- Explore MCP Servers
- PUBLIC-Sentinel-Attack-Simulator
Public Sentinel Attack Simulator
What is Public Sentinel Attack Simulator
PUBLIC-Sentinel-Attack-Simulator is an AI-based attack simulator designed for Microsoft Sentinel, utilizing Claude and the Model Context Protocol to generate and test security events.
Use cases
Use cases include simulating various security events, testing security responses, training security teams, and validating security configurations within Microsoft Sentinel.
How to use
To use PUBLIC-Sentinel-Attack-Simulator, install Node.js, deploy Azure resources using Bicep templates, configure Claude Desktop integration, and set up necessary environment variables and authentication.
Key features
Key features include integration with Claude Desktop, support for multiple Data Collection Rule types, automated deployment with Azure Bicep templates, configurable security event generation, and enterprise-grade authentication and security.
Where to use
PUBLIC-Sentinel-Attack-Simulator can be used in cybersecurity environments, particularly for organizations utilizing Microsoft Sentinel for security event management and simulation.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Overview
What is Public Sentinel Attack Simulator
PUBLIC-Sentinel-Attack-Simulator is an AI-based attack simulator designed for Microsoft Sentinel, utilizing Claude and the Model Context Protocol to generate and test security events.
Use cases
Use cases include simulating various security events, testing security responses, training security teams, and validating security configurations within Microsoft Sentinel.
How to use
To use PUBLIC-Sentinel-Attack-Simulator, install Node.js, deploy Azure resources using Bicep templates, configure Claude Desktop integration, and set up necessary environment variables and authentication.
Key features
Key features include integration with Claude Desktop, support for multiple Data Collection Rule types, automated deployment with Azure Bicep templates, configurable security event generation, and enterprise-grade authentication and security.
Where to use
PUBLIC-Sentinel-Attack-Simulator can be used in cybersecurity environments, particularly for organizations utilizing Microsoft Sentinel for security event management and simulation.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Content
Sentinel Writer Model Context Protocol (SWMCP)
Overview
The Sentinel Writer Model Context Protocol (SWMCP) is an advanced tool designed to integrate with Claude Desktop and Microsoft Sentinel for AI-driven security event simulation and testing. This tool leverages the Model Context Protocol to enable sophisticated security event generation and testing scenarios within Microsoft Sentinel environments.
Key Features
- Integration with Claude Desktop via Model Context Protocol
- Support for multiple Data Collection Rule (DCR) types including:
- ASIM (Advanced Security Information Model) logs
- AWS security logs (CloudTrail, CloudWatch, GuardDuty, VPCFlow)
- GCP security logs (Audit Logs, Cloud SCC)
- Windows and Syslog events
- Common Security Log format
- Automated deployment using Azure Bicep templates
- Configurable security event generation
- Enterprise-grade authentication and security
Quick Start
- Install Node.js on your Windows machine
- Deploy the required Azure resources using the provided Bicep templates
- Configure the Claude Desktop integration
- Set up the necessary environment variables and authentication
Detailed installation and configuration instructions can be found in the Installation Guide.
Project Structure
PUBLIC-Sentinel-Attack-Simulator/ ├── .git/ # Git repository data ├── docs/ # Documentation files │ ├── installation.md # Installation instructions │ ├── configuration.md # Configuration guide │ ├── architecture.md # Architecture documentation │ └── usage.md # Usage guide ├── infrastructure/ # Azure infrastructure as code │ ├── main.bicep # Main Bicep deployment template │ ├── parameters.json # Deployment parameters │ ├── DCR-Anomalies.bicep # Anomalies DCR template │ ├── DCR-ASimAuditEventLogs.bicep │ ├── DCR-ASimAuthenticationEventLogs.bicep │ ├── DCR-ASimDhcpEventLogs.bicep │ ├── DCR-ASimDnsActivityLogs.bicep │ ├── DCR-ASimFileEventLogs.bicep │ ├── DCR-ASimNetworkSessionLogs.bicep │ ├── DCR-ASimProcessEventLogs.bicep │ ├── DCR-ASimRegistryEventLogs.bicep │ ├── DCR-ASimUserManagementActivityLogs.bicep │ ├── DCR-ASimWebSessionLogs.bicep │ ├── DCR-AWSCloudTrail.bicep │ ├── DCR-AWSCloudWatch.bicep │ ├── DCR-AWSGuardDuty.bicep │ ├── DCR-AWSVPCFlow.bicep │ ├── DCR-CommonSecurityLog.bicep │ ├── DCR-GCPAuditLogs.bicep │ ├── DCR-GoogleCloudSCC.bicep │ ├── DCR-SecurityEvent.bicep │ ├── DCR-Syslog.bicep │ └── DCR-WindowsEvent.bicep ├── src/ # Source code │ ├── claude_desktop_config.json # Claude Desktop configuration │ └── server-sentinel-writer/ # Sentinel Writer MCP server ├── README.md # Project README └── PROJECT.md # This file - Project structure and documentation map
Key Components
Infrastructure Components
-
Data Collection Rules (DCRs)
- ASIM (Advanced Security Information Model) templates
- Cloud provider log templates (AWS, GCP)
- Traditional security log templates
- System event templates
-
Source Code
- Claude Desktop configuration
- Sentinel Writer MCP server implementation
- Supporting utilities and tools
Integration Points
-
Claude Desktop Integration
- MCP server configuration
- Event generation interface
-
Azure Integration
- Data Collection Endpoints
- Data Collection Rules
- Microsoft Sentinel workspace
-
Model Context Protocol
- Brave Search integration (optional)
- Event generation protocol
- Server communication
Documentation
Prerequisites
- Windows operating system
- Node.js
- Azure subscription
- Microsoft Sentinel workspace
- Claude Desktop application
- Appropriate Azure permissions for DCR deployment
Contributing
At this stage, code is provide as a learning example only. If there was interest the project could be evolved for active development but this is not planned for.
License
This project is released under MIT license.
Dev Tools Supporting MCP
The following are the main code editors that support the Model Context Protocol. Click the link to visit the official website for more information.










