Skip to main content

🚀 Demo Scenarios Overview

This document outlines the current status and progress of our SOC and Non-SOC demo scenarios. Each demo corresponds to a specific threat type or a set of security controls area relevant to our solution offerings.

Definitions & Prerequisites​

  1. Victim account: john.doe@legionsecurityai.onmicrosoft.com (you do not need to login to this account, ever). Phishing emails are sent to this account, malware are automatically run on a weekly basis on this account's Win11 device. These trigger the required incident and alerts across all our lab security control and ticketing suite, enabling us to run demos on live, up-to-date data.
  2. Demo analyst account: demoanalyst@legionsecurityai.onmicrosoft.com. You must be logged in to this Microsoft account in order to run demos. You can login to portal.azure.com — it will be enough to have a live session cookie for all other systems. Credentials can be found in 1Password under the name "Demo analyst", along with its 2FA saved there. It will be most effective to create an Edge profile and login as a work profile with demoanalyst@legionsecurityai.onmicrosoft.com.
  3. Install 1Password browser extension Link
  4. Install Legion browser extension Link
  5. Login to Crowdstrike using "Demo Analyst Crowdstrike" credentials in 1Password (not SSO — requires a separate login).

Use CaseDemo IDTrigger From HereWorkflow
Account Takeover1.1Link — choose latest Jira ticket starting with Unfamiliar sign-in (Sentinel)Anomalous Sign-in (Jira, Sentinel)
Account Takeover1.2Link — choose latest Jira ticket starting with Unfamiliar sign-in (Defender)Anomalous Sign-in (Splunk, Defender)
Account Takeover1.3ServiceNow Ticket You must login to Servicenow ven08053Anomalous Sign-in (ServiceNow, Splunk, Defender) OR Unfamiliar Sign-In (ServiceNow, Splunk, Defender, Suggessions)
Account Takeover1.4TheHive V5 - DEMO — choose latest case with Unfamiliar Sign-In (Defender, Splunk)Unfamiliar Sign-In (Hive, Splunk, Defender)
Account Takeover1.5Link — choose latest Jira ticket starting with Unfamiliar sign-in (Defender)Unfamiliar Sign-in (Risky User)
Malware2.1Link — choose latest Jira ticket named Malware detected - Defender IncidentMalware (Jira, Defender)
Malware2.2Link, if Crowdstrike detection epxired, login here and choose latest detection, copy its URL to the Jira CS-88 ticketMalware (Jira, Crowdstrike, SilentPush)
Malware2.3LinkMalware - ServiceNow Deep Search
Phishing3.1Link — choose latest Jira ticket starting with Phishing Incident (Defender)Phishing (Jira, Defender) or
Phishing (Defender, SilentPush) or
Phishing (Jira, Defender, Suggestions)
Phishing3.2LinkPhishing (Jira, Sentinel)
Phishing3.3LinkPhishing (Jira, Proofpoint Essentials)
Phishing3.4Link — choose latest Jira ticket starting with Phishing Incident (Defender)Re-Investigate Phishing (Jira, Defender, JoeSandbox)
Non-SOC - Access Requests4LinkNon-SOC AWS Access Review via Jira
DLP5.1Link — choose latest Jira ticket starting with Defender DLP IncidentDLP (Jira, Defeder Incident)
DLP5.2Link — choose latest Jira ticket starting with Defender DLP AlertDLP (Jira, Defender Alert, Purview)
Vulnerability Management6Analyst input of CVEVulnerability Management (CVE Search)
Lead investigator7.1Link — choose latest Jira ticket starting with Phishing Incident (Defender)Phishing (Lead investigator)
Lead investogator7.2Link — choose latest Jira ticket starting with Defender DLP IncidentDLP (Lead investigator)
Insider Risk Threat (IRM)8.1Link — choose latest Jira ticket named IRM - Purview AlertInsider Risk Threat (Purview Alert)
Insider Risk Threat (IRM)8.2LinkPre-Hire Background Check - Persona Package

📌 Notes​

  • All demos are part of our internal efforts to showcase Legion's principles.
  • Each demo is tied to a broader use case in threat detection, response, or prevention.
  • The Tools Used column lists only the integrations involved. Full scenario context is captured in the linked Jira tickets.
  • Demo 5.3 scenario: user sent an email to an external address containing a file with sensitive credentials. The investigation reveals the recipient identity, number of emails sent, and assesses business impact of the exfiltrated data.