AttackIQ Simulations Now Available in Microsoft Defender ATP Evaluation Lab

AttackIQ, Microsoft, 5G device testing solution, Microsoft Defender ATP

AttackIQ, a leading independent vendor of breach and attack simulation solutions and a Microsoft Intelligent Security Association partner, announced the availability of its simulations in the Microsoft Defender ATP evaluation lab. AttackIQ’s integration with Microsoft Defender ATP is helping customers verify that their security controls are configured correctly and protecting their environment against real-world threats. Now, these simulations are easily accessible in public preview in the Microsoft Defender Security Center.

Also Read: Automation, AI, and ML – The Heroes in the World of Payment Fraud Detection

The Microsoft Defender ATP evaluation lab was launched to give customers the opportunity to test security solutions in a safe, virtual environment. Running attack simulations through third-party platforms such as AttackIQ offers a secure way to evaluate Microsoft Defender ATP capabilities in an objective and meaningful manner. When customers enable the integration, every lab machine created will have the chosen agent(s) installed, allowing them to run a wide variety of simulations.

“AttackIQ and Microsoft have a long-standing collaboration,” said Dariush Afshar, VP Business Development & Corporate Strategy, AttackIQ. “We have been working together to give customers complete and continuous visibility into the status of their security controls, empowering them to quickly remediate any configuration gaps that may exist and confirm they are protected against the latest threats. Now, these capabilities are more readily and easily available than ever before through Microsoft’s evaluation lab.”

Also Read: UL Announces Cyber Security Solution to Safeguard Supply Chains

To run AttackIQ simulations, Microsoft customers simply need to enable preview features in the Microsoft Defender ATP evaluation lab and then select from a wide variety of tests within the simulations catalog. Each simulation comes with an in-depth description of the attack scenario, references to MITRE ATT&CK techniques and attack groups that are part of the simulation, and sample advanced hunting queries.

For more such updates follow us on Google News ITsecuritywire News