What is Microsoft Defender for Identity?

Microsoft Defender for Identity (formerly Azure Advanced Threat Protection, also known as Azure ATP) is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.

Defender for Identity enables SecOp analysts and security professionals struggling to detect advanced attacks in hybrid environments to:

  • Monitor users, entity behavior, and activities with learning-based analytics
  • Protect user identities and credentials stored in Active Directory
  • Identify and investigate suspicious user activities and advanced attacks throughout the kill chain
  • Provide clear incident information on a simple timeline for fast triage

Monitor and profile user behavior and activities

Defender for Identity monitors and analyzes user activities and information across your network, such as permissions and group membership, creating a behavioral baseline for each user. Defender for Identity then identifies anomalies with adaptive built-in intelligence, giving you insights into suspicious activities and events, revealing the advanced threats, compromised users, and insider threats facing your organization. Defender for Identity's proprietary sensors monitor organizational domain controllers, providing a comprehensive view for all user activities from every device.

Protect user identities and reduce the attack surface

Defender for Identity provides you invaluable insights on identity configurations and suggested security best-practices. Through security reports and user profile analytics, Defender for Identity helps dramatically reduce your organizational attack surface, making it harder to compromise user credentials, and advance an attack. Defender for Identity's visual Lateral Movement Paths help you quickly understand exactly how an attacker can move laterally inside your organization to compromise sensitive accounts and assists in preventing those risks in advance. Defender for Identity security reports help you identify users and devices that authenticate using clear-text passwords and provide additional insights to improve your organizational security posture and policies.

Protecting the AD FS in hybrid environments

Active Directory Federation Services (AD FS) plays important role in today's infrastructure when it comes to authentication in hybrid environments. Defender for Identity protects the AD FS in your environment by detecting on-premises attacks on the AD FS and providing visibility into authentication events generated by the AD FS.

Identify suspicious activities and advanced attacks across the cyber-attack kill-chain

Typically, attacks are launched against any accessible entity, such as a low-privileged user, and then quickly move laterally until the attacker gains access to valuable assets – such as sensitive accounts, domain administrators, and highly sensitive data. Defender for Identity identifies these advanced threats at the source throughout the entire cyber-attack kill chain:

Reconnaissance

Identify rogue users and attackers' attempts to gain information. Attackers are searching for information about user names, users' group membership, IP addresses assigned to devices, resources, and more, using a variety of methods.

Compromised credentials

Identify attempts to compromise user credentials using brute force attacks, failed authentications, user group membership changes, and other methods.

Lateral movements

Detect attempts to move laterally inside the network to gain further control of sensitive users, utilizing methods such as Pass the Ticket, Pass the Hash, Overpass the Hash and more.

Domain dominance

Highlighting attacker behavior if domain dominance is achieved, through remote code execution on the domain controller, and methods such as DC Shadow, malicious domain controller replication, Golden Ticket activities, and more.

Investigate alerts and user activities

Defender for Identity is designed to reduce general alert noise, providing only relevant, important security alerts in a simple, real-time organizational attack timeline. The Defender for Identity attack timeline view allows you to easily stay focused on what matters, leveraging the intelligence of smart analytics. Use Defender for Identity to quickly investigate threats, and gain insights across the organization for users, devices, and network resources. Seamless integration with Microsoft Defender for Endpoint provides another layer of enhanced security by additional detection and protection against advanced persistent threats on the operating system.

Additional resources for Defender for Identity

Start a free trial

https://signup.microsoft.com/Signup?OfferId=87dd2714-d452-48a0-a809-d2f58c4f68b7&ali=1

Follow Defender for Identity on Microsoft Tech Community

https://aka.ms/MDIcommunity

Join the Defender for Identity Yammer community

https://www.yammer.com/azureadvisors/#/threads/inGroup?type=in_group&feedId=9386893

Visit the Defender for Identity product page

https://www.microsoft.com/microsoft-365/security/identity-defender

Learn more about Defender for Identity architecture

Defender for Identity Architecture

Watch our videos

Bolster your security posture with Defender for Identity - Identify and proactively resolve known bad-practices, leaving your environment in a healthier state and more resilient to bad actors - watch the YouTube video

Incident Investigation with Defender for Identity - Learn how to Detect, investigate, and respond to advanced threats targeting identities and domain controllers with Defender for Identity. Starting with an alert in Defender for Identity we'll demonstrate how that information is correlated into an incident, how to hunt for threats using information captured by Defender for Identity and how we can initiate an automatic incident response to remediate the incident before it evolves into a bigger problem - watch the YouTube video

What's next?

We recommend deploying Defender for Identity in three phases:

Phase 1

  1. Set up Defender for Identity to protect your primary environments. Defender for Identity's fast deployment model enables you to start protecting your organization today. Install Defender for Identity
  2. Set sensitive accounts and honeytoken accounts.
  3. Review reports and lateral movement paths.

Phase 2

  1. Protect all the domain controllers and forests in your organization.
  2. Monitor all alerts – investigate lateral movement & domain dominance alerts.
  3. Work with the Security Alert guide to understand threats and triage potential attacks.

Phase 3

  1. Integrate Defender for Identity alerts into your SecOp workflows.

See Also