Evaluation Lab: Expanded OS support & Atomic Red Team simulations

Published Nov 22 2021 09:30 AM 4,086 Views
Microsoft

Microsoft Defender for Endpoint’s Evaluation Lab is an environment that allows security teams to seamlessly test their defense against threats. We are excited to share that the Evaluation Lab now supports adding Windows 11, Windows Server 2016, and Linux devices. In addition, we’d also like to announce a new partnership with Red Canary’s open-source simulation library, Atomic Red Team! 

 

NOTE: Both updates are only available in the Microsoft 365 Defender portal at security.microsoft.com.

 

Expanded OS support

The evaluation lab now supports the following operating systems: Windows 10, Windows 11, Windows Server 2019, Windows Server 2016 and Linux (Ubuntu). To create a new device, simply select it within the “Add device” wizard. The new device will automatically be onboarded with no required additional steps.

 

Yaniv_Carmel_2-1637601415372.png

 

Once created, you can connect to the device via RDP (Windows) or SSH (Linux). You can connect to a Linux device using any SSH client.

 

Yaniv_Carmel_3-1637601415380.png

 

Atomic Red Team simulations

Powered by Red Canary, Atomic Red Team is an open-source library of tests that security teams can use to simulate adversarial activity in their environments. Atomic tests are simple – each test is mapped to a single MITRE ATT&CK® technique or sub-technique, most of them have no prerequisites, and many come with easy-to-use configuration and cleanup commands.

Evaluation Lab users can now use Atomic Red Team simulations to evaluate Microsoft Defender for Endpoint’s detection capabilities against both Windows and Linux threats. The simulations are provided as script files, so that security teams can choose to run them in the Evaluation lab or any other testing environment of their choice.

 

Yaniv_Carmel_4-1637601557153.png

 

The first simulation, 2021 Threat Detection Report, executes tests according to Red Canary’s latest report of top Windows techniques associated with confirmed threats, as compiled from roughly 20,000 confirmed threats detected across customer environments.

 

The second simulation, Linux techniques, is a collection of simple tests compiled to allow security teams to evaluate Microsoft Defender for Endpoint’s detection capabilities against common Linux persistence, discovery, and defense evasion techniques.

 

We’re looking forward to you trying out the Evaluation Lab updates. Let us know your thoughts and feedback in the comments below or through the feedback tool in the portal!

%3CLINGO-SUB%20id%3D%22lingo-sub-2993927%22%20slang%3D%22en-US%22%3EEvaluation%20Lab%3A%20Expanded%20OS%20support%20%26amp%3B%20Atomic%20Red%20Team%20simulations%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2993927%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20Defender%20for%20Endpoint%E2%80%99s%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Fevaluation-lab%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EEvaluation%20Lab%3C%2FA%3E%20is%20an%20environment%20that%20allows%20security%20teams%20to%20seamlessly%20test%20their%20defense%20against%20threats.%20We%20are%20excited%20to%20share%20that%20the%20Evaluation%20Lab%20now%20supports%20adding%20Windows%2011%2C%20Windows%20Server%202016%2C%20and%20Linux%20devices.%20In%20addition%2C%20we%E2%80%99d%20also%20like%20to%20announce%20a%20new%20partnership%20with%20Red%20Canary%E2%80%99s%20open-source%20simulation%20library%2C%20Atomic%20Red%20Team!%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ENOTE%3A%20Both%20updates%20are%20only%20available%20in%20the%20Microsoft%20365%20Defender%20portal%20at%20%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fsecurity.microsoft.com%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSTRONG%3Esecurity.microsoft.com%3C%2FSTRONG%3E%3C%2FA%3E%3CSTRONG%3E.%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--2088471074%22%20id%3D%22toc-hId--2088471018%22%3E%3CSPAN%3EExpanded%3C%2FSPAN%3E%3CSPAN%3E%20OS%20support%3C%2FSPAN%3E%3C%2FH3%3E%0A%3CP%3EThe%20evaluation%20lab%20now%20supports%20the%20following%20operating%20systems%3A%20Windows%2010%2C%20Windows%2011%2C%20Windows%20Server%202019%2C%20Windows%20Server%202016%20and%20Linux%20(Ubuntu).%20To%20create%20a%20new%20device%2C%20simply%20select%20it%20within%20the%20%E2%80%9CAdd%20device%E2%80%9D%20wizard.%20The%20new%20device%20will%20automatically%20be%20onboarded%20with%20no%20required%20additional%20steps.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Yaniv_Carmel_2-1637601415372.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F328644i1FB1061F4BEFA2FE%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Yaniv_Carmel_2-1637601415372.png%22%20alt%3D%22Yaniv_Carmel_2-1637601415372.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20created%2C%20you%20can%20connect%20to%20the%20device%20via%20RDP%20(Windows)%20or%20SSH%20(Linux).%20You%20can%20connect%20to%20a%20Linux%20device%20using%20any%20SSH%20client.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Yaniv_Carmel_3-1637601415380.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F328645i529F26233BA6FDFD%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Yaniv_Carmel_3-1637601415380.png%22%20alt%3D%22Yaniv_Carmel_3-1637601415380.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-399041759%22%20id%3D%22toc-hId-399041815%22%3E%3CSPAN%3EAtomic%20Red%20Team%20simulations%3C%2FSPAN%3E%3C%2FH3%3E%0A%3CP%3EPowered%20by%20Red%20Canary%2C%20%3CA%20href%3D%22https%3A%2F%2Fredcanary.com%2Fatomic-red-team%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EAtomic%20Red%20Team%3C%2FA%3E%20is%20an%20open-source%20library%20of%20tests%20that%20security%20teams%20can%20use%20to%20simulate%20adversarial%20activity%20in%20their%20environments.%20Atomic%20tests%20are%20simple%20%E2%80%93%20each%20test%20is%20mapped%20to%20a%20single%20MITRE%20ATT%26amp%3BCK%C2%AE%20technique%20or%20sub-technique%2C%20most%20of%20them%20have%20no%20prerequisites%2C%20and%20many%20come%20with%20easy-to-use%20configuration%20and%20cleanup%20commands.%3C%2FP%3E%0A%3CP%3EEvaluation%20Lab%20users%20can%20now%20use%20Atomic%20Red%20Team%20simulations%20to%20evaluate%20Microsoft%20Defender%20for%20Endpoint%E2%80%99s%20detection%20capabilities%20against%20both%20Windows%20and%20Linux%20threats.%20%3CSTRONG%3EThe%20simulations%20are%20provided%20as%20script%20files%3C%2FSTRONG%3E%2C%20so%20that%20security%20teams%20can%20choose%20to%20run%20them%20in%20the%20Evaluation%20lab%20or%20any%20other%20testing%20environment%20of%20their%20choice.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Yaniv_Carmel_4-1637601557153.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F328647iD2A20FA52FF5E37B%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Yaniv_Carmel_4-1637601557153.png%22%20alt%3D%22Yaniv_Carmel_4-1637601557153.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20first%20simulation%2C%20%3CSTRONG%3E2021%20Threat%20Detection%20Report%3C%2FSTRONG%3E%2C%20executes%20tests%20according%20to%20%3CA%20href%3D%22https%3A%2F%2Fredcanary.com%2Fthreat-detection-report%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3ERed%20Canary%E2%80%99s%20latest%20report%3C%2FA%3E%20of%20top%20Windows%20techniques%20associated%20with%20confirmed%20threats%2C%20as%20compiled%20from%20roughly%2020%2C000%20confirmed%20threats%20detected%20across%20customer%20environments.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20second%20simulation%2C%20%3CSTRONG%3ELinux%20techniques%3C%2FSTRONG%3E%2C%20is%20a%20collection%20of%20simple%20tests%20compiled%20to%20allow%20security%20teams%20to%20evaluate%20Microsoft%20Defender%20for%20Endpoint%E2%80%99s%20detection%20capabilities%20against%20common%20Linux%20persistence%2C%20discovery%2C%20and%20defense%20evasion%20techniques.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%E2%80%99re%20looking%20forward%20to%20you%20trying%20out%20the%20Evaluation%20Lab%20updates.%20Let%20us%20know%20your%20thoughts%20and%20feedback%20in%20the%20comments%20below%20or%20through%20the%20feedback%20tool%20in%20the%20portal!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2993927%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22evallab.png%22%20style%3D%22width%3A%20370px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F293799iB032F034A2DB5529%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22evallab.png%22%20alt%3D%22evallab.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3ELinux%2C%20Windows%2011%20and%20Windows%20Server%202016%20are%20now%20supported%2C%20as%20well%20as%20new%20simulations%20from%20Atomic%20Red%20Team!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2993927%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EEvaluation%20lab%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Nov 22 2021 09:30 AM
Updated by: