Back to Browse

02. Detecting Remote Code Execution with Microsoft Defender | KQL & Automated Response Lab

15 views
Apr 7, 2026
47:46

In this lab, I simulate and detect a Remote Code Execution (RCE) scenario using Microsoft Defender for Endpoint (MDE). I executed a PowerShell-based script to download and install an application, then used Advanced Hunting (KQL) to identify the activity and build a custom detection rule. 🔎 What I Covered: Simulating RCE using PowerShell and command execution Analyzing logs in MDE using KQL Investigating activity across key tables Creating a custom detection rule for suspicious behavior Triggering an automated response (VM isolation) Reviewing the full attack timeline in MDE 🧠 Key Learning: This lab demonstrates how security teams: Detect suspicious PowerShell activity Identify potential remote code execution behavior Create detection rules for real-world threats Automate incident response actions Investigate attack timelines end-to-end This exercise helped me build practical skills in: Threat Hunting Detection Engineering Endpoint Security (MDE) KQL & Log Analysis Security Operations (SOC workflows)

Download

0 formats

No download links available.

02. Detecting Remote Code Execution with Microsoft Defender | KQL & Automated Response Lab | NatokHD