Home / Hands-on Labs

Hands-on Labs

60+ enterprise security labs across the Microsoft security stack.
Step-by-step walkthroughs. deploy, configure, investigate, and respond.

๐Ÿ”ฌ
Browse by Product
Showing 60+ labs
SIEM & SOAR XDR Suite Compliance & AI

๐Ÿ“ก Microsoft Sentinel

Cloud-native SIEM & SOAR . from deployment to advanced threat hunting.

๐Ÿ“‚ Script Repository. Deployment and configuration scripts

โš”๏ธ Defender XDR

Unified threat protection across endpoints, email, identity, and cloud apps.

๐Ÿ“‚ Script Repository. KQL hunting queries and cross-product investigations

60+ labs across the XDR ecosystem. These 4 labs cover unified XDR capabilities. For product-specific labs, see: Endpoint ยท Office 365 ยท Identity ยท Cloud Apps ยท Cloud ยท Vuln Mgmt · Entra ID · App Gov

๐Ÿ’ป Defender for Endpoint

Endpoint protection. onboarding, ASR rules, ransomware investigation, and EDR policies.

๐Ÿ“‚ Script Repository. Detection tests, ransomware simulation, and sensor validation

01
Beginnerโฑ 75 min ยท 10 steps

Onboard a Windows Server Fleet to MDE

Plan deployment rings, create onboarding packages via Group Policy and Intune, deploy to Windows Server 2022, and troubleshoot onboarding failures.

02
Intermediateโฑ 90 min ยท 12 steps

Configure Attack Surface Reduction Rules

Audit your attack surface, deploy ASR rules in audit mode via Intune, analyze impact reports, transition to block mode, and configure exclusions.

03
Intermediateโฑ 120 min ยท 15 steps

Investigate a Simulated Ransomware Attack

Trigger a safe ransomware simulation, trace the attack chain, analyze process trees, collect an investigation package, and perform live response remediation.

04
Advancedโฑ 150 min ยท 18 steps

Deploy & Tune Endpoint Detection Policies

Configure next-gen protection, enable EDR in block mode, create custom indicators, set up device groups with RBAC, and build automated investigation playbooks.

05
Advancedโฑ 120 min ยท 12 steps

Network Protection & Custom Indicators for IP/URL/Domain

Deploy network protection, disable QUIC/ECH for non-Edge browsers, create custom IP/URL/domain indicators, troubleshoot silent enforcement failures, and validate with KQL.

06
Advancedโฑ 180 min ยท 9 steps

Defender AV Modes, MDA Integration & Third-Party AV Coexistence

Master all Defender AV modes (Active, Passive, EDR Block, Disabled). Map what works with CrowdStrike for MDA unsanctioned app blocking, custom indicators, network protection, and endpoint DLP.

โ˜๏ธ Defender for Cloud

Cloud security. Defender plans, CSPM, workload hardening, and multi-cloud protection.

๐Ÿ“‚ Script Repository. Defender plan deployment and protection configuration

๐ŸŒ Defender for Cloud Apps

SaaS security. shadow IT discovery, session controls, risky OAuth apps, and cloud DLP.

๐Ÿ“‚ Script Repository. App discovery, session policies, and OAuth governance

๐Ÿ”‘ Defender for Identity

Identity security. sensor deployment, threat detection, attack path investigation, and posture assessments.

๐Ÿ“‚ Script Repository. Recon, credential theft, lateral movement, and DCSync simulations

๐Ÿ“ง Defender for Office 365

Email and collaboration security. protection policies, phishing simulations, and BEC investigations.

๐Ÿ“‚ Script Repository. Phishing simulation, mail flow rules, and Safe Links/Attachments

๐Ÿ›ก๏ธ Entra ID Protection

Cloud identity risk detection. risky sign-ins, leaked credentials, and risk-based Conditional Access.

๐Ÿ” Defender Vulnerability Management

Risk-based vulnerability assessment. software inventory, security baselines, and remediation tracking.

๐Ÿ“‹ App Governance

OAuth app visibility. monitor data access, detect anomalous behaviour, and enforce app compliance.

🔒 Microsoft Purview

Data security, governance & compliance. sensitivity labels, DLP, insider risk, eDiscovery, communication compliance, records management, and more.

📂 Script Repository. DLP policy deployment and eDiscovery content searches

🔐 Information Protection & DLP

01
Beginner⏱ 75 min . 10 steps

Deploy Sensitivity Labels with Auto-Labeling

Create a sensitivity label taxonomy, configure visual markings and encryption, publish to pilot groups, set up auto-labeling, and monitor with Activity Explorer.

02
Intermediate⏱ 90 min . 12 steps

Configure DLP for Exchange & SharePoint

Create DLP policies with custom sensitive information types, configure policy tips and notifications, set up incident reports, and tune rules for accuracy.

03
Beginner⏱ 75 min . 10 steps

Deploy Endpoint DLP with Defender XDR Integration

Deploy Endpoint DLP, configure USB, print, clipboard, and cloud upload monitoring, create DLP policies for sensitive data on devices, and investigate alerts in the XDR portal.

04
Intermediate⏱ 90 min . 10 steps

Configure DLP for Microsoft Teams & Exchange

Deploy DLP for Teams chat, channels, and Exchange email. Configure policy tips, handle shared channels and meetings, and build incident management workflows.

05
Intermediate⏱ 120 min . 10 steps

Investigate DLP Incidents in the Unified XDR Portal

Investigate DLP violations correlated with endpoint, identity, and cloud app signals. Trace data exfiltration, create custom detection rules, and automate response.

06
Advanced⏱ 150 min . 10 steps

Build an Enterprise DLP Dashboard & Compliance Program

Build executive DLP dashboards, unify policies across workloads, create PCI-DSS and GDPR compliance evidence, measure program effectiveness, and design a DLP maturity roadmap.

07
Advanced⏱ 150 min . 7 steps

Endpoint DLP Across Defender AV Modes & Third-Party AV Coexistence

Deploy Endpoint DLP across all Defender AV modes. Map which DLP activities work with CrowdStrike, understand MDE sensor dependency, and troubleshoot silent failures.

🔍 Risk Management & eDiscovery

📋 Compliance & Governance

๐Ÿ›ก๏ธ Security Copilot

AI-powered security operations. promptbooks, threat intelligence, and SOC workflow automation.

01
Beginnerโฑ 60 min ยท 8 steps

Enable Security Copilot & First Investigation

Activate Security Copilot with SCU capacity planning, configure data source plugins, run natural-language investigation prompts, and evaluate response accuracy.

02
Intermediateโฑ 90 min ยท 12 steps

Build Custom Promptbooks for Incident Triage

Design a multi-step triage promptbook, create reusable prompt templates, share with the SOC team, and measure Mean Time to Triage improvements.

03
Intermediateโฑ 100 min ยท 14 steps

Automate Threat Intelligence Summarization

Connect TI plugins, build IOC enrichment prompts, create a daily threat briefing workflow, and integrate Copilot outputs with Sentinel watchlists.

04
Advancedโฑ 150 min ยท 18 steps

Build an End-to-End SOC Workflow with Copilot

Design a complete SOC workflow: automated triage, cross-product investigation, executive report generation, and post-incident lessons-learned documentation.

05
Advancedโฑ 120 min ยท 14 steps

Embedded Experiences & Zero Trust Deployment

Explore Copilot embedded in Defender XDR, Sentinel, Entra, Intune, and Purview. Apply Zero Trust principles with Conditional Access, least privilege roles, PIM, and phased deployment.

06
Intermediateโฑ 120 min ยท 12 steps

Build an AI Communications Agent for Outlook & Teams

Build a Microsoft AI agent that auto-acknowledges non-critical messages, generates draft replies for critical messages with human-in-the-loop review via Adaptive Cards, using M365 Agents SDK, Graph API, and Azure OpenAI.

โš™๏ธ MCP Servers

Build real MCP servers. implement security tools, deploy to Azure, and create multi-server AI agents.