Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

XDR: Defense Evasion

Premium room

Detect and investigate techniques that adversaries use to avoid detection with Defender XDR.

medium

60 min

510

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Threat actors can’t orchestrate data breaches without evading security controls. Executing large-scale and impactful cyberattacks while facing strong security measures is almost unfeasible. Techniques for evading defenses ensure that each phase of an attack sequence is undetected and uncomplicated.

A person in a dark outfit crouching behind the monitor, partially visible on the left side.

In this room, we will discuss techniques that threat actors use to avoid detection and bypass security controls throughout their operations to remain undetected while compromising the system or the entire infrastructure. 

Learning Objectives

After completing this room, you will be able to understand the following;

  • What are defense evasion tactics
  • Discuss various attack techniques and how they can be mitigated 
  • Recognize indicators of potential defense evasion activity
  • Review incidents related to a defense evasion on the Microsoft Defender XDR portal
  • Explain how to mitigate and respond to a defense evasion using Microsoft Defender XDR
Answer the questions below

I am ready to dive in!

Ready to learn Cyber Security?

The XDR: Defense Evasion room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.