Introduction

Microsoft Defender for Identity comes with the Microsoft Defender XDR suite. It uses the signals from Windows Active Directory to detect, investigate, and respond to cyberthreats.

It will help with detecting, investigating, and responding to attacks such as reconnaissance, lateral movements, brute-force attacks. Additionally, it will be able to use signals from Azure Active Directory, Windows Active Directory, and endpoints to reference affected users, devices, and services.

Onboarding

  1. Go to Settings Identities.

  2. Go to Sensors Add Sensor and Download Azure ATP Sensor.

  3. Transfer Azure ATP Sensor.zip file to Domain Controller and run Azure ATP Sensor Setup.msi as administrator.

  4. Click on Yes.

  5. Select English and click on Next.

  6. Click on Next.

  7. Enter Access Key and click on Next.

  8. Once the installation is completed click on Next.

Setting Up Read-Only Account

  1. Go to Settings Directory Service Accounts.

  2. Make a read-only account in Windows Active Directory and enter these credentials inside Add credentials.

Enabling Automatic Windows Auditing Configuration

  1. Go to Settings Identities.

  2. Go to General Advanced Features and enable Automatic Windows Auditing Configuration.

  3. Click on Save.

Conclusion

Once all these actions are completed the domain controllers are onboarded to Microsoft Defender for Identity. If your organization is using Microsoft Defender XDR and Microsoft highly recommends setting up Microsoft Defender for Identity as it will help with collecting signals to detect, investigate, and respond to complex cyberthreats.