3.8 KiB
title, description, keywords, search.product, search.appverid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic, ms.date
title | description | keywords | search.product | search.appverid | ms.prod | ms.mktglfcycl | ms.sitesec | ms.pagetype | ms.author | author | ms.localizationpriority | manager | audience | ms.collection | ms.topic | ms.date |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Experience Microsoft Defender ATP through simulated attacks | Run the provided attack scenario simulations to experience how Microsoft Defender ATP can detect, investigate, and respond to breaches. | wdatp, test, scenario, attack, simulation, simulated, diy, windows defender advanced threat protection | eADQiWindows 10XVcnh | met150 | w10 | deploy | library | security | lomayor | lomayor | medium | dansimp | ITPro | M365-security-compliance | article | 11/20/2018 |
Experience Microsoft Defender ATP through simulated attacks
Applies to:
Want to experience Microsoft Defender ATP? Sign up for a free trial.
Tip
- Learn about the latest enhancements in Microsoft Defender ATP: What's new in Microsoft Defender ATP.
- Microsoft Defender ATP demonstrated industry-leading optics and detection capabilities in the recent MITRE evaluation. Read: Insights from the MITRE ATT&CK-based evaluation.
You might want to experience Microsoft Defender ATP before you onboard more than a few machines to the service. To do this, you can run controlled attack simulations on a few test machines. After running the simulated attacks, you can review how Microsoft Defender ATP surfaces malicious activity and explore how it enables an efficient response.
Before you begin
To run any of the provided simulations, you need at least one onboarded machine.
Read the walkthrough document provided with each attack scenario. Each document includes OS and application requirements as well as detailed instructions that are specific to an attack scenario.
Run a simulation
-
In Help > Simulations & tutorials, select which of the available attack scenarios you would like to simulate:
-
Scenario 1: Document drops backdoor - simulates delivery of a socially engineered lure document. The document launches a specially crafted backdoor that gives attackers control.
-
Scenario 2: PowerShell script in fileless attack - simulates a fileless attack that relies on PowerShell, showcasing attack surface reduction and machine learning detection of malicious memory activity.
-
Scenario 3: Automated incident response - triggers Automated investigation, which automatically hunts for and remediates breach artifacts to scale your incident response capacity.
-
-
Download and read the corresponding walkthrough document provided with your selected scenario.
-
Download the simulation file or copy the simulation script by navigating to Help > Simulations & tutorials. You can choose to download the file or script on the test machine but it's not mandatory.
-
Run the simulation file or script on the test machine as instructed in the walkthrough document.
Note
Simulation files or scripts mimic attack activity but are actually benign and will not harm or compromise the test machine.
Want to experience Microsoft Defender ATP? Sign up for a free trial.