Review compromised accounts or data
Threat protection product names in Microsoft are changing. Read more about this and other updates. We'll be updating names in products and in the Learn content in the near future.
Azure ATP security alerts explain the suspicious activities detected by Azure ATP sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
Azure ATP security alerts are divided into the following categories or phases, like the phases seen in a typical cyber-attack kill chain:
- Reconnaissance phase alerts
- Compromised credential phase alerts
- Lateral movement phase alerts
- Domain dominance phase alerts
- Exfiltration phase alerts
Each Azure ATP security alert includes:
- Alert title. Official Azure ATP name of the alert.
- Description. Brief explanation of what happened.
- Evidence. Additional relevant information and related data about what happened to help in the investigation process.
- Excel download. Detailed Excel download report for analysis
Alerts can also be viewed within Microsoft Cloud App Security:
The following scenario describes an investigation into an attacker gaining administrator access to the domain controller and compromising the Active Directory domain and forest.
The first alert we notice in the Cloud App Security portal shows User and IP address reconnaissance (SMB). Clicking into this alert, we see (under Description) that a user was able to learn the IP addresses of 2 accounts by enumerating SMB sessions on the domain controller.
Within the alert, we can also find the activity log, which shows more information about the command that was run.
Back in the Alerts overview, we can see a more recent alert pointing to an overpass-the-hash attack.
Opening the suspected overpass-the-hash-attack (Kerberos) alert, we see evidence that the user account was part of a lateral movement path.
The next alert shows a Suspected identity theft (pass-the-ticket).
Azure ATP has detected theft of a ticket from a domain administrator to the infiltrated PC. The Cloud App Security portal shows exactly which resources were accessed using the stolen tickets.
In the next alert, we see that the stolen credentials were used to run a remote command on the domain controller.
Looking into the Activity Log for the alert, we see that the command was to create a new user within the Administrators group.
From all the previous alerts, we suspect that an attacker has:
- Infiltrated a PC.
- Used the PC to determine IP addresses of other users’ PCs, one of which belongs to a domain administrator.
- Performed an overpass-the-hash attack by stealing the NTLM hash from another user who previously authenticated to the infiltrated PC to access any resource the user has permissions for. (In this case, local admin rights to IP addresses previously exposed)
- Used the newly stolen credentials to gain access to the domain administrator's PC.
- Leveraged their access to the domain administrator's PC to steal the identity of the domain administrator.
- Used the domain administrator's identity to access the domain controller, and created a new user account with domain administrative permissions.
With domain administrative permissions, the attacker has effectively compromised the environment. Now they are free to perform any number of attacks, such as a Skeleton Key attack.
Explore how to investigate and respond to attacks with Microsoft Defender for Identity
View a video version of the interactive guide (captions available in more languages).
Be sure to click the full-screen option in the video player. When you're done, use the Back arrow in your browser to come back to this page.