Joey Caparas 8190057cf3 updates
2019-10-10 15:05:10 -07:00

11 KiB
Raw Blame History

title, description, keywords, search.product, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic
title description keywords search.product ms.prod ms.mktglfcycl ms.sitesec ms.pagetype ms.author author ms.localizationpriority manager audience ms.collection ms.topic
Microsoft Defender ATP evaluation lab Learn about Microsoft Defender ATP capabilities, run attack simulations, and see how it prevents, detects, and remediates threats. evaluate mdatp, evaluation, lab, simulation, windows 10, windows server 2019, evaluation lab eADQiWindows 10XVcnh w10 deploy library security macapara mjcaparas medium dansimp ITPro M365-security-compliance article

Microsoft Defender ATP evaluation lab

Applies to:

Conducting a comprehensive security product evaluation can be a complex process requiring cumbersome environment and machine configuration before an end-to-end attack simulation can actually be done. Adding to the complexity is the challenge of tracking where the simulation activities, alerts, and results are reflected during the evaluation.

The Microsoft Defender ATP evaluation lab is designed to eliminate the complexities of machine and environment configuration so that you can focus on evaluating the capabilities of the platform, running simulations, and seeing the prevention, detection, and remediation features in action.

When you get started with the lab, you'll be guided through a simple set-up process where you can specify the type of configuration that best suits your needs.

After the lab setup process is complete, you can add Windows 10 or Windows Server 2019 machines. These test machines come pre-configured to have the latest and greatest OS versions with the right security components in place and Office 2019 Standard installed.

With the simplified set-up experience, you can focus on running your own test scenarios and the pre-made simulations to see how Microsoft Defender ATP performs.

You'll have full access to all the powerful capabilities of the platform such as automated investigations, advanced hunting, and threat analytics, allowing you to test the comprehensive protection stack that Microsoft Defender ATP offers.

Before you begin

You'll need to fulfill the licensing requirements or have trial access to Microsoft Defender ATP to access the evaluation lab.

Want to experience Microsoft Defender ATP? Sign up for a free trial.

Get started with the lab

You can access the lab from the menu. In the navigation menu, select Evaluation and tutorials > Evaluation lab.

Image of the evaluation lab on the menu

When you access the evaluation lab for the first time, you'll find an introduction page with a link to the evaluation guide. The guide contains tips and recommendations to keep in mind when evaluating an advanced threat protection product.

It's a good idea to read the guide before starting the evaluation process so that you can conduct a thorough assessment of the platform.

Note

  • Each environment is provisioned with a limited set of test machines.
  • Depending the type of environment structure you select, machines will be available for the specified number of hours from the day of activation.
  • When you've used up the provisioned machines, no new machines are provided. A deleted machine does not refresh the available test machine count.
  • Given the limited resources, its advisable to use the machines carefully.

Setup the evaluation lab

  1. In the navigation pane, select Evaluation and tutorials > Evaluation lab, then select Setup lab.

    Image of the evaluation lab welcome page

  2. Depending on your evaluation needs, you can choose to setup an environment with fewer machines for a longer period or more machines for a shorter period. Select your preferred lab configuration then select Create lab.

    Image of lab configuration options

When the environment completes the setup process, you're ready to add machines.

Add machines

When you add a machine to your environment, Microsoft Defender ATP sets up a well-configured machine with connection details. You can add Windows 10 or Windows Server 2019 machines.

The machine will be configured with the most up-to-date version of the OS and Office 2019 Standard as well as other apps such as Java, Python, and SysIntenals.

The machine will automatically be onboarded to your tenant with the recommended Windows security components turned on and in audit mode - with no effort on your side.

The following security components are pre-configured in the test machines:

Note

Windows Defender Antivirus will be on (not in audit). If Windows Defender Antivirus blocks you from running your simulation, you may turn off real-time protection on the machine through Windows Security. For more information, see Configure always-on protection.

Automated investigation settings will be dependent on tenant settings. It will be configured to be semi-automated by default. For more information, see Overview of Automated investigations.

Note

The connection to the test machines is done using RDP. Make sure that your firewall settings allow RDP connections.

  1. From the dashboard, select Add machine.

    Image of lab setup page

  2. Choose the type of machine to add. You can choose to add Windows 10 or Windows Server 2019.

    Image of lab setup with machine options

    Note

    If something goes wrong with the machine creation process, you'll be notified and you'll need to submit a new request. If the machine creation fails, it will not be counted against the overall allowed quota.

  3. The connection details are displayed. Select Copy to save the password for the machine.

    Note

    The password is only displayed once. Be sure to save it for later use.

    Image of machine added with connection details

  4. Machine set up begins. This can take up to approximately 30 minutes.

The environment will reflect your test machine status through the evaluation - including risk score, exposure score, and alerts created through the simulation.

Image of test machines

Simulate attack scenarios

Use the test machines to run attack simulations by connecting to them.

If you are looking for a pre-made simulation, you can use our "Do It Yourself" attack scenarios. These scripts are safe, documented, and easy to use. These scenarios will reflect Microsoft Defender ATP capabilities and walk you through investigation experience.

You can also use Advanced hunting to query data and Threat analytics to view reports about emerging threats.

Note

The connection to the test machines is done using RDP. Make sure that your firewall settings allow RDP connections.

  1. Connect to your machine and run an attack simulation by selecting Connect.

    Image of the connect button for test machines

  2. Save the RDP file and launch it by selecting Connect.

    Image of remote desktop connection

    Note

    If you don't have a copy of the password saved during the initial setup, you can reset the password by selecting Reset password from the menu: Image of reset password
    The machine will change its state to “Executing password reset", then youll be presented with your new password in a few minutes.

  3. Enter the password that was displayed during the machine creation step.

    Image of window to enter credentials

  4. Run simulations on the machine.

After running your simulations, we encourage you to walk through the lab progress bar and explore Microsoft Defender ATP features. See if your attacks triggered an automated investigation and remediation, check out the evidence collected and analyzed by the feature.

Hunt for attack evidence through Advanced hunting by using the rich query language and raw telemetry and check out some world-wide threats documented in Threat analytics.

Simulation results

Get a full overview of the simulation results, all in one place, allowing you to drill down to the relevant pages with every detail you need.

View the machine details page by selecting the machine from the table. You'll be able to drill down on relevant alerts and investigations by exploring the rich context provided on the attack simulation.

Evaluation report

The lab reports summarize the results of the simulations conducted on the machines.

Image of the evaluation report

At a glance, you'll quickly be able to see:

  • Incidents that were triggered
  • Generated alerts
  • Assessments on exposure level
  • Threat categories observed
  • Detection sources
  • Automated investigations

Provide feedback

Your feedback helps us get better in protecting your environment from advanced attacks. Share your experience and impressions from product capabilities and evaluation results.

Let us know what you think, by selecting Provide feedback.

Image of provide feedback