Generating Alerts in your Defender Environment - mattnovitsch/M365 GitHub Wiki
Summary
I want to start off and say this is test files and queries; however, please use caution when testing your environment. The tasks that are created are meant to be run daily like in a lab environment so alerts can trigger.
This can be used to create samples of activities in your environment great for customer presentations or learning about different attacks that could happen. The following are what will be triggered:
- Network Protection
- Download EICAR File
- Download of PUA File
- Run ORADAD (Security principal reconnaissance (LDAP))
- Reconnaissance
- RemotePowerShell/Latermovement
- Removal of Defender(tamper protection)
- SuspiciousPowershell
- AMSI Test
I added an OnDemandRun.ps1 to the labs.zip that will run all the scripts in a row so you don't have to wait for the scheduled tasks. If you run the OnDemandRun.ps1 file expect Defender to kick off Attack Disruption and disable the account you are using. It will also make a nice attack web.
Please note this is NOT meant to be ran in a production environment.
Prerequisites
- Labs.zip
- Location: C:\tools\ folder
Steps
-
Download Labs.zip
-
Extract all items in Tools folder
-
Open Administrator PowerShell and navigate to c:\tools\labs
-
Run Setup.ps1
-
Validate the tasks are in Task Scheduler.
-
You can kick off the jobs manually or let them run on their own. Once they complete though, you should see the following alerts.
References
Uninstall
If you would like to remove them then please download the Uninstall file.