Working with the Microsoft Defender for Identity portal 0 (0)

Note All Microsoft Defender for Identity features explained on this page are also accessible using the new Defender for Cloud Apps portal. Use the Microsoft Defender for Identity portal to monitor and respond to suspicious activity detected by Defender for Identity. Typing the ? key provides keyboard shortcuts for Defender for Identity portal accessibility. The Defender for Identity […]

Read More

Tutorial: Investigate an entity (Microsoft) 0 (0)

 Note The Microsoft Defender for Identity features explained on this page are also accessible using the new portal. In this tutorial you’ll learn how to investigate entities connected to suspicious activities detected by Microsoft Defender for Identity. After viewing a security alert in the timeline, you’ll learn how to drill down into the entity involved in […]

Read More

Tutorial: Use Lateral Movement Paths (LMPs) (Microsoft) 0 (0)

 Note The Microsoft Defender for Identity features explained on this page are also accessible using the new portal. Lateral movement attacks are typically accomplished using a number of different techniques. Some of the most popular methods used by attackers are credential theft and Pass the Ticket attacks. In both methods, non-sensitive accounts are used by attackers for lateral moves by […]

Read More

Tutorial: Investigate a computer (Microsoft) 0 (0)

 Note The Microsoft Defender for Identity features explained on this page are also accessible using the new portal. Microsoft Defender for Identity alert evidence provides clear indications when computers have been involved in suspicious activities or when indications exist that a machine is compromised. In this tutorial you’ll use the investigation suggestions to help determine the […]

Read More

Tutorial: Investigate a user (Microsoft) 0 (0)

 Note The Microsoft Defender for Identity features explained on this page are also accessible using the new portal. Microsoft Defender for Identity alert evidence and lateral movement paths provide clear indications when users have performed suspicious activities or indications exist that their account has been compromised. In this tutorial you’ll use the investigation suggestions to help […]

Read More

Tutorial: Exfiltration alerts (Microsoft) 0 (0)

Typically, cyberattacks are launched against any accessible entity, such as a low-privileged user, and then quickly move laterally until the attacker gains access to valuable assets. Valuable assets can be sensitive accounts, domain administrators, or highly sensitive data. Microsoft Defender for Identity identifies these advanced threats at the source throughout the entire attack kill chain […]

Read More

Tutorial: Domain dominance alerts (Microsoft) 0 (0)

Typically, cyberattacks are launched against any accessible entity, such as a low-privileged user, and then quickly move laterally until the attacker gains access to valuable assets. Valuable assets can be sensitive accounts, domain administrators, or highly sensitive data. Microsoft Defender for Identity identifies these advanced threats at the source throughout the entire attack kill chain […]

Read More

Tutorial: Lateral movement alerts (Microsoft) 0 (0)

Typically, cyberattacks are launched against any accessible entity, such as a low-privileged user, and then quickly move laterally until the attacker gains access to valuable assets. Valuable assets can be sensitive accounts, domain administrators, or highly sensitive data. Microsoft Defender for Identity identifies these advanced threats at the source throughout the entire attack kill chain […]

Read More

Tutorial: Compromised credential alerts (Microsoft) 0 (0)

Typically, cyber-attacks are launched against any accessible entity, such as a low-privileged user, and then quickly move laterally until the attacker gains access to valuable assets – such as sensitive accounts, domain administrators, and highly sensitive data. Microsoft Defender for Identity identifies these advanced threats at the source throughout the entire attack kill chain and […]

Read More

Tutorial: Reconnaissance alerts (Microsoft) 0 (0)

Typically, cyberattacks are launched against any accessible entity, such as a low-privileged user, and then quickly move laterally until the attacker gains access to valuable assets. Valuable assets can be sensitive accounts, domain administrators, or highly sensitive data. Microsoft Defender for Identity identifies these advanced threats at the source throughout the entire attack kill chain […]

Read More