The goal of this document is to provide validation steps to simulate attacks in VMs/Computers monitored by Azure Security Center (“Security Center”). You should use the steps described in this document in a lab environment, with the purpose to better understand the detection capabilities available in Security Center. More info here: https://gallery.technet.microsoft.com/Azure-Security-Center-f621a046