Advanced Threat Analytics Evaluations
This is the new TechNet Evaluation Center
Customized. Connected. Cool.
We’d like to introduce you to the new TechNet Evaluation Center—built to bring you a better evaluation experience on your laptop, tablet, or phone. It is customized based on your own personal experiences, connected to community and social sites, and includes cool new features to make your day job just a bit easier.
The new experience helps you keep track of your evaluations, valuable resources, and community connections. In addition you’ll be kept up to date on new releases, site updates, and more. Start using the site today and chart your own personal evaluation path forward.
Sign-inSign-in now to Explore, Try, and Learn new Microsoft products and solutions.
Your customized experience begins when you sign-insign-in to the new TechNet Evaluation Center, immediately enabling your My Evaluations page. Think of the My Evaluations page as your own, personal evaluation control center—a place for you to track the history of your evaluations, virtual labs, and Tech Journeys—as well as organize your many resources.
To begin an evaluation, simply click Evaluate Now in the top navigation bar and select your desired product.
This will take you to the product family page for the product you’ve selected. Here, all of the product evaluation information is at your fingertips—download details, pre-install information, evaluation resources, and more. Click Download, select your file type, complete registration, and download the file. Monitor the progress of your download with the embedded status bar in the top toolbar. Additionally, you can monitor your download status from the My Actions drop down menu. Here you will see your download status, along with options to pause or cancel the download process
FIND YOUR PRODUCT KEY: If your evaluation requires a product key, the key will be displayed in the Download details section immediately following registration completion. For security reasons, the product key will disappear when you leave the page. Copy the product key down so you can access it after your download completes. To regain access to the key you’ll need to re-register for the download.
Following download completion, the evaluation will be added to the Evaluations tile on your My Evaluations page—allowing you to track your progress, share, and more.
Explore, Try, and Learn the newest Microsoft solutions, which guide you along a Tech Journey learning path to understanding how you can bring these solutions to life.
The new Evaluation Center includes evaluation resources galore. But what if you want to read a white paper and don’t necessarily have the time right now? With the pin feature you can pin the white paper and it’s automatically added to your Resources tile—giving you the flexibility to read it when you’ve got the time. And a time estimate is also included for most resources, so you’ll have an idea of how much time it will take to get through each individual resource.
Connecting with others—from product experts to your internal IT team—is essential when evaluating new products and solutions. The Evaluation Center helps you connect more easily with new community and sharing features.
Access to product and solution experts is always at your fingertips on your My Evaluations page. As you evaluate new products and solutions, social resources will be added to your Community tile, helping you make those essential community connections.
Built-in to make your day job just a bit easier—the Evaluation Center includes some cool new features.
If you enjoy finding new and better ways of doing things then you’ll want to check out the Tools & Tips tile. As you try different product evaluations you’ll find resources targeted to where you are throughout your evaluation experience. Here you’ll be guided from initial setup through deployment and purchase.
Another cool feature to help you find more resources and additional experiences is the highlights bar, located at the top of every page. Here we’ll provide options for you to Explore, Try, and Learn based on your past actions.
Get a pre-sorted view of evaluation resources by purpose, when you click into the Explore, Try, and Learn experiences. Explore will surface documents, guidance, white papers, and similar support materials. Try will surface resources for getting hands-on with products and solutions—including virtual labs, guided experiences, and trials. Learn will surface online learning opportunities for you to improve your skills.
Easy to access. Advanced filters. Content that’s easy to save and organize. These are just a few of the search benefits the new Evaluation Center provides. Collapsible, advanced search filters are available throughout your evaluation experience, giving you the power to find what you need. The content is displayed in a user-friendly view, with the ability to pin and save resources relevant to you.
Thank you for checking out the new TechNet Evaluation Center.
TechNet Evaluation Experience Team
Microsoft Advanced Threat AnalyticsEvaluations | 90 days | Last Visited:
Microsoft Advanced Threat AnalyticsEvaluations | 90 days | Last Visited:
Please sign in to download Microsoft Advanced Threat Analytics. If you have not registered before, you will be asked to do so.
You can only download this evaluation from a desktop computer.
Microsoft Advanced Threat Analytics (ATA) is an on-premises product to help you detect advanced security attacks with User and Entity Behavioral Analytics (UEBA) technologies. By identifying suspicious user and device activities, ATA provides a simple and fast way to understand what is happening within your network. Once these activities are identified, ATA provides clear and relevant threat information on a simple, convenient feed.
Microsoft Advanced Threat Analytics detects:
- Abnormal behavior:
- Behavioral Analytics leverages Machine Learning to uncover questionable activities and abnormal behavior.
- Malicious attacks:
- Diagnostic engine detects known attacks almost as instantly as they occur.
- Security issues and risks:
- Leveraging world-class security researchers’ work, ATA identifies known security issues and risks.
How it works
ATA leverages deep packet inspection technology, as well as information from additional data-sources (Security Information and Event Management systems and Active Directory), to build an organizational security graph and detect advanced attacks in near real time.
The diagnostic engine continuously learns the behavior of organizational entities (users, devices, and resources) and adjusts itself to reflect the changes in your rapidly-evolving enterprise. As the attacker tactics get more sophisticated, Microsoft Advanced Threat Analytics helps you to keep up with continuously-learning behavioral analytics.
After detection, Microsoft Advanced Threat Analytics provides clear and relevant information on a simple attack timeline, so you can reduce the noise and focus on what is important fast. Attack timeline not only gives you the power of perspective on the “who, what, when, and how” of your enterprise, but also recommendations for investigation and remediation.
For more information about Microsoft Advanced Threat Analytics, see Microsoft Advanced Threat Analytics page.
English, French, German, Spanish, and Japanese
Microsoft Advanced Threat Analytics v1.6 | 64 Bit ISO
- Abnormal behavior:
- Review system requirements.
- Perform capacity planning.
- Review the deployment guide.
- Register, then download and install.
Pre-deployment Check List
- Configure port mirroring from the monitored domain controllers. This step is required for ATA to see the domain controller network traffic. The domain controllers should be set as the source of the traffic and the ATA Gateway should be set as the destination of the traffic. In case you cannot setup port mirroring with the DC, you have the option to install the ATA Gateway on the DC itself (lightweight gateway option).
- Create a domain read-only user which will be used by ATA to read information from the domain.
- Identify VPN networks.
- Create ATA honeytoken user (optional).
Microsoft Advanced Threat Analytics Deployment Process
- Install and configure the ATA Center.
- Install the ATA Gateways.
- Configure the ATA Gateways.
- Configure SMTP/Syslog Connectivity (optional).
For more information, please review the Microsoft Advanced Threat Analytics deployment guide.
Product Details: Microsoft Advanced Threat AnalyticsProduct Resources | Last Visited:Product Details: Microsoft Advanced Threat AnalyticsProduct Resources | Last Visited:
TechNet Library: Microsoft Advanced Threat AnalyticsProduct Resources | 5 mins | Last Visited:TechNet Library: Microsoft Advanced Threat AnalyticsProduct Resources | 5 mins | Last Visited:
Microsoft Advanced Threat Analytics ForumCommunity | 5 mins | Last Visited:Microsoft Advanced Threat Analytics ForumCommunity | 5 mins | Last Visited:
Microsoft Advanced Threat Analytics Console DemoVideos | 4 mins | Last Visited:Microsoft Advanced Threat Analytics Console DemoVideos | 4 mins | Last Visited:
Windows Server 2012 R2Evaluations | 180 days | Last Visited:Windows Server 2012 R2Evaluations | 180 days | Last Visited:
Watch: Microsoft Advanced Threat Analytics OverviewVideos | Last Visited:Watch: Microsoft Advanced Threat Analytics OverviewVideos | Last Visited:
Watch: Microsoft Advanced Threat Analytics Session at Ignite 2015Videos | Last Visited:Watch: Microsoft Advanced Threat Analytics Session at Ignite 2015Videos | Last Visited:
Watch: Microsoft Advanced Threat Analytics Technical DeploymentVideos | Last Visited:Watch: Microsoft Advanced Threat Analytics Technical DeploymentVideos | Last Visited: