Microsoft Defender for Identity (formerly Azure ATP) is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. It monitors domain controllers to detect reconnaissance, lateral movement, and domain dominance attacks.
Detect account enumeration, network mapping, DNS reconnaissance, and other techniques attackers use during the initial discovery phase.
Visualize and understand lateral movement paths that attackers can exploit. Identify over-permissioned accounts and unnecessary admin credentials.
Detect pass-the-hash, pass-the-ticket, golden ticket, skeleton key, and other credential theft techniques in real time.
Proactively identify and remediate identity security weaknesses, misconfigured settings, and risky trust configurations in Active Directory.
Identify DCSync, DCShadow, DPAPI abuse, and other domain persistence techniques that attackers use for long-term access.
User and Entity Behavior Analytics with machine learning to detect anomalous activities, suspicious sign-ins, and unusual resource access patterns.
Identity-focused security labs. deploy sensors, detect lateral movement, investigate identity attacks, and build a mature identity security posture.
Plan sensor placement for your Active Directory forest, download and install the MDI sensor on domain controllers, configure required ports and the gMSA service account, verify sensor health in the portal, and resolve common installation issues.
Set up honeytoken accounts for early intrusion detection, tag sensitive entities and groups, tune alert thresholds for lateral movement and privilege escalation detections, and configure email and SIEM notification policies for the SOC team.
Simulate pass-the-hash and golden ticket attacks in a controlled lab environment, trace the attack in the MDI timeline, analyze lateral movement paths between compromised accounts, investigate credential theft evidence, and perform full identity-focused remediation.
Review and remediate all MDI security assessments, detect and fix unsecure account attributes (SPN exposure, unconstrained delegation), deploy LAPS and disable legacy protocols, integrate MDI findings with Microsoft Secure Score, and build an identity maturity dashboard.