Understanding Microsoft Defender for Identity

  1. Home
  2. Understanding Microsoft Defender for Identity

Go back to Tutorial

In this, we will get an overview of Microsoft Defender for Identity and its features of protecting against attacks.

Microsoft Defender for Identity (previously Azure Advanced Threat Protection, often known as Azure ATP) is a cloud-based security service that uses Active Directory signals on-premises to identify, detect, and investigate threats.

  • Firstly, advanced threats
  • Secondly, compromised identities
  • Lastly, malicious insider actions directed at your organization.
Defender for Identity enables SecOp analysts and security professionals struggling to detect advanced attacks in hybrid environments to:
1. Monitor and profile user behavior and activities
  • Firstly, a defender for Identity monitors and analyzes user activities and information across your network, such as permissions and group membership, creating a behavioral baseline for each user.
  • Secondly, it identifies anomalies with adaptive built-in intelligence, giving you insights into suspicious activities and events, revealing the advanced threats, compromised users, and insider threats facing your organization.
  • Lastly, the sensors monitor organizational domain controllers, providing a comprehensive view for all user activities from every device.
Practice tests Microsoft Defender for Identity
2. Protect user identities and reduce the attack surface
  • Firstly, the Defender for Identity provides you invaluable insights on identity configurations and suggested security best practices.
  • Secondly, it helps dramatically reduce your organizational attack surface, making it harder to compromise user credentials and advance an attack.
  • Thirdly, the Defender for Identity’s visual Lateral Movement Paths helps you understand exactly how an attacker can move laterally inside your organization to compromise sensitive accounts and assists in preventing those risks in advance.
  • Lastly, the security reports help you identify users and devices that authenticate using clear-text passwords and provide additional insights to improve your organizational security posture and policies.
3. Protecting the AD FS in hybrid environments

Defender for Identity protects the AD FS in your environment by detecting on-premises attacks on the AD FS and providing visibility into authentication events generated by the AD FS.

4. Identify suspicious activities and advanced attacks across the cyber-attack kill-chain

Attacks are often directed at any publicly available entity, such as a low-privileged user. The attacker will next travel laterally until he or she has access to important assets. This can include very sensitive data, sensitive accounts, and domain administrators. Furthermore, across the whole cyber-attack kill chain, the Defender for Identity recognises these sophisticated threats at the source:

  • Firstly, identify rogue users and attackers’ attempts to gain information. Attackers are searching for information about user names, users’ group membership, IP addresses assigned to devices, resources, and more, using a variety of methods.
  • Secondly, identify attempts for compromising user credentials using,
    • Firstly, brute force attacks
    • Secondly, failed authentications
    • Lastly, user group membership changes
  • Thirdly, detect attempts for moving laterally inside the network to gain further control of sensitive users, utilizing methods such as Pass the Ticket, Pass the Hash, Overpass the Hash, and more.
  • Lastly, highlighting attacker behavior if domain dominance is achieved, through remote code execution on the domain controller, and methods like DC Shadow, Golden Ticket activities, and more.
5. Investigate alerts and user activities
  • Firstly, the Defender for Identity helps in reducing general alert noise, providing only relevant, important security alerts in a simple, real-time organizational attack timeline.
  • Secondly, its attack timeline view allows you to easily stay focused on what matters, leveraging the intelligence of smart analytics. However, use Defender for Identity for,
    • investigating threat
    • gaining insights across the organization for users, devices, and network resources.
sc-900 online course

Reference: Microsoft Documentation

Go back to Tutorial

Menu