De-risk your lateral movement paths with Microsoft Defender for Identity

Published Apr 16 2021 01:04 PM 2,943 Views
Microsoft

Microsoft Defender for Identity is focused on protecting on-premises identities and allowing security analysts to pinpoint vulnerabilities before an attack can occur. A key feature that allows analysts to achieve this is by viewing the evidence relates to lateral movement paths in Defender for Identity. This information is provided through a visual guide that break downs the possible ways an advisory can move throughout an organization by compromising credentials.

 

A lateral movement occurs when an attacker begins to use non-sensitive accounts to gain access to sensitive entities - think a domain admin or a server containing sensitive information. If an attacker is successful in compromising sensitive entities, they can traverse the environment and eventually gain domain dominance.

 

To learn more about the different techniques attackers use to move laterally and how you can remediate these vulnerabilities, watch the video below.

 

 

The lateral movement paths view can be found in each individual's user page, available in the Microsoft 365 security center. You can also query information relating to lateral movement paths using Microsoft 365 Defender's advanced hunting function. More information on advanced hunting can be found on this docs page.

%3CLINGO-SUB%20id%3D%22lingo-sub-2272503%22%20slang%3D%22en-US%22%3EDe-risk%20your%20lateral%20movement%20paths%20with%20Microsoft%20Defender%20for%20Identity%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2272503%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20Defender%20for%20Identity%20is%20focused%20on%20protecting%20on-premises%20identities%20and%20allowing%20security%20analysts%20to%20pinpoint%20vulnerabilities%20before%20an%20attack%20can%20occur.%20A%20key%20feature%20that%20allows%20analysts%20to%20achieve%20this%20is%20by%20viewing%20the%20evidence%20relates%20to%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Fuse-case-lateral-movement-path%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Elateral%20movement%20paths%20in%20Defender%20for%20Identity.%3C%2FA%3E%26nbsp%3BThis%20information%20is%20provided%20through%20a%20visual%20guide%20that%20break%20downs%20the%20possible%20ways%20an%20advisory%20can%20move%20throughout%20an%20organization%20by%20compromising%20credentials.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EA%20lateral%20movement%20occurs%20when%20an%20attacker%20begins%20to%20use%20non-sensitive%20accounts%20to%20gain%20access%20to%20sensitive%20entities%20-%20think%20a%20domain%20admin%20or%20a%20server%20containing%20sensitive%20information.%20If%20an%20attacker%20is%20successful%20in%20compromising%20sensitive%20entities%2C%20they%20can%20traverse%20the%20environment%20and%20eventually%20gain%20domain%20dominance.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20learn%20more%20about%20the%20different%20techniques%20attackers%20use%20to%20move%20laterally%20and%20how%20you%20can%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Finvestigate-lateral-movement-path%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eremediate%20these%20vulnerabilities%3C%2FA%3E%3CSPAN%3E%2C%3C%2FSPAN%3E%20watch%20the%20video%20below.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRWAOfW%22%20width%3D%22500%22%20allowfullscreen%3D%22allowfullscreen%22%20wmode%3D%22transparent%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20lateral%20movement%20paths%20view%20can%20be%20found%20in%20each%20individual's%20user%20page%2C%20available%20in%20the%20Microsoft%20365%20security%20center.%20You%20can%20also%20query%20information%20relating%20to%20lateral%20movement%20paths%20using%20Microsoft%20365%20Defender's%20advanced%20hunting%20function.%20More%20information%20on%20advanced%20hunting%20can%20be%20found%20on%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Fadvanced-hunting-overview%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ethis%20docs%20page.%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2272503%22%20slang%3D%22en-US%22%3E%3CP%3EInsight%20into%20how%20Microsoft%20Defender%20for%20Identity%20can%20help%20you%20identity%20and%20remediate%20potential%20lateral%20movement%20paths%20within%20your%20organization's%20on-premises%20Active%20Directory%20environment.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2272503%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20365%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20365%20Defender%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Identity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎May 11 2021 01:59 PM
Updated by: