This project demonstrates how security event logs can be analyzed to identify suspicious activity and potential threats.
- Analyze security event logs
- Identify anomalies and suspicious behavior
- Document investigation findings
- Microsoft Sentinel
- KQL queries
- Security event logs
- Collect log data
- Query logs to identify anomalies
- Investigate suspicious events
- Document findings
Suspicious login attempts were identified from an unfamiliar IP address outside normal login hours. Queries were used to analyze authentication events and confirm abnormal behavior patterns.