This article is designed to help you understand how Microsoft Defender for Identity functionality is represented in the Microsoft Defender for Cloud Apps portal. Leveraging existing on-premise detections and abnormal behavior analytics, accessing Defender for Identity using the Microsoft Defender for Cloud Apps portal provides the ability to detect and alert on sensitive data exfiltration […]
Articles Tagged: Microsoft
Azure security baseline for Microsoft Defender for Identity
This security baseline applies guidance from the Azure Security Benchmark version 2.0 to Microsoft Defenderfor Identity. The Azure Security Benchmark provides recommendations on how you can secure your cloud solutions on Azure. The content is grouped by the security controls defined by the Azure Security Benchmark and the related guidance applicable to Microsoft Defenderfor Identity. Note Controls not applicable to […]
Microsoft Defender for Identity multi-forest support
Multi-forest support set up Microsoft Defender for Identity supports organizations with multiple forests, giving you the ability to easily monitor activity and profile users across forests. Enterprise organizations typically have several Active Directory forests – often used for different purposes, including legacy infrastructure from corporate mergers and acquisitions, geographical distribution, and security boundaries (red-forests). You […]
Microsoft Defender for Identity role groups
Microsoft Defender for Identity offers role-based security to safeguard data according to an organization’s specific security and compliance needs. Defender for Identity support three separate roles: Administrators, Users, and Viewers. Note This article provides steps for how to delete personal data from the device or service and can be used to support your obligations under […]
Microsoft Defender for Identity Reports
Note The experience described in this page can also be accessed at https://security.microsoft.com as part of Microsoft 365 Defender. The supporting documents for the new experience can be found here. For more information about Microsoft Defender for Identity and when other features will be available in Microsoft 365 Defender, see Microsoft Defender for Identity in Microsoft 365 Defender. The […]
What is Network Name Resolution? (Microsoft)
Network Name Resolution (NNR) is a main component of Microsoft Defender for Identity functionality. Defender for Identity captures activities based on network traffic, Windows events, and ETW – these activities normally contain IP data. Using NNR, Defender for Identity can correlate between raw activities (containing IP addresses), and the relevant computers involved in each activity. […]
Microsoft Defender for Identity Lateral Movement Paths (LMPs)
Note The Microsoft Defender for Identity features explained on this page are also accessible using the new portal. Lateral movement is when an attacker uses non-sensitive accounts to gain access to sensitive accounts throughout your network. Lateral movement is used by attackers to identify and gain access to the sensitive accounts and machines in your network […]
Understanding entity profiles (Microsoft)
Note The experience described in this page can also be accessed at https://security.microsoft.com as part of Microsoft 365 Defender. The supporting documents for the new experience can be found here. For more information about Microsoft Defender for Identity and when other features will be available in Microsoft 365 Defender, see Microsoft Defender for Identity in Microsoft 365 Defender. The […]
Microsoft Defender for Identity monitored activities
Note The Microsoft Defender for Identity features explained on this page are also accessible using the new portal. Microsoft Defender for Identity monitors information generated from your organization’s Active Directory, network activities and event activities to detect suspicious activity. The monitored activity information enables Defender for Identity to help you determine the validity of each potential […]
Microsoft Defender for Identity Security Alerts
Note The Microsoft Defender for Identity features explained on this page are also accessible using the new portal. Microsoft Defender for Identity security alerts explain the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users […]