Student Name: Daniel Wanjama
Student ID: ADC-CSS02-25012


Introduction

This lab explores Microsoft’s cloud security tools, including Microsoft 365 tenant setup, Azure Network Security Groups (NSGs), Microsoft Defender for Cloud, Microsoft Sentinel, and Microsoft Defender for Cloud Apps. Each tool plays a critical role in protecting identities, networks, applications, and data in Azure cloud environments. The lab provides hands-on experience in configuring and managing these security solutions to ensure robust protection against evolving threats.


Objectives


Prerequisites


Walkthrough

Lab 1: Azure Network Security Groups (NSGs)

Task 1: View VM Details

  1. Log in to the Azure Portal.
  2. Locate the pre-created virtual machine (VM) in the portal.
  3. Review the VM’s configuration and network interface settings.

Viewing VM details


Task 2: Create NSG and Add RDP Rule

  1. Navigate to Network security groups > Create.
  2. Create a new NSG named NSG-SC900.
  3. Associate it with the VM’s network interface card (NIC).
  4. Add an inbound rule to allow RDP (port 3389).

Creating NSG
Adding RDP rule


Task 3: Test RDP and Outbound Access

  1. Use the Check Access feature to verify RDP connectivity.
  2. Connect to the VM via Native RDP and test outbound internet access (e.g., browsing a website).

Testing RDP connectivity
Testing outbound access


Task 4: Block Outbound Internet

  1. Create an outbound rule in NSG-SC900 to deny traffic to the Internet service tag.
  2. Test by attempting to access www.bing.com from the VM (access should fail).

Blocking outbound internet rule
Testing blocked access


Lab 2: Microsoft Defender for Cloud

Task 1: Explore Defender Dashboard

  1. Navigate to Microsoft Defender for Cloud in the Azure Portal.
  2. Review the secure score, assessed resources, and security recommendations.

Defender for Cloud dashboard


Task 2: Review Recommendations

  1. Select a VM resource and view remediation steps for identified security issues.

Security recommendations


Task 3: Enable Defender Plans

  1. Enable the Cloud Security Posture Management (CSPM) and Server protection plans.

Enabling Defender plans


Lab 3: Microsoft Sentinel

Task 1: Create Sentinel Instance

  1. Create a Log Analytics workspace named SC900-LogAnalytics-workspace.
  2. Enable Microsoft Sentinel in the workspace.

Creating Sentinel instance


Task 2: Assign Roles

  1. In the resource group SC900-Sentinel-RG, assign built-in Sentinel roles via Identity and Access Management (IAM).

Assigning Sentinel roles


Task 3: Connect Defender for Cloud

  1. Navigate to Content Hub in Microsoft Sentinel.
  2. Deploy the Defender for Cloud solution and configure the connector.
  3. Verify alert ingestion from Defender for Cloud.

Accessing Content Hub
Deploying Defender solution


Lab 4: Microsoft Defender for Cloud Apps

Task 1: Explore Cloud Discovery

  1. Access the Microsoft 365 Defender portal.
  2. Navigate to the Cloud Discovery dashboard to review discovered apps.

Cloud Discovery dashboard


Task 2: Review App Catalog

  1. View discovered apps, their risk scores, and usage statistics in the app catalog.

Reviewing app catalog


Task 3: Investigate Findings

  1. Use investigation tools and filters to analyze app-related findings.

Investigation tools


Task 4: Configure Policies

  1. Tag apps as sanctioned or unsanctioned.
  2. Enable file monitoring under Information Protection.

Configuring policy controls