MCP ExplorerExplorer

Public Sentinel Attack Simulator

@LaurieRhodeson 9 months ago
1 MIT
FreeCommunity
AI Systems
AI based attack Simulator for Microsoft Sentinel using Claude and Model Context Protocol

Overview

What is Public Sentinel Attack Simulator

PUBLIC-Sentinel-Attack-Simulator is an AI-based attack simulator designed for Microsoft Sentinel, utilizing Claude and the Model Context Protocol to generate and test security events.

Use cases

Use cases include simulating various security events, testing security responses, training security teams, and validating security configurations within Microsoft Sentinel.

How to use

To use PUBLIC-Sentinel-Attack-Simulator, install Node.js, deploy Azure resources using Bicep templates, configure Claude Desktop integration, and set up necessary environment variables and authentication.

Key features

Key features include integration with Claude Desktop, support for multiple Data Collection Rule types, automated deployment with Azure Bicep templates, configurable security event generation, and enterprise-grade authentication and security.

Where to use

PUBLIC-Sentinel-Attack-Simulator can be used in cybersecurity environments, particularly for organizations utilizing Microsoft Sentinel for security event management and simulation.

Content

Sentinel Writer Model Context Protocol (SWMCP)

Overview

The Sentinel Writer Model Context Protocol (SWMCP) is an advanced tool designed to integrate with Claude Desktop and Microsoft Sentinel for AI-driven security event simulation and testing. This tool leverages the Model Context Protocol to enable sophisticated security event generation and testing scenarios within Microsoft Sentinel environments.

Key Features

  • Integration with Claude Desktop via Model Context Protocol
  • Support for multiple Data Collection Rule (DCR) types including:
    • ASIM (Advanced Security Information Model) logs
    • AWS security logs (CloudTrail, CloudWatch, GuardDuty, VPCFlow)
    • GCP security logs (Audit Logs, Cloud SCC)
    • Windows and Syslog events
    • Common Security Log format
  • Automated deployment using Azure Bicep templates
  • Configurable security event generation
  • Enterprise-grade authentication and security

Quick Start

  1. Install Node.js on your Windows machine
  2. Deploy the required Azure resources using the provided Bicep templates
  3. Configure the Claude Desktop integration
  4. Set up the necessary environment variables and authentication

Detailed installation and configuration instructions can be found in the Installation Guide.

Project Structure

PUBLIC-Sentinel-Attack-Simulator/
├── .git/                           # Git repository data
├── docs/                           # Documentation files
│   ├── installation.md            # Installation instructions
│   ├── configuration.md           # Configuration guide
│   ├── architecture.md            # Architecture documentation
│   └── usage.md                   # Usage guide
├── infrastructure/                 # Azure infrastructure as code
│   ├── main.bicep                # Main Bicep deployment template
│   ├── parameters.json           # Deployment parameters
│   ├── DCR-Anomalies.bicep       # Anomalies DCR template
│   ├── DCR-ASimAuditEventLogs.bicep
│   ├── DCR-ASimAuthenticationEventLogs.bicep
│   ├── DCR-ASimDhcpEventLogs.bicep
│   ├── DCR-ASimDnsActivityLogs.bicep
│   ├── DCR-ASimFileEventLogs.bicep
│   ├── DCR-ASimNetworkSessionLogs.bicep
│   ├── DCR-ASimProcessEventLogs.bicep
│   ├── DCR-ASimRegistryEventLogs.bicep
│   ├── DCR-ASimUserManagementActivityLogs.bicep
│   ├── DCR-ASimWebSessionLogs.bicep
│   ├── DCR-AWSCloudTrail.bicep
│   ├── DCR-AWSCloudWatch.bicep
│   ├── DCR-AWSGuardDuty.bicep
│   ├── DCR-AWSVPCFlow.bicep
│   ├── DCR-CommonSecurityLog.bicep
│   ├── DCR-GCPAuditLogs.bicep
│   ├── DCR-GoogleCloudSCC.bicep
│   ├── DCR-SecurityEvent.bicep
│   ├── DCR-Syslog.bicep
│   └── DCR-WindowsEvent.bicep
├── src/                           # Source code
│   ├── claude_desktop_config.json # Claude Desktop configuration
│   └── server-sentinel-writer/    # Sentinel Writer MCP server
├── README.md                      # Project README
└── PROJECT.md                     # This file - Project structure and documentation map

Key Components

Infrastructure Components

  1. Data Collection Rules (DCRs)

    • ASIM (Advanced Security Information Model) templates
    • Cloud provider log templates (AWS, GCP)
    • Traditional security log templates
    • System event templates
  2. Source Code

    • Claude Desktop configuration
    • Sentinel Writer MCP server implementation
    • Supporting utilities and tools

Integration Points

  1. Claude Desktop Integration

    • MCP server configuration
    • Event generation interface
  2. Azure Integration

    • Data Collection Endpoints
    • Data Collection Rules
    • Microsoft Sentinel workspace
  3. Model Context Protocol

    • Brave Search integration (optional)
    • Event generation protocol
    • Server communication

Documentation

Prerequisites

  • Windows operating system
  • Node.js
  • Azure subscription
  • Microsoft Sentinel workspace
  • Claude Desktop application
  • Appropriate Azure permissions for DCR deployment

Contributing

At this stage, code is provide as a learning example only. If there was interest the project could be evolved for active development but this is not planned for.

License

This project is released under MIT license.

Tools

No tools

Comments

Recommend MCP Servers

View All MCP Servers