The goal of this document is to provide validation steps to simulate attacks in VMs/Computers monitored by Azure Security Center, to better understand the detection capabilities available in Security Center and how to take advantage of Log Analytics integration with Security Center to hunt threats.  You should use the steps described in this document in a lab environment.