This project replicates a real-world Security Operations Center (SOC) environment by simulating, detecting, and alerting on suspicious login activity using Azure Sentinel, Log Analytics, and Logic Apps — all within the Azure Free Tier.
The goal was to simulate threats like:
Multiple failed logins (brute-force attempts)
Logins from unusual locations
Off-hour access behavior
I built a full threat detection pipeline that collects login events, detects anomalies using KQL, triggers alerts automatically, and visualizes the data using an interactive analyst dashboard.
⚙️ Tools & Technologies Used
🔹 Azure Log Analytics – to store and query simulated login logs
🔹 Microsoft Sentinel (SIEM) – to detect threats using analytic rules