Using Microsoft Defender for Identity with Microsoft Defender for Cloud Apps 0 (0)

This article is designed to help you understand how Microsoft Defender for Identity functionality is represented in the Microsoft Defender for Cloud Apps portal. Leveraging existing on-premise detections and abnormal behavior analytics, accessing Defender for Identity using the Microsoft Defender for Cloud Apps portal provides the ability to detect and alert on sensitive data exfiltration […]

Read More

Azure security baseline for Microsoft Defender for Identity 0 (0)

This security baseline applies guidance from the Azure Security Benchmark version 2.0 to Microsoft Defenderfor Identity. The Azure Security Benchmark provides recommendations on how you can secure your cloud solutions on Azure. The content is grouped by the security controls defined by the Azure Security Benchmark and the related guidance applicable to Microsoft Defenderfor Identity.  Note Controls not applicable to […]

Read More

Microsoft Defender for Identity multi-forest support 0 (0)

Multi-forest support set up Microsoft Defender for Identity supports organizations with multiple forests, giving you the ability to easily monitor activity and profile users across forests. Enterprise organizations typically have several Active Directory forests – often used for different purposes, including legacy infrastructure from corporate mergers and acquisitions, geographical distribution, and security boundaries (red-forests). You […]

Read More

Microsoft Defender for Identity role groups 0 (0)

Microsoft Defender for Identity offers role-based security to safeguard data according to an organization’s specific security and compliance needs. Defender for Identity support three separate roles: Administrators, Users, and Viewers.  Note This article provides steps for how to delete personal data from the device or service and can be used to support your obligations under […]

Read More

Microsoft Defender for Identity Reports 0 (0)

 Note The experience described in this page can also be accessed at https://security.microsoft.com as part of Microsoft 365 Defender. The supporting documents for the new experience can be found here. For more information about Microsoft Defender for Identity and when other features will be available in Microsoft 365 Defender, see Microsoft Defender for Identity in Microsoft 365 Defender. The […]

Read More

What is Network Name Resolution? (Microsoft) 0 (0)

Network Name Resolution (NNR) is a main component of Microsoft Defender for Identity functionality. Defender for Identity captures activities based on network traffic, Windows events, and ETW – these activities normally contain IP data. Using NNR, Defender for Identity can correlate between raw activities (containing IP addresses), and the relevant computers involved in each activity. […]

Read More

Microsoft Defender for Identity Lateral Movement Paths (LMPs) 0 (0)

 Note The Microsoft Defender for Identity features explained on this page are also accessible using the new portal. Lateral movement is when an attacker uses non-sensitive accounts to gain access to sensitive accounts throughout your network. Lateral movement is used by attackers to identify and gain access to the sensitive accounts and machines in your network […]

Read More

Understanding entity profiles (Microsoft) 0 (0)

 Note The experience described in this page can also be accessed at https://security.microsoft.com as part of Microsoft 365 Defender. The supporting documents for the new experience can be found here. For more information about Microsoft Defender for Identity and when other features will be available in Microsoft 365 Defender, see Microsoft Defender for Identity in Microsoft 365 Defender. The […]

Read More

Microsoft Defender for Identity monitored activities 0 (0)

Note The Microsoft Defender for Identity features explained on this page are also accessible using the new portal. Microsoft Defender for Identity monitors information generated from your organization’s Active Directory, network activities and event activities to detect suspicious activity. The monitored activity information enables Defender for Identity to help you determine the validity of each potential […]

Read More

Microsoft Defender for Identity Security Alerts 0 (0)

 Note The Microsoft Defender for Identity features explained on this page are also accessible using the new portal. Microsoft Defender for Identity security alerts explain the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users […]

Read More