Azure-SOC
Tools/Skills: Azure Cloud, Sentinel, Log Analytics, Firewalls, Security Hardening, NIST 800-53, KQL, Entra ID/Active Directory, Incident Response, Incident Investigation, Incident Documentation
INTRODUCTION
Azure Cloud Honeynet Architecture
The metrics I analyzed were:
The architecture of the mini honeynet in Azure consists of the following components:
SENTINEL - INCIDENT RESPONSE

Incident Documentation - False Positive
CUSTOM: Brute Force SUCCESS - Windows
BEFORE AND AFTER METRICS
Attack Maps Before Hardening / Security Controls
Metrics Before Hardening / Security Controls
Day 1: Friday -> Saturday
Metric
Time (EST)
Metric
Count
Day 2: Saturday -> Sunday
Metric
Time (EST)
Metric
Count
Day 3: Sunday -> Monday
Metric
Time (EST)
Metric
Count
Attack Maps Before Hardening / Security Controls
Metrics After Hardening / Security Controls
Day 1: Friday -> Saturday
Metric
Time (EST)
Metric
Count
Day 2: Saturday -> Sunday
Metric
Time (EST)
Metric
Count
Day 3: Sunday -> Monday
Metric
Time (EST)
Metric
Count
Results
Metric
Change after hardening
REFLECTIONS
Last updated