%3CLINGO-SUB%20id%3D%22lingo-sub-166935%22%20slang%3D%22en-US%22%3ETesting%20Azure%20Security%20Center%20Detections%20Capabilities%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-166935%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20goal%20of%20this%20document%20is%20to%20provide%20validation%20steps%20to%20simulate%20attacks%20in%20VMs%2FComputers%20monitored%20by%20Azure%20Security%20Center%20(%E2%80%9CSecurity%20Center%E2%80%9D).%20You%20should%20use%20the%20steps%20described%20in%20this%20document%20in%20a%20lab%20environment%2C%20with%20the%20purpose%20to%20better%20understand%20the%20detection%20capabilities%20available%20in%20Security%20Center.%20More%20info%20here%3A%20%3CA%20href%3D%22https%3A%2F%2Fgallery.technet.microsoft.com%2FAzure-Security-Center-f621a046%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgallery.technet.microsoft.com%2FAzure-Security-Center-f621a046%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-166935%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESecurity%20Center%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

The goal of this document is to provide validation steps to simulate attacks in VMs/Computers monitored by Azure Security Center (“Security Center”). You should use the steps described in this document in a lab environment, with the purpose to better understand the detection capabilities available in Security Center. More info here: https://gallery.technet.microsoft.com/Azure-Security-Center-f621a046