Skip to content

Latest commit

 

History

History

Simulations

Microsoft Defender for Cloud Simulation Playbook

There are many ways to simulate an alert in Microsoft Defender for Cloud and if you just want a simple validation to get an alert, use the procedures described in this article. For a more scenario-based approach, you have the resources below that you can use to validate different threat detections capabilities available in Microsoft Defender for Cloud.

Alert Simulation for Defender for Servers (Azure and Non-Azure VMs - Windows)

If you are testing the integration with MDE, use this article to validate the alert integration. Make sure that the server that you are testing this procedure is already onboarded and using MDATP.

Alert Simulation for Defender for Servers (Azure and Non-Azure VMs - Linux)

Alert Simulation for Defender for Containers

Alert Simulation for Defender for Storage

  • This article go over the steps to simulate an upload of a test malware (EICAR) to an Azure Storage account that has Defender for Storage enabled.

  • Defender Storage

Alert Simulation for Defender for Key Vault

Alert Simulation for Defender for Resource Manager

Alert Simulation for Defender for DNS

Alert Simulation for Defender for App Service

Alert Simulation for Defender for SQL on Machines

Alert Simulation for Defender for APIs

Threat Hunting in Microsoft Defender for Cloud and Log Analytics Workspace

  • This simulation playbook go over a threat hunting scenario using Microsoft Defender for Cloud and searching for evidences of attack in Log Analtyics workspace.

  • Download this PDF and follow the steps to configure a lab environment, simulate alerts in Windows and query data using KQL in Log Analytics workspace.