Midnight theme

Midnight is a theme for GitHub Pages.


Project maintained by GiBoris Hosted on GitHub Pages — Theme by mattgraham

Lab 02 — Microsoft Defender for Endpoint (MDE) Investigation 🛡️💻

Platform: Microsoft Defender for Endpoint / Microsoft Defender XDR
Focus: Endpoint onboarding, alert generation, incident investigation, and response


Objective

This lab demonstrates practical experience with Microsoft Defender for Endpoint, including:

The lab simulates a controlled attack scenario and follows a structured SOC investigation workflow.


Lab Environment

All activities were performed in an isolated, non-production environment.


Part 1 — Deployment of Microsoft Defender for Endpoint

1.1 Device Discovery

Initiated device discovery from the Defender portal to identify assets within the environment.

1

1


1.2 Endpoint Onboarding

Executed onboarding script on a virtual machine to connect the host to Defender for Endpoint.

2


1.3 Onboarding Verification

Confirmed that the host was successfully onboarded and visible in the Defender portal.

3


1.4 Alert Simulation

Executed a test script on the onboarded VM to generate security alerts.

4


1.5 Alert Visibility

Verified that alerts generated from the test activity were successfully ingested into Defender.

5


1.6 Role Configuration

Configured roles within the Defender portal to manage access and permissions.

6

6

6


1.7 Entra ID Security Group

Created a security group in Microsoft Entra ID for role assignment and access control.

7


1.8 Device Group Configuration

Configured device groups to segment endpoints and apply policies.

8


Part 2 — Attack Detection & Mitigation

2.1 Alert Investigation

Opened and analysed the test alert generated during simulation.

9


2.2 Incident Creation

Observed how Defender automatically correlates alerts into an incident.

10

10


2.3 Incident Management

Reviewed incident details, severity, affected assets, and recommended actions.

11


2.4 Additional Attack Simulation

Executed another attack script to generate additional suspicious activity.

12


2.5 Alert Correlation

Verified that multiple alerts were grouped into a single incident for investigation.

13

13

13


2.6 Evidence Collection

Reviewed collected evidence including:

to understand the attack chain.

14


Investigation Approach

The investigation followed a structured SOC methodology:

  1. Detection — Alerts triggered by suspicious activity
  2. Correlation — Alerts grouped into incidents
  3. Analysis — Review of evidence and attack timeline
  4. Response — Identification of mitigation actions

Skills Demonstrated


Disclaimer

All activities were performed in a controlled lab environment using simulated attack scenarios.