Student Name: Daniel Wanjama
Student ID: ADC-CSS02-25012
Introduction
This lab explores Microsoft’s cloud security tools, including Microsoft 365 tenant setup, Azure Network Security Groups (NSGs), Microsoft Defender for Cloud, Microsoft Sentinel, and Microsoft Defender for Cloud Apps. Each tool plays a critical role in protecting identities, networks, applications, and data in Azure cloud environments. The lab provides hands-on experience in configuring and managing these security solutions to ensure robust protection against evolving threats.
Objectives
- Understand and configure Azure Network Security Groups for traffic control.
- Explore Microsoft Defender for Cloud to assess and improve security posture.
- Set up Microsoft Sentinel for threat detection and response.
- Investigate app governance using Microsoft Defender for Cloud Apps.
Prerequisites
- An active Azure subscription.
- Basic knowledge of Azure Portal, virtual networks, and Microsoft 365.
- Access to Azure Cloud Shell or PowerShell for command-line tasks.
Walkthrough
Lab 1: Azure Network Security Groups (NSGs)
Task 1: View VM Details
- Log in to the Azure Portal.
- Locate the pre-created virtual machine (VM) in the portal.
- Review the VM’s configuration and network interface settings.

Task 2: Create NSG and Add RDP Rule
- Navigate to Network security groups > Create.
- Create a new NSG named NSG-SC900.
- Associate it with the VM’s network interface card (NIC).
- Add an inbound rule to allow RDP (port 3389).


Task 3: Test RDP and Outbound Access
- Use the Check Access feature to verify RDP connectivity.
- Connect to the VM via Native RDP and test outbound internet access (e.g., browsing a website).


Task 4: Block Outbound Internet
- Create an outbound rule in NSG-SC900 to deny traffic to the Internet service tag.
- Test by attempting to access
www.bing.com
from the VM (access should fail).


Lab 2: Microsoft Defender for Cloud
Task 1: Explore Defender Dashboard
- Navigate to Microsoft Defender for Cloud in the Azure Portal.
- Review the secure score, assessed resources, and security recommendations.

Task 2: Review Recommendations
- Select a VM resource and view remediation steps for identified security issues.

Task 3: Enable Defender Plans
- Enable the Cloud Security Posture Management (CSPM) and Server protection plans.

Lab 3: Microsoft Sentinel
Task 1: Create Sentinel Instance
- Create a Log Analytics workspace named SC900-LogAnalytics-workspace.
- Enable Microsoft Sentinel in the workspace.

Task 2: Assign Roles
- In the resource group SC900-Sentinel-RG, assign built-in Sentinel roles via Identity and Access Management (IAM).

Task 3: Connect Defender for Cloud
- Navigate to Content Hub in Microsoft Sentinel.
- Deploy the Defender for Cloud solution and configure the connector.
- Verify alert ingestion from Defender for Cloud.


Lab 4: Microsoft Defender for Cloud Apps
Task 1: Explore Cloud Discovery
- Access the Microsoft 365 Defender portal.
- Navigate to the Cloud Discovery dashboard to review discovered apps.

Task 2: Review App Catalog
- View discovered apps, their risk scores, and usage statistics in the app catalog.

Task 3: Investigate Findings
- Use investigation tools and filters to analyze app-related findings.

- Tag apps as sanctioned or unsanctioned.
- Enable file monitoring under Information Protection.
