Empowering SOCs with Azure AD Identity Protection in Microsoft 365 Defender

Empowering SOCs with Azure AD Identity Protection in Microsoft 365 Defender

Empowering SOCs with Azure AD Identity Protection in Microsoft 365 Defender

Howdy!

We’re delighted to share that the public preview of Azure Active Directory Identity Protection in Microsoft 365 Defender (M365D) is now rolling out, further empowering security professionals to detect and respond to identity compromise. You may already be familiar with investigating Identity Protection detections in the Microsoft Entra or Azure portal, and that’s not going away. What’s new is that these detections will now also be available as alerts in the Microsoft 365 Defender portal! If you use Microsoft 365 Defender to investigate endpoint, application, and email alerts, you no longer need to switch portals to see your Identity Protection alerts! Tracy Shi, product manager of Identity Protection, will take you through what this means for you.

Best regards,  

Alex Weinert (@Alex_T_Weinert)  

Director of Identity Security  

Microsoft Identity and Network Access Security Team 

Hi folks!

Azure Active Directory (Azure AD) Identity Protection alerts are now available in the Microsoft 365 Defender portal. We’re excited about the efficiency and simplicity this integration brings to security teams.

Azure AD Identity Protection leverages trillions of signals to detect compromised identities, provides insights into risky users and detections, and offers mechanisms to automatically remediate risks. Including Identity Protection detections as part of a larger incident in Microsoft 365 Defender now helps security teams identify the end-to-end attack story more efficiently and respond to compromised identities more quickly.

Identity compromise is the most common starting point for breach, so Identity Protection detections are often the first alarm that goes off. Now that these crucial early indicators are included in Microsoft 365 Defender incidents, they provide greater clarity on how identities were leveraged in the attack. If you’re interested in seeing just the Identity Protection alerts, you can filter by the service source. High-impact alerts are shown by default in Microsoft 365 Defender, and you can change the Alert service setting to view all or no Identity Protection alerts.

Screenshot of the incident view in Microsoft 365 Defender with the “Service sources” filtered on “AAD Identity Protection”Screenshot of the incident view in Microsoft 365 Defender with the “Service sources” filtered on “AAD Identity Protection”

Once you’re finished with the investigation, you can update the status of the incident and the Identity Protection alert, and it will sync back to Azure AD Identity Protection. Alert status syncing between our first-party partners has been a long time ask, and we’re thrilled that it’s launching with this public preview! All Azure AD Identity Protection alerts within Microsoft 365 Defender are also available via Incidents API .

Additionally, the Microsoft 365 Defender User Page provides you the ability to see the user’s current risk score generated by Identity Protection and give feedback on potentially compromised risky users. You can confirm them as compromised to move them to high risk or dismiss them to resolve the risk. To best leverage these signals and the other wealth of identity threat intelligence in Identity Protection, we recommend enabling the risky user and risky sign-in policies for access control and automatic risk remediation.

GIF of viewing a risky user in Microsoft 365 Defender with risk level generated by AAD Identity Protection and confirming that the user is compromised.GIF of viewing a risky user in Microsoft 365 Defender with risk level generated by AAD Identity Protection and confirming that the user is compromised.

We can’t wait for you to try it out and invite you to get started today by visiting and reviewing the documentation. 

Stay Secure!

Tracy Shi

Product Manager II

Microsoft Identity and Network Access Security Team

To find more articles like this visit Argon Systems.

This content was originally published here.