microsoft 365 defender
40 TopicsWhat's new and What's learning period in Microsoft Defender for Identity.
In this blog post, I will explain an advanced settings capability available in the Microsoft Defender for Identity, which will help the security admins in evaluating the product and tweaking the sensitivity level of the alerts. What'sLearning Periodin MDI? What are thelatest enhancementsadded to that feature? https://www.linkedin.com/pulse/whats-new-learning-period-microsoft-defender-identity-elie-karkafy1.5KViews0likes1CommentMissing remediation actions
Hi everyone, Remediation actions such asDisable/Enable user in AD, Force password resetarecurrently not available through the Defender portal (user page, advanced hunting). Anyone aware of this change? https://learn.microsoft.com/en-us/defender-for-identity/remediation-actions#supported-actionsSolvedMDI not firing alert - "Suspicious additions to sensitive groups (external ID 2024)"
Hi everyone, i have checked our MDI installation with the Powershell - it is all green. Also the action itself is in the portal. The group is marked sensitive by default. A user gets added by another Domain Admin. This should fire an high alert? But nothin happens. Is there any setting i am missing? We started with a "german AD" so the group names are in German. But this cannot make any difference. BR Stephan464Views0likes2CommentsDetecting service account provisioning
Hi all I'm doing some research around the creation and enabling of old fashioned service accounts using MS Defender. I'm trying to achieve of coupe of things actually. I can detect LogonType of Service Service on MDE onboarded machines using the DeviceLogonEvents Table. But there are a few other things I would like to achieve 1.) Raise an alert when a domain account is granted the "Logon as a Service" right on any machine. 2.) When an account that has never logged on as service suddenly does so. 3.) Perhaps detect when a user account's ServicePrincipalName attribute is populayed or updated. So the service account logon query looks like this: DeviceLogonEvents | where Timestamp >= ago(30d) | where LogonType == "Service" or LogonType == "Batch" | where AccountDomain =~ "saica" | summarize count() by AccountName, DeviceName, LogonType | sort by count_ desc The other ones seem to be a bit trickier. Anyone got any ideas? I would rather not install the MMA agent every and ingest security event logs.Deploying MDI to multiple On-premise DC for monitoring purposes
Hello, When deploying MDI to all my on-premise domain controllers for monitoring purposes. Do I need to add new sensors for each dc? or can I use the package and access key from one sensor to all my dc's? Thank you!Solved663Views0likes2CommentsUser Risk Policy Migration to Conditional Access - Alerts
Hello all, and greetings from Portugal! I've just migrated my user risk and sign-in risk policies to Conditional Access, but I was wondering if this still allows me to receive alerts (like user risk policy did) about detected users at risk. Tks in advance, Diogo SousaSolved672Views0likes2CommentsMicrosoft Defender for Identity standalone sensors
Hi Current scenario: we are forwarding domain control security logs to another server(windows machine) via the "WEF configuration". We have logs in forwarded events ( event viewer). In future if am installing an identity sensor on a standalone method should I configure port mirroring and Directory services accounts? is that a mandatory configuration for the stand-alone sensor?Exclusions for Network Name Resolution
Hi all, I have deployed Defender for Identity in an infrastructure and now it has been discovered that the sensors are performing name resolution even on unknown IPs, e.g. a Linux-based honeypot that has no connection to the AD. Furthermore, according to the firewall, the sensors "scan" in larger packets, which in turn causes the firewall to alert. Does anyone know if it is possible to exclude certain IPs or ranges from the scan and is there any documentation on how the process works in detail? Thanks in advanceSolved1.1KViews0likes4Comments