{"id":7747,"date":"2022-04-22T00:00:00","date_gmt":"2022-04-22T07:00:00","guid":{"rendered":""},"modified":"2025-06-17T23:55:02","modified_gmt":"2025-06-18T06:55:02","slug":"microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/","title":{"rendered":"Microsoft announces new collaboration with Red Button for attack simulation testing"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">As we highlighted in our latest <a href=\"https:\/\/azure.microsoft.com\/blog\/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends\/\" target=\"_blank\" rel=\"noopener\">attack trends report<\/a>, Distributed Denial-of-Service (DDoS) attacks are one of the biggest security concerns today. Whether in the cloud or on-premises, DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet. Planning and preparing for a DDoS attack is crucial to a well-vetted incident management response plan.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Today, Microsoft is excited to announce a new collaboration with Red Button, offering our customers an additional DDoS attack simulation testing provider to choose from. With <a href=\"https:\/\/www.red-button.net\/ddos-testing\/\" target=\"_blank\" rel=\"noopener\">Red Button\u2019s DDoS Testing service suite<\/a>, you will be able to work with a dedicated team of experts to simulate real-world DDoS attack scenarios in a controlled environment. Simulation testing allows you to assess your current state of readiness, identify gaps in your incident response procedures, and guide you in developing a proper <a href=\"https:\/\/docs.microsoft.com\/azure\/ddos-protection\/ddos-response-strategy\" target=\"_blank\" rel=\"noopener\">DDoS response strategy<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"red-button-ddos-testing\">Red Button DDoS Testing<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.red-button.net\/ddos-testing\/\" target=\"_blank\" rel=\"noopener\">Red Button\u2019s DDoS Testing service suite<\/a> includes three stages:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"1-planning-session\">1. Planning session<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Red Button experts meet with your team to understand your network architecture, assemble technical details, and define clear goals and testing schedules. This includes planning the DDoS test scope and targets, attack vectors, and attack rates. The joint planning effort is detailed in a test plan document.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"2-controlled-ddos-attack\">2. Controlled DDoS attack<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Based on the defined goals, the Red Button team launches a combination of multi-vector DDoS attacks. The test typically lasts between three to six hours. Attacks are securely executed using dedicated servers and are controlled and monitored using Red Button\u2019s management console.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"3-summary-and-recommendations\">3. Summary and recommendations<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The Red Button team provides you with a written DDoS Test Report outlining the effectiveness of DDoS mitigation. The report includes an executive summary of the test results, a complete log of the simulation, a list of vulnerabilities within your infrastructure, and recommendations on how to correct them.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Here is an example of a DDoS Test Report from Red Button:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/04\/763a038a-364a-4445-a9a4-804beb39ea14.webp\" alt=\"Red Button DDoS Test Report Example\" title=\"\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In addition, Red Button offers two other service suites that can complement the DDoS Testing service suite:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.red-button.net\/prevent-ddos-attacks-with-ddos360\/\" target=\"_blank\" rel=\"noopener\">DDoS 360<\/a> is an \u201call included\u201d annual service that includes the <a href=\"https:\/\/www.red-button.net\/ddos-testing\/\" target=\"_blank\" rel=\"noopener\">DDoS Testing<\/a>, <a href=\"https:\/\/www.red-button.net\/ddos-technology-hardening\/\" target=\"_blank\" rel=\"noopener\">DDoS Hardening<\/a>, DDoS team skills development, and <a href=\"https:\/\/www.red-button.net\/ddos-incident-response\/\" target=\"_blank\" rel=\"noopener\">DDoS Incident Response services<\/a>. The program consists of multiple year-round activities carried out by Red Button\u2019s top DDoS experts, which includes extensive pre-attack activities to strengthen your technological infrastructure and improve the skills of your teams as well as a dedicated incident response expert team in the event of an attack.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.red-button.net\/ddos-incident-response\/\" target=\"_blank\" rel=\"noopener\">DDoS Incident Response<\/a> (IR) is a 30-day incident response service that consists of three phases: when under a DDoS attack or DDoS threat (for example, DDoS ransom threat), Red Button DDoS experts are immediately assigned and work closely with your security and IT teams to analyze the attack and apply the appropriate mitigations. Once the attack has been fully mitigated, Red Button audits your network architecture and DDoS protection system configuration, including running a DDoS test and provides detailed recommendations for hardening and optimization to prevent future attacks. Lastly, Red Button conducts DDoS training for your teams to increase your skills and readiness, and helps you build a DDoS Playbook that provides detailed procedures and activities to prepare for any future attack.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"azure-ddos-simulation-testing-policy\">Azure DDoS simulation testing policy<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Red Button\u2019s simulation environment is built within Azure. You can only simulate attacks against Azure-hosted public IP addresses that belong to an Azure subscription of your own, which will be validated by Azure Active Directory (Azure AD) before testing. Additionally, these target public IP addresses must be protected under <a href=\"https:\/\/azure.microsoft.com\/services\/ddos-protection\/#features\" target=\"_blank\" rel=\"noopener\">Azure DDoS Protection<\/a>.&nbsp;Red Button services are sold separately from Azure DDoS Protection and can be purchased directly through Red Button.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">You may only simulate attacks using our approved testing partners:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.red-button.net\/ddos-testing\/\" target=\"_blank\" rel=\"noopener\">Red Button<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.keysight.com\/us\/en\/products\/network-security\/breakingpoint-cloud.html\" target=\"_blank\" rel=\"noopener\">BreakingPoint Cloud<\/a>.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Red Button: <a href=\"https:\/\/www.red-button.net\/\" target=\"_blank\" rel=\"noopener\">DDoS Services\u2014Protection Consulting and Testing<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Azure DDoS Protection simulation testing partners: <a href=\"https:\/\/docs.microsoft.com\/azure\/ddos-protection\/test-through-simulations\" target=\"_blank\" rel=\"noopener\">Azure DDoS Protection simulation testing documentation<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Microsoft penetration testing guidelines: <a href=\"https:\/\/docs.microsoft.com\/azure\/security\/fundamentals\/pen-testing\" target=\"_blank\" rel=\"noopener\">Penetration testing documentation<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/azure.microsoft.com\/services\/ddos-protection\/\" target=\"_blank\" rel=\"noopener\">Azure DDoS Protection Standard product page<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/aka.ms\/ddosprotectiondocs\" target=\"_blank\" rel=\"noopener\">Azure DDoS Protection Standard documentation<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/azure\/ddos-protection\/fundamental-best-practices\" target=\"_blank\" rel=\"noopener\">DDoS Protection best practices<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>As we highlighted in our latest attack trends report, Distributed Denial-of-Service (DDoS) attacks are one of the biggest security concerns today. Whether in the cloud or on-premises, DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet. Planning and preparing for a DDoS attack is crucial to a well-vetted incident management response plan.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1457,1459],"tags":[],"audience":[3053,3056],"content-type":[1481],"product":[1500],"tech-community":[],"topic":[],"coauthors":[97],"class_list":["post-7747","post","type-post","status-publish","format-standard","hentry","category-networking","category-security","audience-it-decision-makers","audience-it-implementors","content-type-thought-leadership","product-azure-ddos-protection","review-flag-1-1680286581-825","review-flag-2-1680286581-601","review-flag-3-1680286581-173","review-flag-new-1680286579-546"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft announces new collaboration with Red Button for attack simulation testing | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"As we highlighted in our latest attack trends report, Distributed Denial-of-Service (DDoS) attacks are one of the biggest security concerns today. Whether in the cloud or on-premises, DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet. Planning and preparing for a DDoS attack is crucial to a well-vetted incident management response plan.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft announces new collaboration with Red Button for attack simulation testing | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"As we highlighted in our latest attack trends report, Distributed Denial-of-Service (DDoS) attacks are one of the biggest security concerns today. Whether in the cloud or on-premises, DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet. Planning and preparing for a DDoS attack is crucial to a well-vetted incident management response plan.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-22T07:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-18T06:55:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/04\/763a038a-364a-4445-a9a4-804beb39ea14.webp\" \/>\n<meta name=\"author\" content=\"Microsoft Azure\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Azure\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/microsoft-azure\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Azure\"}],\"headline\":\"Microsoft announces new collaboration with Red Button for attack simulation testing\",\"datePublished\":\"2022-04-22T07:00:00+00:00\",\"dateModified\":\"2025-06-18T06:55:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/\"},\"wordCount\":669,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/04\/763a038a-364a-4445-a9a4-804beb39ea14.webp\",\"articleSection\":[\"Networking\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/\",\"name\":\"Microsoft announces new collaboration with Red Button for attack simulation testing | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/04\/763a038a-364a-4445-a9a4-804beb39ea14.webp\",\"datePublished\":\"2022-04-22T07:00:00+00:00\",\"dateModified\":\"2025-06-18T06:55:02+00:00\",\"description\":\"As we highlighted in our latest attack trends report, Distributed Denial-of-Service (DDoS) attacks are one of the biggest security concerns today. Whether in the cloud or on-premises, DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet. Planning and preparing for a DDoS attack is crucial to a well-vetted incident management response plan.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/04\/763a038a-364a-4445-a9a4-804beb39ea14.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/04\/763a038a-364a-4445-a9a4-804beb39ea14.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Networking\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/networking\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft announces new collaboration with Red Button for attack simulation testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft announces new collaboration with Red Button for attack simulation testing | Microsoft Azure Blog","description":"As we highlighted in our latest attack trends report, Distributed Denial-of-Service (DDoS) attacks are one of the biggest security concerns today. Whether in the cloud or on-premises, DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet. Planning and preparing for a DDoS attack is crucial to a well-vetted incident management response plan.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft announces new collaboration with Red Button for attack simulation testing | Microsoft Azure Blog","og_description":"As we highlighted in our latest attack trends report, Distributed Denial-of-Service (DDoS) attacks are one of the biggest security concerns today. Whether in the cloud or on-premises, DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet. Planning and preparing for a DDoS attack is crucial to a well-vetted incident management response plan.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2022-04-22T07:00:00+00:00","article_modified_time":"2025-06-18T06:55:02+00:00","og_image":[{"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/04\/763a038a-364a-4445-a9a4-804beb39ea14.webp","type":"","width":"","height":""}],"author":"Microsoft Azure","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Microsoft Azure","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/microsoft-azure\/","@type":"Person","@name":"Microsoft Azure"}],"headline":"Microsoft announces new collaboration with Red Button for attack simulation testing","datePublished":"2022-04-22T07:00:00+00:00","dateModified":"2025-06-18T06:55:02+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/"},"wordCount":669,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/04\/763a038a-364a-4445-a9a4-804beb39ea14.webp","articleSection":["Networking","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/","name":"Microsoft announces new collaboration with Red Button for attack simulation testing | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/04\/763a038a-364a-4445-a9a4-804beb39ea14.webp","datePublished":"2022-04-22T07:00:00+00:00","dateModified":"2025-06-18T06:55:02+00:00","description":"As we highlighted in our latest attack trends report, Distributed Denial-of-Service (DDoS) attacks are one of the biggest security concerns today. Whether in the cloud or on-premises, DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet. Planning and preparing for a DDoS attack is crucial to a well-vetted incident management response plan.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/04\/763a038a-364a-4445-a9a4-804beb39ea14.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2022\/04\/763a038a-364a-4445-a9a4-804beb39ea14.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-announces-new-collaboration-with-red-button-for-attack-simulation-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Networking","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/networking\/"},{"@type":"ListItem","position":3,"name":"Microsoft announces new collaboration with Red Button for attack simulation testing"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/7747","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=7747"}],"version-history":[{"count":2,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/7747\/revisions"}],"predecessor-version":[{"id":42192,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/7747\/revisions\/42192"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=7747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=7747"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=7747"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=7747"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=7747"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=7747"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=7747"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=7747"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=7747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}