG to collect information about which rules are applied to virtual machines, and how often each rule is applied. &lt;/li&gt;
&lt;li&gt;Default rules: NSGs contain default rules that can't be deleted, but can be replaced by user-created rules. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;First, we will create an Application Security Group&lt;/strong&gt;&lt;br&gt;
An application security group (ASG) enables you to group servers with similar functions, such as web servers.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the search box at the portal's top, enter Application security group. Select Application security groups in the search results.&lt;/li&gt;
&lt;li&gt;Select + Create.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;On the Basics tab of Create an Application Security Group, enter the information listed below:&lt;/p&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Subscription    &lt;strong&gt;Select your subscription&lt;/strong&gt;&lt;br&gt;
Resource group  &lt;strong&gt;YOUR RESOURCE GROUP&lt;/strong&gt;&lt;br&gt;
Name    &lt;strong&gt;app-backend-asg&lt;/strong&gt;&lt;br&gt;
Region  &lt;strong&gt;East US&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select Review + Create and then select Create.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Note: You are creating the application security group in the same region as the existing virtual network.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Then you Create and Associate the Network Security Group&lt;/strong&gt;&lt;br&gt;
A network security group (NSG) secures network traffic in your virtual network. NSGs contain a list of security rules that allow or deny network traffic to resources connected to Azure Virtual Networks (VNet). NSGs can be associated with subnets and/or individual network interfaces attached to Azure Virtual Machines (VM).&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the search box at the portal's top, enter Network security group. Select Network security groups in the search results.&lt;/li&gt;
&lt;li&gt;Select + Create.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;On the Basics tab of Create Network Security Group, enter the information as listed below:&lt;/p&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Subscription    &lt;strong&gt;Select your subscription&lt;/strong&gt;&lt;br&gt;
Resource group  &lt;strong&gt;YOUR RESOURCE GROUP&lt;/strong&gt;&lt;br&gt;
Name    &lt;strong&gt;app-vnet-nsg&lt;/strong&gt;&lt;br&gt;
Region  &lt;strong&gt;East US&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select Review + Create and then select Create.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In this section, you associate the network security group with the subnet of the virtual network you created earlier.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the search box at the portal's top, enter Network security group. Select Network security groups in the search results.&lt;/li&gt;
&lt;li&gt;Select app-vnet-nsg from the list of network security groups.&lt;/li&gt;
&lt;li&gt;Select Subnets from the Settings section of app-vnet-nsg.&lt;/li&gt;
&lt;li&gt;In the Subnets page, select + Associate&lt;/li&gt;
&lt;li&gt;Under Associate subnet, select app-vnet (RG1) for Virtual network. and select Backend for Subnet, and then select OK.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Time to Create Network Security Group Rules&lt;/strong&gt;&lt;br&gt;
A network security group (NSG) secures network traffic in your virtual network.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the search box at the portal's top, enter Network security group. Select Network security groups in the search results.&lt;/li&gt;
&lt;li&gt;Select app-vnet-nsg from the list of network security groups.&lt;/li&gt;
&lt;li&gt;Select Inbound security rules from the Settings section of app-vnet-nsg.&lt;/li&gt;
&lt;li&gt;Select + Add.&lt;/li&gt;
&lt;li&gt;On the Add inbound security rule page, enter the information as listed below:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Source  &lt;strong&gt;Any&lt;/strong&gt;&lt;br&gt;
Source port ranges  *****&lt;br&gt;
Destination &lt;strong&gt;Application Security group&lt;/strong&gt;&lt;br&gt;
Destination application security group  &lt;strong&gt;app-backend-asg&lt;/strong&gt;&lt;br&gt;
Service &lt;strong&gt;SSH&lt;/strong&gt;&lt;br&gt;
Action  &lt;strong&gt;Allow&lt;/strong&gt;&lt;br&gt;
Priority    &lt;strong&gt;100&lt;/strong&gt;&lt;br&gt;
Name    &lt;strong&gt;AllowSSH&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next is to deploy an ARM template using Cloud Shell to create the VMs needed for this exercise&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the Azure portal, open the Azure Cloud Shell by selecting the icon in the top right of the Azure Portal.&lt;/li&gt;
&lt;li&gt;If prompted to select either Bash or PowerShell, select PowerShell.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Note: If this is the first time you are starting Cloud Shell and you are presented with the You have no storage mounted message, select the subscription you are using in this lab, and select Create storage.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Deploy the following ARM template using Cloud Shell to create the VMs needed for this exercise:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Code&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$RGName = "RG1"

   New-AzResourceGroupDeployment -ResourceGroupName $RGName -TemplateUri https://raw.githubusercontent.com/MicrosoftLearning/Configure-secure-access-to-workloads-with-Azure-virtual-networking-services/main/Instructions/Labs/azuredeploy.json

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;To verify that both the VM1 and VM2 virtual machines are running, navigate to the RG1 resource group and select VM1.&lt;/li&gt;
&lt;li&gt;Validate that the status of the virtual machine is Running.&lt;/li&gt;
&lt;li&gt;Repeat the previous step for VM2.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Finally, Associate the application security group to the network interface of the VM&lt;/strong&gt;&lt;br&gt;
When you created the VMs, Azure created a network interface for each VM and attached it to the VM.&lt;/p&gt;

&lt;p&gt;Add the application security group you created previously to the network interface of VM2.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the Azure portal, navigate to the RG1 resource group and select VM2.&lt;/li&gt;
&lt;li&gt;Navigate to the networking tab of the VM, and select + Add application security groups from the Application security groups section.&lt;/li&gt;
&lt;li&gt;Select app-backend-asg from the list of application security groups.&lt;/li&gt;
&lt;li&gt;Select Add&lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>How To Provide A Shared Services Hub Virtual Network With Isolation And Segmentation</title>
      <dc:creator>Hyacienth Ugochukwu</dc:creator>
      <pubDate>Fri, 30 Aug 2024 23:41:31 +0000</pubDate>
      <link>https://forem.com/vincenthyacienth/how-to-provide-a-shared-services-hub-virtual-network-with-isolation-and-segmentation-1b4c</link>
      <guid>https://forem.com/vincenthyacienth/how-to-provide-a-shared-services-hub-virtual-network-with-isolation-and-segmentation-1b4c</guid>
      <description>&lt;p&gt;A shared services hub virtual network with isolation and segmentation is a network topology that uses a hub virtual network to centralize shared services and resources while isolating environments in spokes. This topology can help improve network performance and security and can be used for various purposes, such as dev/test, staging, user acceptance testing, and production. &lt;br&gt;
Here are some key features of a shared services hub virtual network with isolation and segmentation: &lt;br&gt;
&lt;strong&gt;Centralized Services&lt;/strong&gt;&lt;br&gt;
The hub virtual network hosts shared services and resources, such as DNS IDs, Active Directory Domain Services (AD DS), and Network Time Protocol (NTP). &lt;br&gt;
&lt;strong&gt;Isolation&lt;/strong&gt;&lt;br&gt;
Each environment is deployed to a different spoke to maintain isolation. &lt;br&gt;
&lt;strong&gt;Centralized Control&lt;/strong&gt;&lt;br&gt;
The hub can provide centralized control over security and connectivity. For example, the hub can have a perimeter network firewall, and each spoke can have segregated workload management. &lt;br&gt;
&lt;strong&gt;Decentralized Management&lt;/strong&gt;&lt;br&gt;
The hub and each spoke can be implemented in different resource groups or subscriptions, allowing for decentralized workload management. &lt;br&gt;
Network segmentation is dividing a computer network into smaller parts to improve network performance and security. Other terms for network segmentation include network segregation, network partitioning, and network isolation. &lt;br&gt;
In this article, we will be learning how to provide a shared services hub virtual network with isolation and segmentation. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;First, we create hub and spoke virtual networks and subnets&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Open a browser and navigate to the Azure portal and login.&lt;/li&gt;
&lt;li&gt;To create a Virtual Network, in the search bar at the top of the portal type &lt;strong&gt;“Virtual Networks”&lt;/strong&gt; and select &lt;strong&gt;“Virtual Networks”&lt;/strong&gt; from the results.&lt;/li&gt;
&lt;li&gt;In the &lt;strong&gt;“Virtual Networks”&lt;/strong&gt; portal pane, select &lt;strong&gt;“+ Create”.&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Fill out all the tabs of the creation process by using the values below:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property              &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Resource group            &lt;strong&gt;YOUR GROUP&lt;/strong&gt;&lt;br&gt;
Name    &lt;strong&gt;app-vnet&lt;/strong&gt;&lt;br&gt;
Region  &lt;strong&gt;East US&lt;/strong&gt;&lt;br&gt;
IPv4 address space  &lt;strong&gt;10.1.0.0/16&lt;/strong&gt;&lt;br&gt;
Subnet name &lt;strong&gt;frontend&lt;/strong&gt;&lt;br&gt;
Subnet address range    &lt;strong&gt;10.1.0.0/24&lt;/strong&gt;&lt;br&gt;
Subnet name &lt;strong&gt;backend&lt;/strong&gt;&lt;br&gt;
Subnet address range    &lt;strong&gt;10.1.1.0/24&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Leave all other settings as their defaults. Select &lt;strong&gt;“Next”&lt;/strong&gt; to advance to the next tab, and &lt;strong&gt;Create&lt;/strong&gt; to create the virtual network.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Following the same steps as above, create the Azure virtual network &lt;strong&gt;Hub-vnet&lt;/strong&gt; by using the values below:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
Resource group  &lt;strong&gt;YOUR GROUP&lt;/strong&gt;&lt;br&gt;
Name    &lt;strong&gt;Hub-vnet&lt;/strong&gt;&lt;br&gt;
Region  &lt;strong&gt;East US&lt;/strong&gt;&lt;br&gt;
IPv4 address space  &lt;strong&gt;10.0.0.0/16&lt;/strong&gt;&lt;br&gt;
Subnet name &lt;strong&gt;AzureFirewallSubnet&lt;/strong&gt;&lt;br&gt;
Subnet address range    &lt;strong&gt;10.0.0.0/26&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Once the deployment is complete. Navigate back to the portal, in the search bar type &lt;strong&gt;“resource groups”&lt;/strong&gt; and select &lt;strong&gt;Resource Groups”&lt;/strong&gt; from the results. Select &lt;strong&gt;“RG1”&lt;/strong&gt; in the main pane and confirm both virtual networks have been deployed.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Then you setup a peer relationship between the virtual networks&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Setting up a peer relationship between the two virtual networks will allow traffic to flow in both directions between the &lt;strong&gt;app-vnet&lt;/strong&gt; and &lt;strong&gt;hub-vnet&lt;/strong&gt; virtual networks.&lt;/li&gt;
&lt;li&gt;In the Portal in the RG1 resource group view. Select the &lt;strong&gt;“app-vnet”&lt;/strong&gt; virtual network.&lt;/li&gt;
&lt;li&gt;On the &lt;strong&gt;app-vnet&lt;/strong&gt; context menu on the left-hand side of the portal scroll down and select &lt;strong&gt;peerings&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;In the &lt;strong&gt;app-vnet&lt;/strong&gt; peerings pane, Select &lt;strong&gt;+ Add.&lt;/strong&gt;
Fill out the form using the values below:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Property    &lt;strong&gt;Value&lt;/strong&gt;&lt;br&gt;
This virtual network Peering link name  &lt;strong&gt;app-vnet-to-hub&lt;/strong&gt;&lt;br&gt;
Remote virtual network Peering link name    &lt;strong&gt;hub-to-app-vnet&lt;/strong&gt;&lt;br&gt;
Virtual network &lt;strong&gt;hub-vnet&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Leave all other settings as their defaults. Select &lt;strong&gt;“Add”&lt;/strong&gt; to create the virtual network peering.&lt;/p&gt;

&lt;p&gt;Once the process completes and after the configuration updates. Validate that the &lt;strong&gt;Peering&lt;/strong&gt; status is set to &lt;strong&gt;Connected&lt;/strong&gt;. (you may have to refresh the page to see the updated status)&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How To Perform A Simulated Attack To Validate The Analytic And Automation Rules</title>
      <dc:creator>Hyacienth Ugochukwu</dc:creator>
      <pubDate>Sun, 11 Aug 2024 22:01:44 +0000</pubDate>
      <link>https://forem.com/vincenthyacienth/how-to-perform-a-simulated-attack-to-validate-the-analytic-and-automation-rules-493f</link>
      <guid>https://forem.com/vincenthyacienth/how-to-perform-a-simulated-attack-to-validate-the-analytic-and-automation-rules-493f</guid>
      <description>&lt;p&gt;&lt;em&gt;This is a continuation of my previous post, you can check it from &lt;a href="https://dev.to/vincenthyacienth/how-to-configure-a-data-connector-data-collection-rule-2o8"&gt;here&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;We will need to perform a simulated attack to validate that the Analytic and Automation rules create an incident and assign it to the User. We will perform a simple Privilege Escalation attack on our resource.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 1 - Perform a simulated Privilege Escalation attack&lt;/strong&gt;&lt;br&gt;
Use simulated attacks to test analytic rules in Microsoft Sentinel.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Locate and select the resource, that is the virtual machine in Azure, scroll down the menu items to Operations, and select Run command&lt;/li&gt;
&lt;li&gt;On the Run command pane, select RunPowerShellScript&lt;/li&gt;
&lt;li&gt;Copy the commands below to simulate the creation of an Admin account into the PowerShell Script form and select Run&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Code&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;net user theusernametoadd /add
 net user theusernametoadd ThePassword1!
 net localgroup administrators theusernametoadd /add
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Note: Make sure there is only one command per line, and you can rerun the commands by changing the username.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the Output window you should see The command completed successfully three times&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Task 2 - Verify an incident is created from the simulated attack&lt;/strong&gt;&lt;br&gt;
Verify that an incident is created that matches the criteria for the analytic rule and automation. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In Microsoft Sentinel, go to the Threat Management menu section and select Incidents&lt;/li&gt;
&lt;li&gt;You may or may not see an incident that matches the Severity and Title you configured in the NRT rule you created. It all depends on how your virtual machine was set up or what you used as your resource.&lt;/li&gt;
&lt;li&gt;Select the Incident and the detail pane opens&lt;/li&gt;
&lt;li&gt;The Owner assignment should be the user, created from the Automation rule, and the Tactics and techniques should be Privilege Escalation (from the NRT rule)&lt;/li&gt;
&lt;li&gt;Select View full details to see all the Incident management capabilities and Incident actions&lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>How To Configure A Data Connector Data Collection Rule</title>
      <dc:creator>Hyacienth Ugochukwu</dc:creator>
      <pubDate>Sun, 11 Aug 2024 21:18:07 +0000</pubDate>
      <link>https://forem.com/vincenthyacienth/how-to-configure-a-data-connector-data-collection-rule-2o8</link>
      <guid>https://forem.com/vincenthyacienth/how-to-configure-a-data-connector-data-collection-rule-2o8</guid>
      <description>&lt;p&gt;A &lt;strong&gt;Data Collection Rule (DCR)&lt;/strong&gt; in Azure Monitor is a set of instructions that defines how to collect and process telemetry sent to Azure Monitor. DCRs specify what data should be collected, how to transform it, and where to send it. They can be used for many purposes, including:&lt;br&gt;
Consistent configuration&lt;br&gt;
Scalable configuration options&lt;br&gt;
Edge Pipeline&lt;br&gt;
High-end scalability&lt;br&gt;
Layered network configurations&lt;br&gt;
Periodic connectivity &lt;/p&gt;

&lt;p&gt;In this article, we will be looking at how to validate the Microsoft Sentinel deployment to meet the following requirements:&lt;/p&gt;

&lt;p&gt;a. Configure the Windows Security Events via AMA connector to collect all security events from only a virtual machine.&lt;br&gt;
b. Create a near-real-time (NRT) query rule to generate an incident based on the following query.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;SecurityEvent 
| where EventID == 4732
| where TargetAccount == "Builtin\\Administrators"

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;c. Create an automation rule that assigns Operator1 the Owner role for incidents that are generated by the NRT rule.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 1 - Configure Data Collection rules (DCRs) in Microsoft Sentinel&lt;/strong&gt;&lt;br&gt;
Configure a Windows Security Events via AMA connector.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In Microsoft Sentinel, go to the Configuration menu section and select Data connectors&lt;/li&gt;
&lt;li&gt;Search for and select Windows Security Events via AMA&lt;/li&gt;
&lt;li&gt;Select Open connector page&lt;/li&gt;
&lt;li&gt;In the Configuration area, select +Create data collection rule&lt;/li&gt;
&lt;li&gt;On the Basics tab enter a Rule Name&lt;/li&gt;
&lt;li&gt;On the Resources tab expand your subscription and the RG1 resource group in the Scope column&lt;/li&gt;
&lt;li&gt;Select the resource that you want to use, and then select Next: Collect &amp;gt;&lt;/li&gt;
&lt;li&gt;On the Collect tab leave the default of All Security Events&lt;/li&gt;
&lt;li&gt;Select Next: Review + create &amp;gt;, then select Create&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Task 2 - Create a near real-time (NRT) query detection&lt;/strong&gt;&lt;br&gt;
Detect threats with near-real-time (NRT) analytic rules in Microsoft Sentinel.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In Microsoft Sentinel, go to the Configuration menu section and select Analytics&lt;/li&gt;
&lt;li&gt;Select + Create, and NRT query rule (Preview)&lt;/li&gt;
&lt;li&gt;Enter a Name for the rule, and select Privilege Escalation from Tactics and Techniques.&lt;/li&gt;
&lt;li&gt;Select Next: Set rule logic &amp;gt;&lt;/li&gt;
&lt;li&gt;Enter the KQL query into the Rule query form&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Code&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;SecurityEvent 
| where EventID == 4732
| where TargetAccount == "Builtin\\Administrators"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Select Next: Incident settings, and select Next: Automated response.&lt;/li&gt;
&lt;li&gt;Select Next: Review + Create.&lt;/li&gt;
&lt;li&gt;When validation is complete select Save.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Task 3 - Configure automation in Microsoft Sentinel&lt;/strong&gt;&lt;br&gt;
Configure automation in Microsoft Sentinel.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In Microsoft Sentinel, go to the Configuration menu section and select Automation&lt;/li&gt;
&lt;li&gt;Select + Create, and Automation rule&lt;/li&gt;
&lt;li&gt;Enter an Automation rule name, and select Assign owner from Actions&lt;/li&gt;
&lt;li&gt;Assign the user that you want to use as the owner.&lt;/li&gt;
&lt;li&gt;Select Apply&lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>How To Install Microsoft Sentinel Content Hub Solutions And Data Connectors</title>
      <dc:creator>Hyacienth Ugochukwu</dc:creator>
      <pubDate>Sun, 11 Aug 2024 19:41:52 +0000</pubDate>
      <link>https://forem.com/vincenthyacienth/how-to-install-microsoft-sentinel-content-hub-solutions-and-data-connectors-2113</link>
      <guid>https://forem.com/vincenthyacienth/how-to-install-microsoft-sentinel-content-hub-solutions-and-data-connectors-2113</guid>
      <description>&lt;p&gt;The content hub in Microsoft Sentinel is the centralized location to discover and manage out-of-the-box content including data connectors.&lt;br&gt;
Microsoft Sentinel content is Security Information and Event Management (SIEM) content that enables customers to ingest data, monitor, alert, hunt, investigate, respond, and connect with different products, platforms, and services in Microsoft Sentinel. Microsoft Sentinel solutions are packages of content like data connectors, workbooks, analytic rules, playbooks, etc., or API integrations, that fulfill an end-to-end product, domain, or industry vertical scenario in Microsoft Sentinel. In terms of out-of-the-box content, these 90+ solutions in the Content hub, comprise over &lt;strong&gt;60&lt;/strong&gt; data connectors, &lt;strong&gt;250&lt;/strong&gt; analytic rules, &lt;strong&gt;100&lt;/strong&gt; playbooks, &lt;strong&gt;150&lt;/strong&gt; hunting queries, and about &lt;strong&gt;40&lt;/strong&gt; workbooks.  &lt;br&gt;
Use cases for the Content hub are as follows:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Discover solutions for your scenarios by leveraging enhanced search capabilities. Filter by specific domain or vertical categories, other parameters like content type or provider, or use the powerful text search, to find the content that works best for your organization's needs. &lt;/li&gt;
&lt;li&gt;Install a solution in a single step to get out-of-the-box content to immediately unlock your end-to-end use cases.&lt;/li&gt;
&lt;li&gt;Manage updates for out-of-the-box content easily and get visibility on which solutions carry new updates.&lt;/li&gt;
&lt;li&gt;Get clarity on the support model for each solution.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In this article, I will be showing you how to:&lt;br&gt;
a. Install the following solutions:&lt;br&gt;
Windows Security Events.&lt;br&gt;
Azure Activity connector.&lt;br&gt;
Microsoft Defender for Cloud.&lt;br&gt;
b. Configure the data connector for Azure Activity to apply all new and existing resources in the subscription.&lt;br&gt;
c. Configure the data connector for Microsoft Defender for Cloud to connect to the Azure subscription and ensure that only bi-directional sync is enabled.&lt;br&gt;
d. Enable an analytics rule based on the Suspicious number of resource creation or deployment activities template. The rule should run every hour and only look up data for that last hour.&lt;br&gt;
e. Ensure that the Azure Activity workbook is available in My workbooks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 1 - Deploy a Microsoft Sentinel Content Hub solution&lt;/strong&gt;&lt;br&gt;
Deploy a Content Hub solution and configure Data connectors.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In Microsoft Sentinel, go to the Content Management menu section and select Content Hub.&lt;/li&gt;
&lt;li&gt;Search for and select Windows Security Events&lt;/li&gt;
&lt;li&gt;Select the link to View details&lt;/li&gt;
&lt;li&gt;Select Windows Security Events plan, and select Create&lt;/li&gt;
&lt;li&gt;Select the resource group that includes the Microsoft Sentinel workspace, and select the Workspace.&lt;/li&gt;
&lt;li&gt;Select Next to the Data Connectors tab (solution will deploy 2 data connectors)&lt;/li&gt;
&lt;li&gt;Select Next to the Workbooks tab (solution installs workbooks)&lt;/li&gt;
&lt;li&gt;Select Next to the Analytics tab (solutions installs analytics rules)&lt;/li&gt;
&lt;li&gt;Select Next to the Hunting queries tab (solution installs hunting queries)&lt;/li&gt;
&lt;li&gt;Select Review + create&lt;/li&gt;
&lt;li&gt;Select Create&lt;/li&gt;
&lt;li&gt;Repeat these steps for the Azure Activity and the Microsoft Defender for Cloud solutions.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Task 2 - Set up the data connector for Azure Activity&lt;/strong&gt;&lt;br&gt;
Configure the data connector for Azure Activity to apply all new and existing resources in the subscription.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In Microsoft Sentinel, go to the Content Management menu section and select Content Hub.&lt;/li&gt;
&lt;li&gt;In the Content hub, filter Status for Installed Solutions.&lt;/li&gt;
&lt;li&gt;Select the Azure Activity solution and select Manage.&lt;/li&gt;
&lt;li&gt;Select the Azure Activity Data connector and select the Open connector page.&lt;/li&gt;
&lt;li&gt;In the Configuration area under the Instructions tab, scroll down to 2. Connect your subscriptions..., and select Launch Azure Policy Assignment Wizard&amp;gt;.&lt;/li&gt;
&lt;li&gt;In the Basics tab, select the ellipsis button (…) under Scope and select your subscription from the drop-down list, and click Select.&lt;/li&gt;
&lt;li&gt;Select the Parameters tab, and choose your workspace from the Primary Log Analytics workspace drop-down list.&lt;/li&gt;
&lt;li&gt;Select the Remediation tab and select the Create a remediation task checkbox.&lt;/li&gt;
&lt;li&gt;Select the Review + Create button to review the configuration.&lt;/li&gt;
&lt;li&gt;Select Create to finish.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Task 3 - Set up the Defender for Cloud data connector&lt;/strong&gt;&lt;br&gt;
Configure the data connector for Microsoft Defender for Cloud and ensure that only incident management is configured.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In Microsoft Sentinel, go to the Content Management menu section and select Content Hub.&lt;/li&gt;
&lt;li&gt;In the Content hub, filter Status for Installed Solutions.&lt;/li&gt;
&lt;li&gt;Select the Microsoft Defender for Cloud solution and select Manage.&lt;/li&gt;
&lt;li&gt;Select the Subscription-based Microsoft Defender for Cloud (Legacy) Data connector and select Open connector page&lt;/li&gt;
&lt;li&gt;In the Configuration area under the Instructions tab, scroll down to your subscription and move the slider in the Status column to Connected.&lt;/li&gt;
&lt;li&gt;Make sure Bi-directional sync is Enabled. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Task 4 - Create an analytics rule&lt;/strong&gt;&lt;br&gt;
Create an analytic rule based on the Suspicious number of resource creation or deployment activities template. The rule should run every hour and only look up data for that last hour.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In Microsoft Sentinel, go to the Configuration menu section and select Analytics.&lt;/li&gt;
&lt;li&gt;In the Rule templates tab, search for Suspicious number of resource creation or deployment activities.&lt;/li&gt;
&lt;li&gt;Select the Suspicious number of resource creation or deployment activities, and select Create rule.&lt;/li&gt;
&lt;li&gt;Leave the defaults on the General tab and select Next: Set rule logic &amp;gt;.&lt;/li&gt;
&lt;li&gt;Leave the default Rule query and configure Query scheduling using the table:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Setting Value&lt;br&gt;
Run query every                               1 Hour&lt;br&gt;
Lookup data from the last                 1 Hour&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select Next: Incident settings &amp;gt;.&lt;/li&gt;
&lt;li&gt;Leave the defaults and select Next: Automated response &amp;gt;.&lt;/li&gt;
&lt;li&gt;Leave the defaults and select Next: Review and create &amp;gt;.&lt;/li&gt;
&lt;li&gt;Select Save.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Task 5 - Ensure that the Azure Activity workbook is available in My workbooks&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In Microsoft Sentinel, go to the Content Management menu section and select Content Hub.&lt;/li&gt;
&lt;li&gt;In the Content hub, filter Status for Installed Solutions.&lt;/li&gt;
&lt;li&gt;Select the Azure Activity solution and select Manage.&lt;/li&gt;
&lt;li&gt;Select the Azure Activity workbook checkbox, and then select Configuration.&lt;/li&gt;
&lt;li&gt;Select the Azure Activity workbook and select Save.&lt;/li&gt;
&lt;li&gt;Choose the Azure Region for your Microsoft Sentinel workspace.&lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>How To Create A Microsoft Sentinel Environment</title>
      <dc:creator>Hyacienth Ugochukwu</dc:creator>
      <pubDate>Sun, 11 Aug 2024 18:30:01 +0000</pubDate>
      <link>https://forem.com/vincenthyacienth/how-to-create-a-microsoft-sentinel-environment-4al0</link>
      <guid>https://forem.com/vincenthyacienth/how-to-create-a-microsoft-sentinel-environment-4al0</guid>
      <description>&lt;p&gt;What is A Microsoft Sentinel Environment?&lt;/p&gt;

&lt;p&gt;Microsoft Sentinel is a cloud-native security information and event management (SIEM) platform that uses built-in AI to help analyze large volumes of data across an enterprise—fast.&lt;br&gt;
Microsoft Sentinel is a scalable, cloud-native security information and event management (SIEM) that delivers an intelligent and comprehensive solution for SIEM and security orchestration, automation, and response (SOAR). Microsoft Sentinel provides cyberthreat detection, investigation, response, and proactive hunting, with a bird's-eye view across your enterprise.&lt;br&gt;
Microsoft Sentinel also natively incorporates proven Azure services, like Log Analytics and Logic Apps, and enriches your investigation and detection with AI. It uses Microsoft's threat intelligence stream and enables you to bring your threat intelligence.&lt;br&gt;
There are multiple ways to configure your sentinel environment but I will show you how to create yours by adding roles and specifying the number of days the data should be retained.&lt;/p&gt;

&lt;p&gt;Task 1 - Create a Log Analytics workspace&lt;br&gt;
Create a Log Analytics workspace, including a region option.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the Azure portal, search for and select Microsoft Sentinel.&lt;/li&gt;
&lt;li&gt;Select + Create.&lt;/li&gt;
&lt;li&gt;Select Create a new workspace.&lt;/li&gt;
&lt;li&gt;Select Create new and add a Resource Group.&lt;/li&gt;
&lt;li&gt;Enter a valid name for the Log Analytics workspace.&lt;/li&gt;
&lt;li&gt;Select any region of your choice for the workspace.&lt;/li&gt;
&lt;li&gt;Select Review + Create to validate the new workspace.&lt;/li&gt;
&lt;li&gt;Select Create to deploy the workspace.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Task 2 - Deploy Microsoft Sentinel to a workspace&lt;br&gt;
Deploy Microsoft Sentinel to the workspace.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;When the workspace deployment completes, select Refresh to display the new workspace.&lt;/li&gt;
&lt;li&gt;Select the workspace you want to add Sentinel to (created in Task 1).&lt;/li&gt;
&lt;li&gt;Select Add.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Task 3 - Assign a Microsoft Sentinel role to a user&lt;br&gt;
Assign a Microsoft Sentinel role to a user.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to the Resource group.&lt;/li&gt;
&lt;li&gt;Select Access Control (IAM).&lt;/li&gt;
&lt;li&gt;Select Add and Add role assignment.&lt;/li&gt;
&lt;li&gt;In the search bar, search for and select the Microsoft Sentinel Contributor role.&lt;/li&gt;
&lt;li&gt;Select Next.&lt;/li&gt;
&lt;li&gt;Select the option User, group, or service principal.&lt;/li&gt;
&lt;li&gt;Select + Select members.&lt;/li&gt;
&lt;li&gt;Search for the user you want to assign.&lt;/li&gt;
&lt;li&gt;Select the user icon.&lt;/li&gt;
&lt;li&gt;Select Select.&lt;/li&gt;
&lt;li&gt;Select “Review + assign”.&lt;/li&gt;
&lt;li&gt;Select “Review + assign”.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Task 4 - Configure data retention&lt;br&gt;
Configure data retention.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to the Log Analytics workspace created in Task 1 step 5.&lt;/li&gt;
&lt;li&gt;Select Usage and estimated costs.&lt;/li&gt;
&lt;li&gt;Select Data retention.&lt;/li&gt;
&lt;li&gt;Change data retention period to 180 days.&lt;/li&gt;
&lt;li&gt;Select OK.&lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>Creating a virtual machine using PowerShell</title>
      <dc:creator>Hyacienth Ugochukwu</dc:creator>
      <pubDate>Sun, 22 Oct 2023 22:42:09 +0000</pubDate>
      <link>https://forem.com/vincenthyacienth/creating-a-virtual-machine-using-powershell-4f5d</link>
      <guid>https://forem.com/vincenthyacienth/creating-a-virtual-machine-using-powershell-4f5d</guid>
      <description>&lt;p&gt;Go to your Azure Portal dashboard and click on the Cloud Shell icon. A coding environment will pop up below your screen. Select PowerShell and proceed to create your resource group and virtual machine.&lt;/p&gt;

&lt;p&gt;Creating a resource group in powershell just requires this command;&lt;br&gt;
&lt;code&gt;New-AzResourceGroup -Name "ugopowershell" -Location "East US"&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhl351j88tovgaqu3t7u6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhl351j88tovgaqu3t7u6.png" alt="Image description" width="800" height="397"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Creating a virtual machine in powershell requires this command;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;New-AzVm `
-ResourceGroupName "[name of your choice]" `
-Name "[virtual machine name of your choice]" `
-Location "[location of choice]" `
-VirtualNetworkName "myVnetPS" `
-SubnetName "mySubnetPS" `
-SecurityGroupName "myNSGPS" `
-PublicIpAddressName "myPublicIpPS"

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhw0v5mc39pu5j8m1h0zk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhw0v5mc39pu5j8m1h0zk.png" alt="Image description" width="800" height="397"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Creating a virtual machine using CLI (Bash)</title>
      <dc:creator>Hyacienth Ugochukwu</dc:creator>
      <pubDate>Sun, 22 Oct 2023 21:42:46 +0000</pubDate>
      <link>https://forem.com/vincenthyacienth/creating-a-virtual-machine-using-cli-bash-4loc</link>
      <guid>https://forem.com/vincenthyacienth/creating-a-virtual-machine-using-cli-bash-4loc</guid>
      <description>&lt;p&gt;Go to your Azure Portal dashboard and click on the Cloud Shell icon. A coding environment will pop up below your screen. Select Bash and proceed to create your resource group and virtual machine. &lt;/p&gt;

&lt;p&gt;Creating a resource group in bash just requires this command;&lt;br&gt;
&lt;code&gt;az group create --name [the name that you want to use] --location [the location that you want to use]&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff9cwxvtjq5j8m016mc01.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff9cwxvtjq5j8m016mc01.png" alt="Image description" width="800" height="397"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Creating a virtual machine in bash requires this command;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;az vm create \
--resource-group [resource group name] \
--name [name of your virtual machine] \
--image Ubuntu2204 \
--generate-ssh-keys
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbvjl5qwg6lzil3uoz1cs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbvjl5qwg6lzil3uoz1cs.png" alt="Image description" width="800" height="397"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Use the Azure QuickStart gallery to deploy a template that creates a Windows virtual machine</title>
      <dc:creator>Hyacienth Ugochukwu</dc:creator>
      <pubDate>Sun, 22 Oct 2023 19:42:18 +0000</pubDate>
      <link>https://forem.com/vincenthyacienth/use-the-azure-quickstart-gallery-to-deploy-a-template-that-creates-a-windows-virtual-machine-4pj2</link>
      <guid>https://forem.com/vincenthyacienth/use-the-azure-quickstart-gallery-to-deploy-a-template-that-creates-a-windows-virtual-machine-4pj2</guid>
      <description>&lt;p&gt;Step 1: Go to your Azure Portal search bar and search for deploy a custom template.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmvwolivwa6qzbxfc75fw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmvwolivwa6qzbxfc75fw.png" alt="Image description" width="800" height="397"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 2: Click on create a Windows virtual machine.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdeu6x3zv5e7w3xvc0qc3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdeu6x3zv5e7w3xvc0qc3.png" alt="Image description" width="800" height="397"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 3: Add your resource group, username, password, location (if you want to). You can leave the other tabs as default and review and create. After deployment, you can delete your virtual machine if you want to.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqxb64yhgyw4ef0acmsmr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqxb64yhgyw4ef0acmsmr.png" alt="Image description" width="800" height="397"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
