{"componentChunkName":"component---src-templates-post-template-js","path":"/honeypot-setup-on-azure-en","result":{"data":{"markdownRemark":{"id":"4d1c4a09-1851-52e9-a460-6043fcc9a4ac","html":"<blockquote>\n<p>This page has been machine-translated from the <a href=\"/honeypot-setup-on-azure\">original page</a>.</p>\n</blockquote>\n<p>I’m planning to start playing around with Azure, and first of all, I’d like to deploy <a href=\"https://github.com/telekom-security/tpotce\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">T-Pot</a>, a honeypot I’ve been interested in for a while.</p>\n<p>Ever since I read the book <a href=\"https://amzn.to/34tqh58\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Analyzing the Footprints of Cyber Attacks: Honeypot Observation Records</a>, I’ve wanted to try this, but I couldn’t commit due to risks and cost concerns.</p>\n<p>This time, it seems I can do this nicely using Azure, so I’ll be setting up T-Pot on an Azure environment.</p>\n<p>I’m figuring things out as I go, but I’ll proceed with safety first.</p>\n<p>As I’m a beginner, the content of this article is not necessarily best practice, so I’ll add improvements as I find them.</p>\n<h2 id=\"about-this-article\" style=\"position:relative;\"><a href=\"#about-this-article\" aria-label=\"about this article permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>About this Article</h2>\n<p><strong>The content of this article is not intended to encourage acts that violate social order.</strong></p>\n<p>Please be aware that attempting attacks on environments other than your own or those you have permission to access may violate the “Act on Prohibition of Unauthorized Computer Access (Unauthorized Access Prohibition Act)“.</p>\n<p>All statements are attributed to me personally, not to any organization I belong to.</p>\n<!-- omit in toc -->\n<h2 id=\"table-of-contents\" style=\"position:relative;\"><a href=\"#table-of-contents\" aria-label=\"table of contents permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Table of Contents</h2>\n<ul>\n<li><a href=\"#about-this-article\">About this Article</a></li>\n<li><a href=\"#things-decided--confirmed-in-advance\">Things Decided &#x26; Confirmed in Advance</a></li>\n<li>\n<p><a href=\"#avoiding-police-trouble\">Avoiding Police Trouble</a></p>\n<ul>\n<li><a href=\"#do-not-acquire-or-store-malware-or-unauthorized-programs\">Do Not Acquire or Store Malware or Unauthorized Programs</a></li>\n<li><a href=\"#not-247-operation-automatic-shutdown-except-when-manually-started\">Not 24/7 Operation, Automatic Shutdown Except When Manually Started</a></li>\n<li><a href=\"#ensure-adequate-host-security-measures\">Ensure Adequate Host Security Measures</a></li>\n<li><a href=\"#establish-monitoring-and-notification-systems-for-host-operation-status\">Establish Monitoring and Notification Systems for Host Operation Status</a></li>\n<li><a href=\"#use-a-bastion-machine-built-on-azure-to-connect-to-the-honeypot\">Use a Bastion Machine Built on Azure to Connect to the Honeypot</a></li>\n<li><a href=\"#additional-note-on-bastion-server\">Additional Note on Bastion Server</a></li>\n</ul>\n</li>\n<li>\n<p><a href=\"#comply-with-azure-terms\">Comply with Azure Terms</a></p>\n<ul>\n<li><a href=\"#prohibited-actions\">Prohibited Actions</a></li>\n<li><a href=\"#permitted-actions\">Permitted Actions</a></li>\n</ul>\n</li>\n<li>\n<p><a href=\"#building-virtual-machines-on-azure\">Building Virtual Machines on Azure</a></p>\n<ul>\n<li><a href=\"#create-resource-group-for-honeypot-environment\">Create Resource Group for Honeypot Environment</a></li>\n<li><a href=\"#create-security-group-to-apply-to-honeypot-machine\">Create Security Group to Apply to Honeypot Machine</a></li>\n<li><a href=\"#create-virtual-network-for-honeypot-machine\">Create Virtual Network for Honeypot Machine</a></li>\n<li><a href=\"#create-virtual-machines\">Create Virtual Machines</a></li>\n<li><a href=\"#honeypot-machine\">Honeypot Machine</a></li>\n<li><a href=\"#bastion-server\">Bastion Server</a></li>\n<li><a href=\"#about-bastion-server-size-added\">About Bastion Server Size (Added)</a></li>\n<li><a href=\"#environment-setup\">Environment Setup</a></li>\n<li><a href=\"#dns-name-configuration\">DNS Name Configuration</a></li>\n</ul>\n</li>\n<li>\n<p><a href=\"#building-azure-sentinel\">Building Azure Sentinel</a></p>\n<ul>\n<li><a href=\"#install-linux-agent-on-bastion-server\">Install Linux Agent on Bastion Server</a></li>\n<li><a href=\"#enable-port-514-listening-on-bastion-server\">Enable Port 514 Listening on Bastion Server</a></li>\n<li><a href=\"#configure-cloud-one-syslog-events-to-forward-from-honeypot-machine-to-bastion-server\">Configure Cloud One Syslog Events to Forward from Honeypot Machine to Bastion Server</a></li>\n</ul>\n</li>\n<li><a href=\"#supplement-expanding-honeypot-machine-disk\">Supplement: Expanding Honeypot Machine Disk</a></li>\n<li><a href=\"#creating-snapshots\">Creating Snapshots</a></li>\n<li>\n<p><a href=\"#installing-t-pot\">Installing T-Pot</a></p>\n<ul>\n<li><a href=\"#adding-docker-user\">Adding Docker User</a></li>\n<li><a href=\"#connecting-to-t-pot-via-bastion-using-ssh-dynamic-forwarding\">Connecting to T-Pot via Bastion Using SSH Dynamic Forwarding</a></li>\n</ul>\n</li>\n<li><a href=\"#summary\">Summary</a></li>\n<li><a href=\"#reference-books\">Reference Books</a></li>\n</ul>\n<h2 id=\"things-decided--confirmed-in-advance\" style=\"position:relative;\"><a href=\"#things-decided--confirmed-in-advance\" aria-label=\"things decided  confirmed in advance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Things Decided &#x26; Confirmed in Advance</h2>\n<p>Before creating a honeypot environment on Azure, I made the following two decisions and confirmations:</p>\n<ul>\n<li>Avoiding police trouble</li>\n<li>Comply with Azure terms</li>\n</ul>\n<p>I’ll pay particular attention to these two points.</p>\n<h2 id=\"avoiding-police-trouble\" style=\"position:relative;\"><a href=\"#avoiding-police-trouble\" aria-label=\"avoiding police trouble permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Avoiding Police Trouble</h2>\n<p>I’m prioritizing this above all else lol</p>\n<p>If I were to be arrested and detained by the police, or summarily prosecuted like in the Coinhive case or Wizard Bible case, my PC would be seized and I wouldn’t be able to work, which would be game over.</p>\n<p>Even if I’m completely innocent, there can be losing events where the police misunderstand and conduct a home search, so it’s an impossible game, but I want to take as many countermeasures as possible.</p>\n<p>Reference: <a href=\"https://yashio.hatenablog.com/entry/20220208/1644325200\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Life Continuation Plan in Case of Arrest - yashio</a></p>\n<p>In other cases, there are quite a few scary stories like “the police conducted a home search as a result of a site operated on a rental server being cracked” or “the administrator of a rental server where a fraudulent site was operated was questioned”.</p>\n<p>Honestly, I think there’s considerable risk for individuals living in Japan to engage in personal security-related activities.</p>\n<p>(That’s also why I’ve been avoiding setting up a honeypot for so long.)</p>\n<p>However, since I’ve decided to do it, I’ll work on operations that can avoid risks as much as possible.</p>\n<p>Specifically, as of 2022/02/09 when I decided to build this environment, I’m assuming the following points:</p>\n<ul>\n<li>Do not acquire or store malware or unauthorized programs</li>\n<li>Not 24/7 operation, automatic shutdown except when manually started</li>\n<li>Ensure adequate host security measures</li>\n<li>Establish monitoring and notification systems for host operation status</li>\n<li>Use a bastion machine built on Azure to connect to the honeypot</li>\n</ul>\n<h3 id=\"do-not-acquire-or-store-malware-or-unauthorized-programs\" style=\"position:relative;\"><a href=\"#do-not-acquire-or-store-malware-or-unauthorized-programs\" aria-label=\"do not acquire or store malware or unauthorized programs permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Do Not Acquire or Store Malware or Unauthorized Programs</h3>\n<p>First of all, <a href=\"https://github.com/telekom-security/tpotce\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">T-Pot</a> is roughly speaking a tool that can run various honeypots.</p>\n<p>Among these, there are honeypots aimed at collecting malware.</p>\n<p>Reference: <a href=\"https://tech-lab.sios.jp/archives/26325\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">What is a Honeypot? Actually Making and Touching One - Construction Edition | SIOS Tech. Lab</a></p>\n<p>For now, I plan to operate without using honeypots aimed at collecting malware.</p>\n<p>The reason is that I’m afraid of violating the <a href=\"https://www.keishicho.metro.tokyo.lg.jp/kurashi/cyber/law/virus.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">crime related to unauthorized command electromagnetic records</a>.</p>\n<p>While this law prohibits possession of malware “for malicious purposes”, unfortunately the criteria for this are quite ambiguous at present.</p>\n<blockquote>\n<p>What is the crime of acquiring and storing viruses</p>\n<p>Without legitimate reason, for the purpose of having them executed automatically regardless of the user’s intention, acquiring or storing computer viruses or computer virus source code.</p>\n</blockquote>\n<p>Reference: <a href=\"https://www.keishicho.metro.tokyo.lg.jp/kurashi/cyber/law/virus.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Crimes Related to Unauthorized Command Electromagnetic Records, Metropolitan Police Department</a></p>\n<p>The following site is very helpful as it summarizes the results of <a href=\"https://twitter.com/it_giron\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">@it_giron</a>’s disclosure requests to various prefectural police departments regarding the constituent requirements of “crimes related to unauthorized command electromagnetic records”.</p>\n<p>Reference: <a href=\"https://it-giron.com/262\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Status of Disclosure Requests to Prefectural Police Departments Regarding “Crimes Related to Unauthorized Command Electromagnetic Records” | IT Discussion</a></p>\n<h3 id=\"not-247-operation-automatic-shutdown-except-when-manually-started\" style=\"position:relative;\"><a href=\"#not-247-operation-automatic-shutdown-except-when-manually-started\" aria-label=\"not 247 operation automatic shutdown except when manually started permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Not 24/7 Operation, Automatic Shutdown Except When Manually Started</h3>\n<p>For the time being, I plan to operate the honeypot machine by stopping it at night using Azure’s auto-shutdown function.</p>\n<p>Once the operation is established to some extent, I’ll extend the operating hours.</p>\n<h3 id=\"ensure-adequate-host-security-measures\" style=\"position:relative;\"><a href=\"#ensure-adequate-host-security-measures\" aria-label=\"ensure adequate host security measures permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Ensure Adequate Host Security Measures</h3>\n<p>This is probably where the biggest risk lies.</p>\n<p>If the honeypot is compromised for some reason and becomes a BOT, it may attack other users or become a relay server for unauthorized files.</p>\n<p>To prevent this, I want to create security measures and monitoring mechanisms.</p>\n<p>For now, I’ll install the agent of <a href=\"https://www.trendmicro.com/ja_jp/business/products/hybrid-cloud/cloud-one-workload-security.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Trend Micro Cloud One Workload Security</a> on the machine where the honeypot is built.</p>\n<p>This security software can manage up to 5 machines for free, and can perform anti-malware, host-based IDS, critical file change monitoring, and application whitelist operations.</p>\n<p>(Also, I used it at my previous job and am personally familiar with its operation)</p>\n<p> Added note</p>\n<p>Unfortunately, as of 2022/01/31, the license system has changed and the free use of up to 5 machines is no longer available.</p>\n<p>Sad.</p>\n<p>Reference: <a href=\"https://community-trendmicro.force.com/solution/000290385\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">“Free - 5 Computers” End of Support for Trend Micro Cloud One - Workload Security and Deep Security as a Service</a></p>\n<p>I’ll switch to an OSS EDR tool or similar soon.</p>\n<h3 id=\"establish-monitoring-and-notification-systems-for-host-operation-status\" style=\"position:relative;\"><a href=\"#establish-monitoring-and-notification-systems-for-host-operation-status\" aria-label=\"establish monitoring and notification systems for host operation status permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Establish Monitoring and Notification Systems for Host Operation Status</h3>\n<p>I’ll properly monitor and operate the host’s operation status.</p>\n<p>I’ll forward various logs and events to Slack or Discord.</p>\n<p>For costs, I’m implementing SMS and email notifications.</p>\n<p>I summarized the cost alert settings in the following article.</p>\n<p>Reference: <a href=\"/azure-setup-on-money\">Checking Azure Active Directory ID Security Score</a></p>\n<!-- ### Controlling Outbound Communication\n\nIn case the honeypot host becomes a BOT, I plan to control outbound communication with security groups.\n\nNote that if all outbound communication is blocked, handshaking won't be possible either, so I'll only control outbound communication to ports in the 0-1023 range.\n\nThis way, if something goes wrong, the risk of the honeypot machine actively attacking other services can be minimized.\n\nNote that necessary outbound communications such as connections with the Cloud One management manager and Syslog forwarding mentioned later need to be explicitly allowed. -->\n<h3 id=\"use-a-bastion-machine-built-on-azure-to-connect-to-the-honeypot\" style=\"position:relative;\"><a href=\"#use-a-bastion-machine-built-on-azure-to-connect-to-the-honeypot\" aria-label=\"use a bastion machine built on azure to connect to the honeypot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Use a Bastion Machine Built on Azure to Connect to the Honeypot</h3>\n<p>Since I’m not planning to collect malware this time, I don’t think there’s much risk, but to avoid accidentally bringing bad things from the honeypot to my environment, connections to the honeypot will be made via a bastion.</p>\n<h3 id=\"additional-note-on-bastion-server\" style=\"position:relative;\"><a href=\"#additional-note-on-bastion-server\" aria-label=\"additional note on bastion server permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Additional Note on Bastion Server</h3>\n<p>Although I created a virtual machine for bastion access and allowed access via SSH port forwarding, the communication became very unstable.</p>\n<p>This is probably because the bastion machine has specs of 1vCPU / 1 RAM, but since increasing the bastion server’s specs is costly, I ultimately decided to access the T-Pot machine from a virtual machine built on my private machine.</p>\n<p>The bastion server on Azure will be used as a Syslog server running the Sentinel Agent, and for running honeypot monitoring tools and notification programs.</p>\n<p>Access to the T-Pot console was restricted by my home’s global IP address.</p>\n<h2 id=\"comply-with-azure-terms\" style=\"position:relative;\"><a href=\"#comply-with-azure-terms\" aria-label=\"comply with azure terms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Comply with Azure Terms</h2>\n<p>This time I’m setting up a honeypot on Azure, so I checked the terms.</p>\n<p>Looking at Azure’s Q&#x26;A site, it seems that operating honeypots is not particularly prohibited.</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/en-us/answers/questions/318375/deployed-tpot-on-azure-vm.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Deployed tpot on azure VM - Microsoft Q&#x26;A</a></p>\n<p>Reference: <a href=\"https://blackle0pard.net/wxn7jq/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Investigating Whether Honeypot Operation Violates Terms #2 - Black Leopard’s Blog</a></p>\n<p>However, the following acts are prohibited, so care must be taken not to fall under these.</p>\n<p>In all cases, it’s okay if the scope of impact is only your own environment, and attacks on other users or Azure itself are NG.</p>\n<h3 id=\"prohibited-actions\" style=\"position:relative;\"><a href=\"#prohibited-actions\" aria-label=\"prohibited actions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Prohibited Actions</h3>\n<ul>\n<li>Scanning or testing assets owned by other Microsoft cloud customers.</li>\n<li>Accessing data that is not entirely your own.</li>\n<li>Performing any kind of denial of service testing.</li>\n<li>Performing network-intensive fuzzing against assets other than your Azure virtual machines.</li>\n<li>Conducting automated testing of services that generate large amounts of traffic.</li>\n<li>Intentionally accessing other customers’ data.</li>\n<li>Performing reproduction steps beyond “proof of concept” for infrastructure execution issues.\n(For example, proving that you have system administrator access with SQLi is acceptable, but executing xp_cmdshell is not)</li>\n<li>Using our services in a manner that violates the Acceptable Use Policy stipulated in the Microsoft Online Service Terms.</li>\n<li>Attempting phishing or other social engineering attacks against our employees.</li>\n</ul>\n<h3 id=\"permitted-actions\" style=\"position:relative;\"><a href=\"#permitted-actions\" aria-label=\"permitted actions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Permitted Actions</h3>\n<p>Conversely, the following acts seem to be permitted:</p>\n<ul>\n<li>Creating a small number of test accounts and/or trial tenants to demonstrate and prove data access between accounts or tenants.\n※ However, using one of these accounts to access other customers’ or accounts’ data is prohibited.</li>\n<li>Running fuzzing, port scanning, or vulnerability assessment tools against your own Azure virtual machines.</li>\n<li>Load testing your applications by generating traffic expected to occur in normal business operations. This includes testing surge capacity.</li>\n<li>Conducting security monitoring and detection testing. (For example, generating abnormal security logs, dropping EICAR, etc.)</li>\n<li>\n<p>Attempting to escape from shared service containers such as Azure Websites or Azure Functions.</p>\n<p>However, if successful, you must immediately report to Microsoft and stop further investigation. Intentionally accessing other customers’ data violates the terms.</p>\n</li>\n<li>Applying conditional access or mobile application management (MAM) policies within Microsoft Intune and testing the enforcement of restrictions imposed by these policies.</li>\n</ul>\n<h2 id=\"building-virtual-machines-on-azure\" style=\"position:relative;\"><a href=\"#building-virtual-machines-on-azure\" aria-label=\"building virtual machines on azure permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Building Virtual Machines on Azure</h2>\n<p>The system requirements for <a href=\"https://github.com/telekom-security/tpotce\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">T-Pot</a> are as follows:</p>\n<ul>\n<li>RAM 8GB</li>\n<li>SSD 128GB</li>\n<li>Network via DHCP</li>\n<li>Internet access environment (without proxy)</li>\n</ul>\n<p>To meet the above, I’ll create a Debian 10 (Buster) machine.</p>\n<p>To create the virtual machine, I’ll create the following resources first:</p>\n<ul>\n<li>Resource group for honeypot environment</li>\n<li>Security group to apply to honeypot machine</li>\n<li>Virtual network for honeypot machine</li>\n</ul>\n<h3 id=\"create-resource-group-for-honeypot-environment\" style=\"position:relative;\"><a href=\"#create-resource-group-for-honeypot-environment\" aria-label=\"create resource group for honeypot environment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create Resource Group for Honeypot Environment</h3>\n<p>By setting up a resource group, you can manage multiple resources together.</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/azure/azure-resource-manager/management/manage-resource-groups-portal\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Managing Resource Groups - Azure portal - Azure Resource Manager | Microsoft Docs</a></p>\n<p>This time I created a resource group as follows and also set tags.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/3534bac660d0649f6f4767c34aff2da0/0b533/image-17.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 73.75%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/3534bac660d0649f6f4767c34aff2da0/8ac56/image-17.webp 240w,\n/static/3534bac660d0649f6f4767c34aff2da0/d3be9/image-17.webp 480w,\n/static/3534bac660d0649f6f4767c34aff2da0/b0a15/image-17.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/3534bac660d0649f6f4767c34aff2da0/8ff5a/image-17.png 240w,\n/static/3534bac660d0649f6f4767c34aff2da0/e85cb/image-17.png 480w,\n/static/3534bac660d0649f6f4767c34aff2da0/0b533/image-17.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/3534bac660d0649f6f4767c34aff2da0/0b533/image-17.png\"\n            alt=\"image-17.png\"\n            title=\"image-17.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<h3 id=\"create-security-group-to-apply-to-honeypot-machine\" style=\"position:relative;\"><a href=\"#create-security-group-to-apply-to-honeypot-machine\" aria-label=\"create security group to apply to honeypot machine permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create Security Group to Apply to Honeypot Machine</h3>\n<p>Network security groups are filters for network traffic that Azure resources send and receive.</p>\n<p>Filters can be applied by associating them with virtual machine network interfaces or subnets.</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/azure/virtual-network/network-security-groups-overview\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Azure Network Security Groups Overview | Microsoft Docs</a></p>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/azure/virtual-network/network-security-group-how-it-works\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Network Security Groups - How It Works | Microsoft Docs</a></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/80e75d1c4ca09a72e899cb8d9f300005/0b533/image-18-164640095564925.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 48.33333333333333%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/80e75d1c4ca09a72e899cb8d9f300005/8ac56/image-18-164640095564925.webp 240w,\n/static/80e75d1c4ca09a72e899cb8d9f300005/d3be9/image-18-164640095564925.webp 480w,\n/static/80e75d1c4ca09a72e899cb8d9f300005/b0a15/image-18-164640095564925.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/80e75d1c4ca09a72e899cb8d9f300005/8ff5a/image-18-164640095564925.png 240w,\n/static/80e75d1c4ca09a72e899cb8d9f300005/e85cb/image-18-164640095564925.png 480w,\n/static/80e75d1c4ca09a72e899cb8d9f300005/0b533/image-18-164640095564925.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/80e75d1c4ca09a72e899cb8d9f300005/0b533/image-18-164640095564925.png\"\n            alt=\"image-18.png\"\n            title=\"image-18.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Here, I created the following two types of security groups:</p>\n<ul>\n<li>Security group to apply to honeypot machine</li>\n<li>Security group for bastion server connecting to honeypot machine</li>\n</ul>\n<p>The bastion server’s security group allows inbound connections from my private machine to SSH and HTTPS ports, and all outbound communications.</p>\n<p> For the SSH port, I’ll use a random port instead of port 22 just to be safe.</p>\n<p>By the way, security groups are designed with “default rules” that allow all inbound communication from VirtualNetwork, so here I explicitly add a setting to deny all inbound communication from VirtualNetwork.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/781f6e35708cafa7ce7d8dd38867b910/0b533/image-24.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 22.916666666666668%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAFCAYAAABFA8wzAAAACXBIWXMAARlAAAEZQAGA43XUAAAA1UlEQVQY002Q627DIAxGef+n3I+pS5MUGu5Xf7NZiWYJYQv7cEAdxwHnHEopSDHO/bwCntrCuISf18W1n2s3Dm+f8DjfsKnOvu9dI9cGidEHVIhhFq13WB8xBoG4LiVzPuaZ5DmnmXfpsxdqrSA+9yyzQrsdKuf8RyfC7jseV0WsBGct+gfovZ/mEgLato2h9gO3N/D1/IJajUQDIUQ4Hu6tIaX0z7CgtfWsfn8RsUQI4b7MBw0lg7ORh43RvAzEWoYWMPLfitkyFCuBiKHYC1jCnht+AapFhepdxkVdAAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/781f6e35708cafa7ce7d8dd38867b910/8ac56/image-24.webp 240w,\n/static/781f6e35708cafa7ce7d8dd38867b910/d3be9/image-24.webp 480w,\n/static/781f6e35708cafa7ce7d8dd38867b910/b0a15/image-24.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/781f6e35708cafa7ce7d8dd38867b910/8ff5a/image-24.png 240w,\n/static/781f6e35708cafa7ce7d8dd38867b910/e85cb/image-24.png 480w,\n/static/781f6e35708cafa7ce7d8dd38867b910/0b533/image-24.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/781f6e35708cafa7ce7d8dd38867b910/0b533/image-24.png\"\n            alt=\"image-24.png\"\n            title=\"image-24.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>The idea is to set communications allowed on a VirtualNetwork basis, such as SSH, at higher priorities than this.</p>\n<h3 id=\"create-virtual-network-for-honeypot-machine\" style=\"position:relative;\"><a href=\"#create-virtual-network-for-honeypot-machine\" aria-label=\"create virtual network for honeypot machine permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create Virtual Network for Honeypot Machine</h3>\n<p>Azure virtual networks are elements that constitute private networks within Azure.</p>\n<p>By using Azure virtual networks, you can build private networks within Azure that are logically separated from other networks.</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/azure/virtual-network/virtual-networks-overview\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Azure Virtual Network | Microsoft Docs</a></p>\n<p>Reference: <a href=\"https://www.rworks.jp/cloud/azure/azure-column/azure-entry/22165/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">What is Azure’s Virtual Network Azure VNet? Explaining Communication Methods and Fees</a></p>\n<p>This time I created a tightly restricted subnet space for now.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/eb85c6083c126077ca22cb5198b3a3b9/0b533/image-20.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 70.41666666666667%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/eb85c6083c126077ca22cb5198b3a3b9/8ac56/image-20.webp 240w,\n/static/eb85c6083c126077ca22cb5198b3a3b9/d3be9/image-20.webp 480w,\n/static/eb85c6083c126077ca22cb5198b3a3b9/b0a15/image-20.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/eb85c6083c126077ca22cb5198b3a3b9/8ff5a/image-20.png 240w,\n/static/eb85c6083c126077ca22cb5198b3a3b9/e85cb/image-20.png 480w,\n/static/eb85c6083c126077ca22cb5198b3a3b9/0b533/image-20.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/eb85c6083c126077ca22cb5198b3a3b9/0b533/image-20.png\"\n            alt=\"image-20.png\"\n            title=\"image-20.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>At this stage, settings such as firewall are disabled for now.</p>\n<h3 id=\"create-virtual-machines\" style=\"position:relative;\"><a href=\"#create-virtual-machines\" aria-label=\"create virtual machines permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Create Virtual Machines</h3>\n<p>Next, I’ll create Azure virtual machines with the following configuration.</p>\n<h3 id=\"honeypot-machine\" style=\"position:relative;\"><a href=\"#honeypot-machine\" aria-label=\"honeypot machine permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Honeypot Machine</h3>\n<ul>\n<li>OS: Ubuntu20.04</li>\n<li>Infrastructure redundancy: None</li>\n<li>Security type: Standard</li>\n<li>Deletion type: Capacity only</li>\n<li>Deletion policy: Stop/deallocate</li>\n<li>Machine size: Standard<em>D2s</em>v3 (2vCPU 8GB RAM)</li>\n</ul>\n<p>Also, for networking, I’ll use the security group and virtual network created in advance.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/637348a6273b784de375fd7a9a66a503/0b533/image-21-164640097030027.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 89.99999999999999%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/637348a6273b784de375fd7a9a66a503/8ac56/image-21-164640097030027.webp 240w,\n/static/637348a6273b784de375fd7a9a66a503/d3be9/image-21-164640097030027.webp 480w,\n/static/637348a6273b784de375fd7a9a66a503/b0a15/image-21-164640097030027.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/637348a6273b784de375fd7a9a66a503/8ff5a/image-21-164640097030027.png 240w,\n/static/637348a6273b784de375fd7a9a66a503/e85cb/image-21-164640097030027.png 480w,\n/static/637348a6273b784de375fd7a9a66a503/0b533/image-21-164640097030027.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/637348a6273b784de375fd7a9a66a503/0b533/image-21-164640097030027.png\"\n            alt=\"image-21.png\"\n            title=\"image-21.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Also, in case SSH connection becomes unavailable for some reason, it’s good to enable the serial console for operation.</p>\n<p>Enable boot diagnostics to enable the serial console.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 497px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/9415485878d364de711d9802a795860a/15d25/image-29.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 22.916666666666668%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAFCAYAAABFA8wzAAAACXBIWXMAAAsTAAALEwEAmpwYAAAAoUlEQVQY042Q0Q6DIAxF/f9P3Is+MARmDEFchlruaMmcM9myJpe2CRxu20zTBI6cs+gY5/6faIwxIKL98TvLKTk8COu6Fa1YlgXbVutXn1ISxRgrcBgGgX4CaybKuNgZ1t3gnC1yGMcRWmsY06NtW3RdB9PXuvk23g4sbu4x4KoUrLWYiwteE0O99/IBix3KyMfdnevqkBAKQBUgA34F330CHZyG31gDDmYAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/9415485878d364de711d9802a795860a/8ac56/image-29.webp 240w,\n/static/9415485878d364de711d9802a795860a/d3be9/image-29.webp 480w,\n/static/9415485878d364de711d9802a795860a/a4aa0/image-29.webp 497w\"\n              sizes=\"(max-width: 497px) 100vw, 497px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/9415485878d364de711d9802a795860a/8ff5a/image-29.png 240w,\n/static/9415485878d364de711d9802a795860a/e85cb/image-29.png 480w,\n/static/9415485878d364de711d9802a795860a/15d25/image-29.png 497w\"\n            sizes=\"(max-width: 497px) 100vw, 497px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/9415485878d364de711d9802a795860a/15d25/image-29.png\"\n            alt=\"image-29.png\"\n            title=\"image-29.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p> If the managed storage account is not compatible, create a custom storage account.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 661px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/4f1fac449ca3d6f114a354dca0d6d712/0012b/image-30.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 57.91666666666667%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/4f1fac449ca3d6f114a354dca0d6d712/8ac56/image-30.webp 240w,\n/static/4f1fac449ca3d6f114a354dca0d6d712/d3be9/image-30.webp 480w,\n/static/4f1fac449ca3d6f114a354dca0d6d712/84ccf/image-30.webp 661w\"\n              sizes=\"(max-width: 661px) 100vw, 661px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/4f1fac449ca3d6f114a354dca0d6d712/8ff5a/image-30.png 240w,\n/static/4f1fac449ca3d6f114a354dca0d6d712/e85cb/image-30.png 480w,\n/static/4f1fac449ca3d6f114a354dca0d6d712/0012b/image-30.png 661w\"\n            sizes=\"(max-width: 661px) 100vw, 661px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/4f1fac449ca3d6f114a354dca0d6d712/0012b/image-30.png\"\n            alt=\"image-30.png\"\n            title=\"image-30.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<h3 id=\"bastion-server\" style=\"position:relative;\"><a href=\"#bastion-server\" aria-label=\"bastion server permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bastion Server</h3>\n<p>This time I want to prevent direct connection from my environment to the honeypot machine.</p>\n<p>Therefore, I’ll also create a bastion server on the same network.</p>\n<p>This time, I created the bastion server with Ubuntu.</p>\n<p>Since the bastion server is intended for continuous operation, I selected the size Standard_B1s (1vCPU 1GB RAM) (mainly for cost reasons). (It might be a bit tight for GUI use, though)</p>\n<p>Standard_B1s costs about 1000 yen per month.</p>\n<p>Since it’s for bastion use, I won’t create a disk and will assign the bastion security group created earlier.</p>\n<p>Standard<em>D2s</em>v3 used for the honeypot costs about 10,000 yen per month, so the difference is quite large.</p>\n<p>I want to access T-Pot’s web console from the bastion, so I’ll install a GUI and RDP connect from the host machine.</p>\n<p>For now, install the necessary packages.</p>\n<div class=\"gatsby-highlight\" data-language=\"bash\"><pre class=\"language-bash\"><code class=\"language-bash\"><span class=\"token function\">sudo</span> <span class=\"token function\">apt</span> <span class=\"token function\">install</span> ubuntu-desktop xrdp -y</code></pre></div>\n<p>For RDP setup, I referred to the link below and others.</p>\n<p>Reference: <a href=\"https://gihyo.jp/admin/serial/01/ubuntu-recipe/0621\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Episode 621: Using xrdp on Ubuntu 20.04 LTS: Ubuntu Weekly Recipe | gihyo.jp … Gijutsu-Hyohron</a></p>\n<p>Don’t forget to allow RDP from the host machine in the security group settings.</p>\n<p>SSH and RDP to the bastion will be attacked if opened to the internet, so it’s better to fix them with your own IP address.</p>\n<h3 id=\"about-bastion-server-size-added\" style=\"position:relative;\"><a href=\"#about-bastion-server-size-added\" aria-label=\"about bastion server size added permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>About Bastion Server Size (Added)</h3>\n<p>I was thinking of using GUI with Standard_B1s, but it’s terribly slow and unusable, so I gave up.</p>\n<p>The bastion server will be CLI only, and I’ll connect to the T-Pot console from the host machine using the bastion server as a proxy via SSH dynamic forwarding.</p>\n<p>The setup method will be described later.</p>\n<h3 id=\"environment-setup\" style=\"position:relative;\"><a href=\"#environment-setup\" aria-label=\"environment setup permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Environment Setup</h3>\n<p>Once SSH connection to the machine is available, upgrade the packages on both the honeypot and bastion server.</p>\n<div class=\"gatsby-highlight\" data-language=\"bash\"><pre class=\"language-bash\"><code class=\"language-bash\"><span class=\"token function\">sudo</span> <span class=\"token function\">apt</span> update <span class=\"token operator\">&amp;&amp;</span> <span class=\"token function\">sudo</span> <span class=\"token function\">apt</span> upgrade -y</code></pre></div>\n<p>Next, install the agent for <a href=\"https://www.trendmicro.com/ja_jp/business/products/hybrid-cloud/cloud-one-workload-security.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Trend Micro Cloud One Workload Security</a> and set up policies appropriately.</p>\n<p>(It’s really painful that the 5-machine permanent free license is gone..)</p>\n<p>Roughly speaking, I’m setting policies like this.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 719px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/0eec95449ec99e0b992f29f6a0026f93/073e9/image-22.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 70.83333333333333%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/0eec95449ec99e0b992f29f6a0026f93/8ac56/image-22.webp 240w,\n/static/0eec95449ec99e0b992f29f6a0026f93/d3be9/image-22.webp 480w,\n/static/0eec95449ec99e0b992f29f6a0026f93/05ca6/image-22.webp 719w\"\n              sizes=\"(max-width: 719px) 100vw, 719px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/0eec95449ec99e0b992f29f6a0026f93/8ff5a/image-22.png 240w,\n/static/0eec95449ec99e0b992f29f6a0026f93/e85cb/image-22.png 480w,\n/static/0eec95449ec99e0b992f29f6a0026f93/073e9/image-22.png 719w\"\n            sizes=\"(max-width: 719px) 100vw, 719px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/0eec95449ec99e0b992f29f6a0026f93/073e9/image-22.png\"\n            alt=\"image-22.png\"\n            title=\"image-22.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>I’ve enabled real-time anti-malware and host-based IDS.</p>\n<p>This host-based IDS can (probably) filter communication between Docker containers within the terminal, so it should prevent various things.</p>\n<p>I’ve also enabled a feature called “Change Monitoring, Security Log Monitoring” to prevent the host machine from being compromised.</p>\n<p>This will generate events when configuration files or important files in the system are tampered with.</p>\n<h3 id=\"dns-name-configuration\" style=\"position:relative;\"><a href=\"#dns-name-configuration\" aria-label=\"dns name configuration permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>DNS Name Configuration</h3>\n<p>To access the virtual machine, configure the DNS name in the public IP settings assigned to the machine.</p>\n<p>By making this setting, it’s possible to always connect with the same FQDN even if the public IP is dynamically assigned.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/e6114111a096ad9a34d95ea92a220506/0b533/image-55-164640097941129.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 77.08333333333333%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/e6114111a096ad9a34d95ea92a220506/8ac56/image-55-164640097941129.webp 240w,\n/static/e6114111a096ad9a34d95ea92a220506/d3be9/image-55-164640097941129.webp 480w,\n/static/e6114111a096ad9a34d95ea92a220506/b0a15/image-55-164640097941129.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/e6114111a096ad9a34d95ea92a220506/8ff5a/image-55-164640097941129.png 240w,\n/static/e6114111a096ad9a34d95ea92a220506/e85cb/image-55-164640097941129.png 480w,\n/static/e6114111a096ad9a34d95ea92a220506/0b533/image-55-164640097941129.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/e6114111a096ad9a34d95ea92a220506/0b533/image-55-164640097941129.png\"\n            alt=\"image-55.png\"\n            title=\"image-55.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>You could also connect with a fixed IP, but it wastes costs and IP access lacks flexibility, so I think it’s good to set a DNS name.</p>\n<h2 id=\"building-azure-sentinel\" style=\"position:relative;\"><a href=\"#building-azure-sentinel\" aria-label=\"building azure sentinel permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Building Azure Sentinel</h2>\n<p>Azure Sentinel is a SIEM service provided by Azure.</p>\n<p>Reference: <a href=\"https://azure.microsoft.com/ja-jp/services/microsoft-sentinel/#overview\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Azure Sentinel - Cloud-Native SIEM Solution | Microsoft Azure</a></p>\n<ul>\n<li>Install Linux agent that collects Common Event Format (CEF) Syslog messages on bastion server</li>\n<li>On the bastion server, allow inbound communication on port 514 from the honeypot machine</li>\n<li>Configure Cloud One Syslog events to forward from honeypot machine to bastion server</li>\n</ul>\n<h3 id=\"install-linux-agent-on-bastion-server\" style=\"position:relative;\"><a href=\"#install-linux-agent-on-bastion-server\" aria-label=\"install linux agent on bastion server permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Install Linux Agent on Bastion Server</h3>\n<p>For linking Cloud One and Azure Sentinel, detailed procedures are written in the “Data Connector” on the Azure Sentinel side as follows.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/2a017365d5cfe2a47c166f12bb75bcc9/0b533/image-23.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 53.75%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/2a017365d5cfe2a47c166f12bb75bcc9/8ac56/image-23.webp 240w,\n/static/2a017365d5cfe2a47c166f12bb75bcc9/d3be9/image-23.webp 480w,\n/static/2a017365d5cfe2a47c166f12bb75bcc9/b0a15/image-23.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/2a017365d5cfe2a47c166f12bb75bcc9/8ff5a/image-23.png 240w,\n/static/2a017365d5cfe2a47c166f12bb75bcc9/e85cb/image-23.png 480w,\n/static/2a017365d5cfe2a47c166f12bb75bcc9/0b533/image-23.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/2a017365d5cfe2a47c166f12bb75bcc9/0b533/image-23.png\"\n            alt=\"image-23.png\"\n            title=\"image-23.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Referring to this, install the Syslog Agent on the bastion server.</p>\n<p>Python is required for installation, so first install the package.</p>\n<div class=\"gatsby-highlight\" data-language=\"bash\"><pre class=\"language-bash\"><code class=\"language-bash\"><span class=\"token function\">sudo</span> <span class=\"token function\">apt</span> <span class=\"token function\">install</span> python -y</code></pre></div>\n<p>Next, run a command like the following displayed in the “Data Connector” to install the Agent.</p>\n<div class=\"gatsby-highlight\" data-language=\"bash\"><pre class=\"language-bash\"><code class=\"language-bash\"><span class=\"token function\">sudo</span> <span class=\"token function\">wget</span> -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py<span class=\"token operator\">&amp;&amp;</span><span class=\"token function\">sudo</span> python cef_installer.py <span class=\"token operator\">&lt;</span>TENANT<span class=\"token operator\">></span> <span class=\"token operator\">&lt;</span>TOKEN<span class=\"token operator\">></span></code></pre></div>\n<h3 id=\"enable-port-514-listening-on-bastion-server\" style=\"position:relative;\"><a href=\"#enable-port-514-listening-on-bastion-server\" aria-label=\"enable port 514 listening on bastion server permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Enable Port 514 Listening on Bastion Server</h3>\n<p>I changed the security group settings to accept traffic to port 514 from the honeypot machine.</p>\n<h3 id=\"configure-cloud-one-syslog-events-to-forward-from-honeypot-machine-to-bastion-server\" style=\"position:relative;\"><a href=\"#configure-cloud-one-syslog-events-to-forward-from-honeypot-machine-to-bastion-server\" aria-label=\"configure cloud one syslog events to forward from honeypot machine to bastion server permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Configure Cloud One Syslog Events to Forward from Honeypot Machine to Bastion Server</h3>\n<p>First, on the Cloud One side, configure to forward detection events to port 514 of the bastion server.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 862px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/1af645f7caefa0b4ba714f1c00ca5f10/f0551/image-25.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.25%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAALCAYAAAB/Ca1DAAAACXBIWXMAAAsTAAALEwEAmpwYAAABc0lEQVQoz52SWW+DMBCE+Z1NFKKIKEmvl6o/uICgEG4wKVemO6aOUJWX1tLIB7vjb9dY76dnvB0esV+v4axWOG5sOA8rHDYbPO12OG23ONmzjrZ9Wy/FnBfHwet+Dys5n0GdoxiB56MuKmRxgjIvMfYDcL3iL8OK4xiXywVlWcIXwzwvZP8F1Sg0dYO+78XzinEc0Uoc53sahgGTxFlJkmhDpRSyNNPrrutuM82MmLTcG03TpKUJwzBEXddSdoIwCBF9RlpVWaFV7U/gTNg0zUwiZ9wv57ZtkabpXDLpeEAimvODudEMJhZFcTNcipRsmeu6sM7yILw5yzJUVaUNTU+XpjRkDHtqyIy4Z7zneTMhN7kEMyHPc017j5Bxpo+/CQnj+z6sIAhQCZWSfvGQj2Rolwk0YslsC9fUkpB/x4crhLq8WiFOSxRCEMjD8KGiKNLlsx0052xawUtN3ymeE4IX6pLZF44oU1Bth14oeiH4z/gGmfI1KPYbqrIAAAAASUVORK5CYII='); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/1af645f7caefa0b4ba714f1c00ca5f10/8ac56/image-25.webp 240w,\n/static/1af645f7caefa0b4ba714f1c00ca5f10/d3be9/image-25.webp 480w,\n/static/1af645f7caefa0b4ba714f1c00ca5f10/e32b8/image-25.webp 862w\"\n              sizes=\"(max-width: 862px) 100vw, 862px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/1af645f7caefa0b4ba714f1c00ca5f10/8ff5a/image-25.png 240w,\n/static/1af645f7caefa0b4ba714f1c00ca5f10/e85cb/image-25.png 480w,\n/static/1af645f7caefa0b4ba714f1c00ca5f10/f0551/image-25.png 862w\"\n            sizes=\"(max-width: 862px) 100vw, 862px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/1af645f7caefa0b4ba714f1c00ca5f10/f0551/image-25.png\"\n            alt=\"image-25.png\"\n            title=\"image-25.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>When I tried detecting Eicar on the honeypot machine, I could confirm the detection event on the Azure Sentinel portal.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 530px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/0bd98c2a6a97378984c1f37340305a7f/b6a9b/image-26.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 131.25%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAaCAYAAAC3g3x9AAAACXBIWXMAAAsTAAALEwEAmpwYAAADCUlEQVRIx5VVy47TQBDMF3LmG/gkxGUvcAMJIXHmsgcQiI04hSWb3SR+JH7Ejh+xPXbR1ck43pCwYKnl8UxPTXd19Xh04+R4djXD8zcPePHeQZYm+DWdYjKZYLlcYjabYbFYYDweY1eWcNMGD0tXxgXKpoMbpojCAKZtkZQNRnFe49Ntgg/fI3z8FsJ1Xdze/sT07g7z+RxTAV+tVthsNqh2O2zLGoUAN3WNXVWj3FU6X8t3JTYCOgAGaFrUmUGaptjEMbbbrVoqEVdVBT5dR9+uH+v34W1t1EqobWfdLj97MN2PbuB8uk8Bhydesn/x6SP8V+f/BnwEPOTpzIHH9C8ADkF773Pzf5nrOWyqnWqJIEUh+hJZ1KbFtqhUDvThu2kaNZ0zBnllsM1yVQP3UA0jogZxgi8/JqKcTmWTJBsU4uzFGYo8U4CdaM1anucKTCH7qzWWIvwgCHSvAnoi3IW7wnyxRLKJcSeiTkTInuNop9zf38shieozDMOnUzamgWlqjUSFLZuZBkFIAVPhO8syXc/zQgHpXx4i5hp9FJCHGUNgo4vcsN1mwk8m7VXpPEE5R0DOK6+SNilI2VFimfB5ADxKgSet12vdeCoX8maf0319yjx96BBKtR3hjpeEBdD2FIuiCL7v62H0tfNDGzHVYSSMMBbyudleEBaYY66RltMoL3YKK8l7kDLglUUAe9uEwT56Al9q10eAbdv1HFKow66gsepcYyH26jBqw/EfEZIfRsKUKQvLVb8mHDN6AvPi9TxXvzmm9YDHooSaMqMYFoRrjuth6bh6U9uIbDuejZBmiY8lQuXORkjZFClMvpHbvThm9VRRCMZ0yKWtbte1elm8u1nj1bWL118l7VxELb8NXhBF3fb2KGWtslSWXOhPRyKsqj2PVWPwdhzi5bWPq88rPATSmlmJMM3VIr6T/HxRhiTzALtW5/LDSgP5mcUIJAulRoxiJ/f+uaKwuuySYUvZwgRhBMfz4fmrw4H+gJYLHKaiNYIyMp4aiVlNco7VH7bdqbB/AxP85jvF4pZ4AAAAAElFTkSuQmCC'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/0bd98c2a6a97378984c1f37340305a7f/8ac56/image-26.webp 240w,\n/static/0bd98c2a6a97378984c1f37340305a7f/d3be9/image-26.webp 480w,\n/static/0bd98c2a6a97378984c1f37340305a7f/c2b64/image-26.webp 530w\"\n              sizes=\"(max-width: 530px) 100vw, 530px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/0bd98c2a6a97378984c1f37340305a7f/8ff5a/image-26.png 240w,\n/static/0bd98c2a6a97378984c1f37340305a7f/e85cb/image-26.png 480w,\n/static/0bd98c2a6a97378984c1f37340305a7f/b6a9b/image-26.png 530w\"\n            sizes=\"(max-width: 530px) 100vw, 530px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/0bd98c2a6a97378984c1f37340305a7f/b6a9b/image-26.png\"\n            alt=\"image-26.png\"\n            title=\"image-26.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>This is all for now, but in the future it would be good to do some analysis on Azure Sentinel.</p>\n<h2 id=\"supplement-expanding-honeypot-machine-disk\" style=\"position:relative;\"><a href=\"#supplement-expanding-honeypot-machine-disk\" aria-label=\"supplement expanding honeypot machine disk permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Supplement: Expanding Honeypot Machine Disk</h2>\n<p>If you need to add a disk to the virtual machine, after setting up the additional disk from the Azure console, you need to configure it the same way as mounting normally in Linux.</p>\n<p>First, check the disk list with `lsblk`.</p>\n<p>``` bash\n$ lsblk\nNAME    MAJ:MIN RM  SIZE RO TYPE MOUNTPOINT\nloop0     7:0    0 61.9M  1 loop /snap/core20/1328\nloop1     7:1    0 43.4M  1 loop /snap/snapd/14549\nloop2     7:2    0 67.2M  1 loop /snap/lxd/21835\nsda       8:0    0  128G  0 disk\nsdb       8:16   0   30G  0 disk\nsdb1    8:17   0 29.9G  0 part /\nsdb14   8:30   0    4M  0 part\nsdb15   8:31   0  106M  0 part /boot/efi\nsdc       8:32   0   16G  0 disk\nsdc1    8:33   0   16G  0 part /mnt\n```</p>\n<p>The disk I added this time is recognized as `sda`, so I’ll mount it.</p>\n<p>Since I added it as an empty new disk this time, I first need to create a partition.</p>\n<p>``` bash\nsudo parted /dev/sda —script mklabel gpt mkpart xfspart xfs 0% 100%\n```</p>\n<p>If you run `lsblk` again, `sda1` has been created, so format the XFS file system with the following command.</p>\n<p>``` bash\nsudo mkfs.xfs /dev/sda1\nsudo partprobe /dev/sda1\n```</p>\n<p>In the case of Debian instead of Ubuntu, you may need to install `xfsprogs` beforehand.</p>\n<p>``` bash\nsudo apt install xfsprogs\n```</p>\n<p>Reference: <a href=\"https://techviewleo.com/fix-mkfs-xfs-no-such-file-or-directory/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Fix “mkfs.xfs: No such file or directory” on CentOS/Ubuntu/Debian - TechViewLeo</a></p>\n<p>Finally, I created a `tpot` directory to install the honeypot and mounted `/dev/sda1`.</p>\n<p>``` bash\nmkdir ~/tpot\nsudo mount /dev/sda1 ~/tpot\n```</p>\n<p>If you run `lsblk` again, you can see that the mount is properly reflected.</p>\n<p>``` bash\n$ lsblk\nNAME    MAJ:MIN RM  SIZE RO TYPE MOUNTPOINT\nloop0     7:0    0 61.9M  1 loop /snap/core20/1328\nloop1     7:1    0 43.4M  1 loop /snap/snapd/14549\nloop2     7:2    0 67.2M  1 loop /snap/lxd/21835\nsda       8:0    0  128G  0 disk\nsda1    8:1    0  128G  0 part /home/azureuser/tpot\nsdb       8:16   0   30G  0 disk\nsdb1    8:17   0 29.9G  0 part /\nsdb14   8:30   0    4M  0 part\nsdb15   8:31   0  106M  0 part /boot/efi\nsdc       8:32   0   16G  0 disk\nsdc1    8:33   0   16G  0 part /mnt\n```</p>\n<p>Reference: <a href=\"https://docs.microsoft.com/ja-jp/azure/virtual-machines/linux/expand-disks\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Expanding Virtual Hard Disks for Linux VMs - Azure Virtual Machines | Microsoft Docs</a></p>\n<h2 id=\"creating-snapshots\" style=\"position:relative;\"><a href=\"#creating-snapshots\" aria-label=\"creating snapshots permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Creating Snapshots</h2>\n<p>Since the preparation is mostly complete, I’ll finally install T-Pot, but before that, I’ll take a snapshot of the disk just in case.</p>\n<p>By taking a snapshot of the Azure disk, you can restore by rebuilding a new machine if there’s a problem.</p>\n<p>Honestly, even snapshots cost monthly fees which I don’t really want to use personally, but I’ll do it for now.</p>\n<p>The link below is easy to understand for detailed instructions.</p>\n<p>Reference: <a href=\"https://jpaztech.github.io/blog/vm/vm-replica-3/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">About VM Cloning Method part.3/3 Procedure to Clone from OS Disk Snapshot | Japan Azure IaaS Core Support Blog</a></p>\n<p>Just turn off the virtual machine and create a snapshot from the disk.</p>\n<p>Once the snapshot is created, finally install T-Pot.</p>\n<h2 id=\"installing-t-pot\" style=\"position:relative;\"><a href=\"#installing-t-pot\" aria-label=\"installing t pot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Installing T-Pot</h2>\n<p>Before installing T-Pot, disable Cloud One’s anti-malware function.</p>\n<p>Then execute the following commands in order.</p>\n<p>``` bash\ncd ~/tpot\ngit clone <a href=\"https://github.com/telekom-security/tpotce\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https://github.com/telekom-security/tpotce</a>\ncd tpotce/iso/installer/\n```</p>\n<p>Here, a file called `tpot.conf.dist` has the following settings written:</p>\n<p>``` bash</p>\n<h1 id=\"tpot-configuration-file\" style=\"position:relative;\"><a href=\"#tpot-configuration-file\" aria-label=\"tpot configuration file permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>tpot configuration file</h1>\n<h1 id=\"myconftpotflavorstandard-sensor-industrial-collector-nextgen-medical\" style=\"position:relative;\"><a href=\"#myconftpotflavorstandard-sensor-industrial-collector-nextgen-medical\" aria-label=\"myconftpotflavorstandard sensor industrial collector nextgen medical permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>myCONF<em>TPOT</em>FLAVOR=[STANDARD, SENSOR, INDUSTRIAL, COLLECTOR, NEXTGEN, MEDICAL]</h1>\n<p>myCONF<em>TPOT</em>FLAVOR=‘STANDARD’\nmyCONF<em>WEB</em>USER=‘webuser’\nmyCONF<em>WEB</em>PW=‘w3b$ecret’\n```</p>\n<p>By default, the T-Pot type is `STANDARD`.</p>\n<p>Next, after changing the username and password arbitrarily, execute the following command.</p>\n<p>``` bash\ncp tpot.conf.dist tpot.conf\nsudo ./install.sh —type=auto —conf=tpot.conf\n```</p>\n<p>If this completes without problems, you’ll get output like the following.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 586px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/3fd95a38ed4642336665649abe7a5a59/a76f4/image-28-164640098996331.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 93.33333333333333%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/3fd95a38ed4642336665649abe7a5a59/8ac56/image-28-164640098996331.webp 240w,\n/static/3fd95a38ed4642336665649abe7a5a59/d3be9/image-28-164640098996331.webp 480w,\n/static/3fd95a38ed4642336665649abe7a5a59/7fed0/image-28-164640098996331.webp 586w\"\n              sizes=\"(max-width: 586px) 100vw, 586px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/3fd95a38ed4642336665649abe7a5a59/8ff5a/image-28-164640098996331.png 240w,\n/static/3fd95a38ed4642336665649abe7a5a59/e85cb/image-28-164640098996331.png 480w,\n/static/3fd95a38ed4642336665649abe7a5a59/a76f4/image-28-164640098996331.png 586w\"\n            sizes=\"(max-width: 586px) 100vw, 586px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/3fd95a38ed4642336665649abe7a5a59/a76f4/image-28-164640098996331.png\"\n            alt=\"image-28.png\"\n            title=\"image-28.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>This completes the T-Pot installation.</p>\n<p>When T-Pot installation is complete, SSH on port 22 is disabled.</p>\n<p>With default settings, the SSH connection port becomes 64295, so confirm that you can SSH connect.</p>\n<p>``` bash\nssh -i .ssh/id_rsa -p 64295 <T-Pot>\n```</p>\n<p>By the way, the ports for each T-Pot service are set to the following by default:</p>\n<ul>\n<li>SSH: 64295</li>\n<li>WEB console: 64297</li>\n<li>ADMIN site: 64294</li>\n</ul>\n<p>Configure these ports in the security group so they are only accessible from the bastion server and not from the internet side.</p>\n<h3 id=\"adding-docker-user\" style=\"position:relative;\"><a href=\"#adding-docker-user\" aria-label=\"adding docker user permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Adding Docker User</h3>\n<p>When T-Pot installation is complete, Docker is installed on the machine.</p>\n<p>However, immediately after installation, regular users cannot access the Docker service.</p>\n<p>To enable monitoring of Docker services from the Pilot console logged in as a regular user in the future, add the user to the Docker group with the following command.</p>\n<p>``` bash\nsudo usermod -aG docker $USER\n```</p>\n<p>By enabling regular users to use Docker services, you can monitor Docker containers from the Pilot console as follows.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/1132a19df371b0c9c5f364cb064ddd1e/0b533/image-56-164640099393233.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 50.83333333333333%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/1132a19df371b0c9c5f364cb064ddd1e/8ac56/image-56-164640099393233.webp 240w,\n/static/1132a19df371b0c9c5f364cb064ddd1e/d3be9/image-56-164640099393233.webp 480w,\n/static/1132a19df371b0c9c5f364cb064ddd1e/b0a15/image-56-164640099393233.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/1132a19df371b0c9c5f364cb064ddd1e/8ff5a/image-56-164640099393233.png 240w,\n/static/1132a19df371b0c9c5f364cb064ddd1e/e85cb/image-56-164640099393233.png 480w,\n/static/1132a19df371b0c9c5f364cb064ddd1e/0b533/image-56-164640099393233.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/1132a19df371b0c9c5f364cb064ddd1e/0b533/image-56-164640099393233.png\"\n            alt=\"image-56.png\"\n            title=\"image-56.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<h3 id=\"connecting-to-t-pot-via-bastion-using-ssh-dynamic-forwarding\" style=\"position:relative;\"><a href=\"#connecting-to-t-pot-via-bastion-using-ssh-dynamic-forwarding\" aria-label=\"connecting to t pot via bastion using ssh dynamic forwarding permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Connecting to T-Pot via Bastion Using SSH Dynamic Forwarding</h3>\n<p>Next, connect to T-Pot’s web console via the bastion server.</p>\n<p>First, on the host machine side, make an SSH connection to the bastion server as follows.</p>\n<p>``` bash\nssh -fN -D <Forwarding Port> -i .ssh/honeypot.pem &#x3C;Username@IP Addr>\n```</p>\n<p>Now you can connect to the bastion server via `<Forwarding Port>` on the host machine.</p>\n<p>Next, set the browser’s `SOCKS v5` proxy settings to localhost and the forwarding port you set.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/fec6a1243e2d96b99bcf05bf3f5161bc/0b533/image-31-164640099658235.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 59.166666666666664%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/fec6a1243e2d96b99bcf05bf3f5161bc/8ac56/image-31-164640099658235.webp 240w,\n/static/fec6a1243e2d96b99bcf05bf3f5161bc/d3be9/image-31-164640099658235.webp 480w,\n/static/fec6a1243e2d96b99bcf05bf3f5161bc/b0a15/image-31-164640099658235.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/fec6a1243e2d96b99bcf05bf3f5161bc/8ff5a/image-31-164640099658235.png 240w,\n/static/fec6a1243e2d96b99bcf05bf3f5161bc/e85cb/image-31-164640099658235.png 480w,\n/static/fec6a1243e2d96b99bcf05bf3f5161bc/0b533/image-31-164640099658235.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/fec6a1243e2d96b99bcf05bf3f5161bc/0b533/image-31-164640099658235.png\"\n            alt=\"image-31.png\"\n            title=\"image-31.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Now you can connect to the T-Pot machine’s local IP address via the bastion server.</p>\n<p>You can actually open the console by connecting to `https://<T-Pot local IP address>:64297` in your browser.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/649eec9e8fe1936c330106e802345168/0b533/image-32-164640099891937.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 76.25%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/649eec9e8fe1936c330106e802345168/8ac56/image-32-164640099891937.webp 240w,\n/static/649eec9e8fe1936c330106e802345168/d3be9/image-32-164640099891937.webp 480w,\n/static/649eec9e8fe1936c330106e802345168/b0a15/image-32-164640099891937.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/649eec9e8fe1936c330106e802345168/8ff5a/image-32-164640099891937.png 240w,\n/static/649eec9e8fe1936c330106e802345168/e85cb/image-32-164640099891937.png 480w,\n/static/649eec9e8fe1936c330106e802345168/0b533/image-32-164640099891937.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/649eec9e8fe1936c330106e802345168/0b533/image-32-164640099891937.png\"\n            alt=\"image-32.png\"\n            title=\"image-32.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>The T-Pot console looks cool!!</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/f0ab2d6a94b5abd4c24262218ad0c256/0b533/image-33-164640100164239.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 75.83333333333333%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/f0ab2d6a94b5abd4c24262218ad0c256/8ac56/image-33-164640100164239.webp 240w,\n/static/f0ab2d6a94b5abd4c24262218ad0c256/d3be9/image-33-164640100164239.webp 480w,\n/static/f0ab2d6a94b5abd4c24262218ad0c256/b0a15/image-33-164640100164239.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/f0ab2d6a94b5abd4c24262218ad0c256/8ff5a/image-33-164640100164239.png 240w,\n/static/f0ab2d6a94b5abd4c24262218ad0c256/e85cb/image-33-164640100164239.png 480w,\n/static/f0ab2d6a94b5abd4c24262218ad0c256/0b533/image-33-164640100164239.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/f0ab2d6a94b5abd4c24262218ad0c256/0b533/image-33-164640100164239.png\"\n            alt=\"image-33.png\"\n            title=\"image-33.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<h2 id=\"summary\" style=\"position:relative;\"><a href=\"#summary\" aria-label=\"summary permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Summary</h2>\n<p>What I did this time is as follows:</p>\n<ul>\n<li>Built T-Pot and bastion server on Azure</li>\n<li>Installed Cloud One Workload Security Agent on T-Pot machine and linked SIEM with Sentinel</li>\n<li>Connected to T-Pot console via bastion server SSH forwarding (later changed configuration to connect directly from on-premise virtual machine)</li>\n<li>Confirmed T-Pot console login</li>\n</ul>\n<p>I haven’t yet opened the inbound ports of the T-Pot machine’s security group, so it’s not actually operational yet.</p>\n<p>I’ll decide from now on which honeypots included in T-Pot to use and what kind of analysis to do with Azure Sentinel.</p>\n<h2 id=\"reference-books\" style=\"position:relative;\"><a href=\"#reference-books\" aria-label=\"reference books permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reference Books</h2>\n<ul>\n<li><a href=\"https://amzn.to/34tqh58\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Analyzing the Footprints of Cyber Attacks: Honeypot Observation Records</a></li>\n<li><a href=\"https://amzn.to/34tPAnt\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">How to Play with WOWHoneypot: Observing Cyber Attacks with “Hospitality” Features!</a></li>\n</ul>","fields":{"slug":"/honeypot-setup-on-azure-en","tagSlugs":["/tag/security-en/","/tag/honey-pot-en/","/tag/azure-en/","/tag/備忘録/","/tag/english/"]},"frontmatter":{"date":"2022-02-11","description":"","tags":["Security (en)","HoneyPot (en)","Azure (en)","備忘録","English"],"title":"A Novice Honeypotter Wants to Play Safely with T-Pot [Azure/Honeypot]","socialImage":{"publicURL":"/static/468e7a49d62ff965c34f93a43fc98e2c/honeypot-setup-on-azure.png"}}}},"pageContext":{"slug":"/honeypot-setup-on-azure-en"}},"staticQueryHashes":["251939775","401334301","825871152"]}