You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: CONTRIBUTING.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@
3
3
When contributing to this repository, please first discuss the change you wish to make via issue,
4
4
email, or any other method with the owners of this repository before making a change.
5
5
6
-
Please note we have a [code of conduct](https://github.com/BlueTeamToolkit/sentinel-attack/tree/defcon/CODE_OF_CONDUCT.md), please follow it in all your interactions with the project.
6
+
Please note we have a [code of conduct](https://github.com/BlueTeamToolkit/sentinel-attack/tree/master/CODE_OF_CONDUCT.md), please follow it in all your interactions with the project.
Next, if needed, you should [Upload selected Kusto queries into Sentinel analytics](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/detections/README.md).
15
+
Next, if needed, you should [Upload selected Kusto queries into Sentinel analytics](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/detections/README.md).
**DISCLAIMER:** Please note that this folder is work in progress and is constantly being updated. It is likely you will come across detections that might require some fine tuning to function 100%. If you spot any issues in the Kusto source code feel free to open an issue or submit a pull request.
14
14
@@ -30,15 +30,15 @@ Each detection rule provides the following information in the rule comments:
30
30
31
31
Creating detection rules in Azure sentinel is done like so:
The detection rules in this folder can also be used to conduct one-off threat hunts to try and discover specific ATT&CK techniques executed on a network, like so:
Next, if needed, you could [Upload available threat hunting Jupyter notebooks in your Sentinel Azure workspace](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/hunting/README.md).
41
+
Next, if needed, you could [Upload available threat hunting Jupyter notebooks in your Sentinel Azure workspace](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/hunting/README.md).
42
42
43
43
### ATT&CK coverage report
44
-
ATT&CK coverage reports for the detection rules in this folder are available in [SVG](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/sentinel_attack_coverage.svg), [Excel](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/sentinel_attack_coverage.xlsx) and [ATT&CK navigator](https://mitre-attack.github.io/attack-navigator/enterprise/)[JSON format](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/sentinel_attack_coverage.json).
44
+
ATT&CK coverage reports for the detection rules in this folder are available in [SVG](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/sentinel_attack_coverage.svg), [Excel](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/sentinel_attack_coverage.xlsx) and [ATT&CK navigator](https://mitre-attack.github.io/attack-navigator/enterprise/)[JSON format](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/sentinel_attack_coverage.json).
Copy file name to clipboardexpand all lines: guides/Sysmon-onboarding-quickstart.md
+11-11
Original file line number
Diff line number
Diff line change
@@ -5,29 +5,29 @@ This is a quick, super terse guide to onboarding Sysmon data to Azure Sentinel.
5
5
6
6
-**Step 1: Provision a Windows 10 virtual machine (or machines) in your [Azure environment](https://portal.azure.com).**
7
7
8
-
You can follow microsoft's official documentation or use the included terraform [deployment script](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/lab) to quickly provision a lab. If you use the terraform script create a variables.tfvars file in the root directory, using the [variables.tfvars.txt](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/lab/variables.tfvars.txt) file as a template and making sure to complete all fields.
8
+
You can follow microsoft's official documentation or use the included terraform [deployment script](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/lab) to quickly provision a lab. If you use the terraform script create a variables.tfvars file in the root directory, using the [variables.tfvars.txt](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/lab/variables.tfvars.txt) file as a template and making sure to complete all fields.
9
9
10
10
-**Step 2: Provision a log analytics workspace**
11
11
12
12
The second step is to provision a log analytics workspace into which an Azure Sentinel will be deployed
-**Step 4: Install Sysmon and load the provided sysmon configuration file on virtual machines**
24
24
25
-
**NOTE:** If during step 1 you have deployed your lab using the included terraform [deployment script](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/lab) you can skip this step.
25
+
**NOTE:** If during step 1 you have deployed your lab using the included terraform [deployment script](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/lab) you can skip this step.
26
26
27
27
In order for the virtual machines in your lab/network to send the correct data to Sentinel you must:
28
28
29
29
1. Install Sysmon on the virtual machines to monitor; to do so follow the [official documentation](https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon)
30
-
2. Download the provided [sysmon configuration file](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/sysmonconfig.xml) on the virtual machines to monitor
30
+
2. Download the provided [sysmon configuration file](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/sysmonconfig.xml) on the virtual machines to monitor
31
31
3. Load the conguration file by executing the following command within the directory containing _sysmonconfig.xml_ :
32
32
33
33
´´´
@@ -38,7 +38,7 @@ This is a quick, super terse guide to onboarding Sysmon data to Azure Sentinel.
38
38
39
39
The fifth step is to enable the collection of security events
-**Step 6: Activate windows event logs as data sources**
44
44
@@ -50,14 +50,14 @@ This is a quick, super terse guide to onboarding Sysmon data to Azure Sentinel.
50
50
51
51
**Note that _Microsoft-Windows-Sysmon/Operational_ does not appear in the drop down menu. You must hit enter after inputting the data source to add it to the list**
The final step is to install the windows event parser to ensure Sysmon events are stored and parsed according to the [OSSEM standard](https://github.com/Cyb3rWard0g/OSSEM) and to allow for compatibility with the repository's [detection rules](https://github.com/BlueTeamToolkit/sentinel-attack/tree/master/detections).
Next, you should [Install the ATT&CK telemetry dashboard on Azure](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/dashboards/README.md).
79
+
Next, you should [Install the ATT&CK telemetry dashboard on Azure](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/dashboards/README.md).
Copy file name to clipboardexpand all lines: guides/getting-started.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -2,10 +2,10 @@ Getting started guide
2
2
=====
3
3
Setting up Sentinel ATT&CK on Azure is quick and simple, the following steps must be performed:
4
4
5
-
1.[Quickly spin-up a test lab on Azure Sentinel](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/lab/README.md)**(Optional)**
6
-
2.[Deploy Sentinel and onboard Sysmon data](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/guides/Sysmon-onboarding-quickstart.md)
7
-
3.[Install the ATT&CK telemetry dashboard on Azure](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/dashboards/README.md)
8
-
4.[Upload selected Kusto queries into Sentinel analytics](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/detections/README.md)**(Optional)**
9
-
5.[Upload available threat hunting Jupyter notebooks in Azure](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/hunting/README.md)**(Optional)**
5
+
1.[Quickly spin-up a test lab on Azure Sentinel](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/lab/README.md)**(Optional)**
6
+
2.[Deploy Sentinel and onboard Sysmon data](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/guides/Sysmon-onboarding-quickstart.md)
7
+
3.[Install the ATT&CK telemetry dashboard on Azure](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/dashboards/README.md)
8
+
4.[Upload selected Kusto queries into Sentinel analytics](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/detections/README.md)**(Optional)**
9
+
5.[Upload available threat hunting Jupyter notebooks in Azure](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/hunting/README.md)**(Optional)**
10
10
11
11
Please note that this documentation is under active development and will be updated frequently.
Copy file name to clipboardexpand all lines: hunting/README.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -12,23 +12,23 @@ This folder contains a Jupyter notebook to help with process investigations and
12
12
13
13
a) gaining a high-level overview of ATT&CK tactics executed within a network and mapped against the [killchain](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html):
You must also ensure to upload the [config.ini](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/hunting/config.ini) file provided and to complete all relevant credentials.
31
+
You must also ensure to upload the [config.ini](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/hunting/config.ini) file provided and to complete all relevant credentials.
Copy file name to clipboardexpand all lines: lab/README.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ This terraform script provisions a win 10 machine and runs a post-deployment scr
4
4
5
5
# Set-up
6
6
1. Install/configure/authenticate Terraform following [these Microsoft docs](https://docs.microsoft.com/en-us/azure/virtual-machines/linux/terraform-install-configure).
7
-
2. Create a _variables.tfvars_ file in the root directory, using the [_variables.tfvars.txt_](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/lab/variables.tfvars.txt) file as a template and making sure to complete all fields.
7
+
2. Create a _variables.tfvars_ file in the root directory, using the [_variables.tfvars.txt_](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/lab/variables.tfvars.txt) file as a template and making sure to complete all fields.
8
8
9
9
**The _variables.tfvars_ file is the heart of the terraform playbook** and it allows:
10
10
- To securely specify authentication credentials (the file is ignored by git)
@@ -20,4 +20,4 @@ This terraform script provisions a win 10 machine and runs a post-deployment scr
As a next step you should [Deploy Sentinel and onboard Sysmon data](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/guides/Sysmon-onboarding-quickstart.md).
23
+
As a next step you should [Deploy Sentinel and onboard Sysmon data](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/guides/Sysmon-onboarding-quickstart.md).
0 commit comments