0
(0)

This article will guide you in the process of running a pilot for Microsoft Defender for Endpoint.

Use the following steps to setup and configure the pilot for Microsoft Defender for Endpoint.

Steps for adding Microsoft Defender for Identity to the Defender evaluation environment.

  • Step 1. Verify pilot group
  • Step 2. Try out capabilities

When you pilot Microsoft Defender for Endpoint, you may choose to onboard a few devices to the service before onboarding your entire organization.

You can then try out capabilities that are available such as running attack simulations and seeing how Defender for Endpoint surfaces malicious activities and enables you to conduct an efficient response.

Step 1. Verify pilot group

After completing the onboarding steps outlined in the Enable evaluation section, you should see the devices in the Device inventory list approximately after an hour.

When you see your onboarded devices you can then proceed with trying out capabilities.

Step 2. Try out capabilities

Now that you’ve completed onboarding some devices and verified that they are reporting to the service, familiarize yourself with the product by trying out the powerful capabilities that are available right out of the box.

During the pilot, you can easily get started with trying out some of the features to see the product in action without going through complex configuration steps.

Let’s start by checking out the dashboards.

View the device inventory

The device inventory is where you’ll see the list of endpoints, network devices, and IoT devices in your network. Not only does it provide you with a view of the devices in your network, but it also gives your in-depth information about them such as domain, risk level, OS platform, and other details for easy identification of devices most at risk.

View the Threat and vulnerability management dashboard

Threat and vulnerability management helps you focus on the weaknesses that pose the most urgent and the highest risk to the organization. From the dashboard, get a high-level view of the organization exposure score, Microsoft Secure Score for Devices, device exposure distribution, top security recommendations, top vulnerable software, top remediation activities, and top exposed device data.

Run a simulation

Microsoft Defender for Endpoint comes with “Do It Yourself” attack scenarios that you can run on your pilot devices. Each document includes OS and application requirements as well as detailed instructions that are specific to an attack scenario. These scripts are safe, documented, and easy to use. These scenarios will reflect Defender for Endpoint capabilities and walk you through investigation experience.

To run any of the provided simulations, you need at least one onboarded device.

  1. In Help > Simulations & tutorials, select which of the available attack scenarios you would like to simulate:
    • Scenario 1: Document drops backdoor – simulates delivery of a socially engineered lure document. The document launches a specially crafted backdoor that gives attackers control.
    • Scenario 2: PowerShell script in fileless attack – simulates a fileless attack that relies on PowerShell, showcasing attack surface reduction and device learning detection of malicious memory activity.
    • Scenario 3: Automated incident response – triggers automated investigation, which automatically hunts for and remediates breach artifacts to scale your incident response capacity.
  2. Download and read the corresponding walkthrough document provided with your selected scenario.
  3. Download the simulation file or copy the simulation script by navigating to Help > Simulations & tutorials. You can choose to download the file or script on the test device but it’s not mandatory.
  4. Run the simulation file or script on the test device as instructed in the walkthrough document.

 Note

Simulation files or scripts mimic attack activity but are actually benign and will not harm or compromise the test device.

Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 10 times, 1 visits today)