0
(0)

The purpose of the Microsoft Defender for Identity Security Alert lab tutorial is to illustrate Defender for Identity‘s capabilities in identifying and detecting suspicious activities and potential attacks against your network. This four part tutorial explains how to install and configure a working environment to test against some of Defender for Identity’s discrete detections. This lab focuses on Defender for Identity’s signature-based capabilities. The lab doesn’t include advanced machine-learning and user or entity-based behavioral detections since those detections require a learning period with real network traffic of up to 30 days.

Lab setup

The first tutorial in this four part series walks you through creating a lab for testing Defender for Identity’s discrete detections. The tutorial includes information about machines, users, and tools that are needed to set up the lab and complete its playbooks. The instructions assume you’re comfortable setting up a domain controller and workstations for lab use along with other administrative tasks. The closer your lab is to the suggested lab setup, the easier it will be to follow Defender for Identity testing procedures. When your lab setup is complete, use the Defender for Identity Security Alert playbooks for testing.

Reconnaissance playbook

The second tutorial in this four part series is a reconnaissance playbook. Reconnaissance activities allow attackers to gain a thorough understanding and complete mapping of your environment for later use. The playbook shows some of Defender for Identity’s capabilities in identifying and detecting suspicious activities from potential attacks using examples from common, publicly available hacking and attack tools.

Lateral movement playbook

The lateral movement playbook is third in the four part tutorial series. Lateral movements are made by an attacker attempting to gain domain dominance. As you run this playbook, you’ll see lateral movement path threat detections and security alerts services of Defender for Identity from the simulated lateral movements you make in your lab.

Domain dominance playbook

The last tutorial in the four part series is the domain dominance playbook. During the domain dominance phase, an attacker has already gained legitimate credentials to access your domain controller and attempts to achieve persistent domain dominance. You’ll simulate some common domain dominance methods to see the domain dominance focused threat detection and security alert services of Defender for Identity.

Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 29 times, 1 visits today)