Microsoft Defender for Identity Deep Dive — Part 3: XDR Investigation, Hunting, and Response
Microsoft Defender for Identity Deep Dive — Part 3: XDR Investigation, Hunting, and Response
In Part 1, we treated Microsoft Defender for Identity as an identity telemetry engine.
In Part 2, we looked at how MDI detections actually work: deterministic detections, behavioral baselines, thresholds, false positives, and detection limits.
Now we move to the part that matters most in production:
What does the SOC actually do with MDI?
This is where many deployments fail.
Not because the sensor is broken.
Not because the alerts are useless.
But because MDI is handled like a standalone alerting tool instead of an identity signal source inside Microsoft Defender XDR.
That is the wrong operating model.
MDI alerts should not be triaged in isolation.
An MDI alert is rarely the full story. It is usually one identity-centered slice of a wider attack path involving endpoint activity, authentication flows, cloud sign-ins, SaaS access, privilege changes, or lateral movement.
The right workflow is:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
MDI alert
↓
Defender XDR incident
↓
Alert Story and Alert Graph
↓
Identity Timeline
↓
Raw evidence and entity context
↓
Advanced Hunting
↓
Response actions
↓
Posture remediation
That last step matters.
A mature MDI program does not stop at closing alerts. It uses identity incidents to reduce attack paths before the same behavior happens again.
1. MDI alerts should not be triaged alone
A common SOC mistake is to open an MDI alert, read the title, classify it, and move on.
That may work for simple low-impact alerts, but it fails for serious identity attacks.
Identity attacks are usually chain-based.
An attacker may:
- compromise an endpoint,
- dump or reuse credentials,
- query Active Directory,
- request Kerberos tickets,
- move laterally,
- modify privileged groups,
- abuse AD CS,
- compromise a domain controller,
- pivot to Entra ID,
- access cloud applications.
MDI may only own part of that story.
Microsoft Defender for Endpoint may show the initial process execution.
Microsoft Defender for Identity may show LDAP reconnaissance, Kerberos abuse, lateral movement, or suspicious directory changes.
Microsoft Entra ID Protection may show cloud identity risk.
Microsoft Defender for Cloud Apps may show suspicious SaaS activity.
Microsoft Defender XDR is where these signals should come together.
Field insight
If the SOC investigates MDI alerts only inside the identity alert view, they will often miss root cause.
They may answer:
“What identity behavior was suspicious?”
But they may not answer:
“Where did the compromise start, how far did it spread, and what should be contained first?”
That is why the incident page should be the default starting point.
2. Security alerts vs health issues
Before going deeper, separate two concepts:
- MDI security alerts
- MDI health issues
Security alerts are investigation signals. They can be correlated into Defender XDR incidents.
Health issues are operational signals. They tell you whether MDI is collecting and processing identity telemetry correctly.
Examples of health issues include:
- sensor connectivity problems,
- DSA or gMSA failures,
- missing audit policies,
- resource constraints,
- cloud communication issues,
- NNR problems,
- or sensor service failures.
These health issues are not usually handled as security incidents, but they directly affect detection confidence.
What to watch for
Do not let the SOC ignore health issues because they are “not alerts.”
A health issue on a domain controller sensor can mean the SOC is investigating identity incidents with partial visibility.
That is not just an operations problem.
That is a detection quality problem.
3. The correct investigation entry point: Defender XDR incident
When an MDI alert appears, the first question should be:
“Is this part of a Defender XDR incident?”
If yes, investigate the incident first.
The incident gives you:
- related alerts,
- impacted users,
- impacted devices,
- evidence,
- timeline,
- MITRE techniques,
- affected assets,
- automated investigation status,
- and response actions.
This is where MDI becomes more than an AD alert.
MDI identity context can be correlated with endpoint, email, SaaS, cloud identity, and cloud workload signals.
Example
A standalone MDI alert might say:
Suspicious LDAP reconnaissance from WIN11-CLIENT.
That is useful.
But inside an XDR incident, that same alert may appear beside:
- suspicious PowerShell on the same endpoint,
- credential dumping evidence from MDE,
- Kerberos ticket anomalies from MDI,
- risky sign-in from Entra ID Protection,
- unusual SharePoint download from Defender for Cloud Apps.
Now the story changes.
The LDAP alert is no longer “some reconnaissance.”
It may be the discovery phase of a larger compromise.
Common failure mode
SOC teams sometimes close the identity alert as benign because they recognize the user or device.
That is dangerous.
A known admin account performing suspicious identity behavior may be worse, not better.
The right question is not:
“Is this a real user?”
The right question is:
“Was this behavior expected from this user, from this device, at this time, in this sequence?”
4. Alert Story: the chronological view
The Alert Story is one of the most useful investigation views for MDI.
It helps analysts understand what happened before and after the triggering event.
Think of it as the narrative layer.
It can show:
- the sequence of identity activities,
- involved users,
- involved devices,
- domain controllers,
- suspicious actions,
- related evidence,
- and how the alert developed.
How to use it
When opening the Alert Story, do not only read the alert title.
Look for sequence.
Ask:
- What happened before the alert?
- Was there reconnaissance first?
- Was there credential access?
- Did the same identity touch multiple systems?
- Did the same source device interact with sensitive assets?
- Did the behavior escalate over time?
- Did another Defender workload observe related activity?
Field insight
Alert Story is especially useful for explaining identity attacks to customers.
Many customers understand endpoint alerts because they can see a process tree.
Identity alerts are more abstract.
Alert Story gives identity activity a timeline that consultants can walk through:
“First this device queried privileged users. Then this account requested Kerberos service tickets. Then the same identity authenticated to another host. Then a sensitive group was modified.”
That turns identity telemetry into an attack narrative.
5. Alert Graph: the relationship view
The Alert Graph helps visualize relationships between entities.
It can map connections between:
- users,
- devices,
- domain controllers,
- IP addresses,
- sensitive assets,
- and related identity objects.
The graph is useful because identity incidents are relationship-heavy.
The question is often not only:
“What happened?”
But also:
“Which entities are connected, and how?”
How to use it
Use Alert Graph to answer:
- Which user was involved?
- Which device initiated the activity?
- Which domain controller observed it?
- Which sensitive account or group was touched?
- Is there a path from the source to a privileged target?
- Are there multiple devices using the same identity?
- Are there multiple identities active from the same device?
- Does the relationship graph suggest lateral movement?
Common failure mode
Analysts sometimes treat the graph as a visual decoration.
It is not.
The graph is often the fastest way to understand blast radius.
If one compromised device is connected to several identities, or one identity is connected to several sensitive systems, that changes severity.
Consultant callout
Teach analysts to use the graph as a scoping tool.
A good question is:
“What does the graph show that the alert title does not?”
If the answer is nothing, the analyst probably did not inspect it deeply enough.
6. Identity Timeline: the investigation backbone
The Identity Timeline is where MDI becomes operationally powerful.
It lets analysts view identity activity over time and filter by useful dimensions such as:
- time range,
- activity type,
- protocol,
- location,
- source,
- and related entities.
This is where you reconstruct what an identity did before, during, and after an alert.
Why the timeline matters
Attackers rarely perform one action.
They perform sequences.
The timeline helps you find those sequences.
For example:
1
2
3
4
5
6
7
09:12 — User logs on to workstation
09:19 — Workstation performs LDAP reconnaissance
09:23 — Kerberos service tickets requested
09:31 — User authenticates to file server
09:36 — Remote logon to admin workstation
09:44 — Sensitive group membership modified
10:02 — Cloud session established
That sequence is much more important than any single event.
How to investigate with the timeline
When pivoting to the impacted identity:
- Set the time range around the alert.
- Expand backward before the alert.
- Expand forward after the alert.
- Filter by protocol.
- Filter by activity type.
- Compare source devices.
- Look for authentication changes.
- Look for directory changes.
- Look for cloud activity.
- Export records when needed for reporting or deeper analysis.
Field insight
The timeline is not only for confirmed incidents.
It is also useful for validating whether an alert is isolated.
If an identity has one suspicious event but no related activity before or after, the severity may be lower.
If the timeline shows reconnaissance, credential access, lateral movement, and privilege changes in sequence, severity increases quickly.
7. Raw evidence: where confidence lives
After reviewing the story, graph, and timeline, inspect the raw evidence.
This is where analysts should validate confidence.
Important evidence areas include:
- source device,
- source IP,
- user identity,
- domain controller,
- protocol,
- timestamp,
- NNR certainty,
- entity evidence,
- alert evidence,
- directory object details,
- and related activity.
NNR certainty matters
Network Name Resolution affects attribution.
If MDI is confident that an IP maps to a specific computer, the evidence is stronger.
If attribution is weak, the analyst needs to be careful.
Poor NNR can create confusion such as:
- wrong source device,
- unknown device,
- NAT ambiguity,
- VPN ambiguity,
- stale DNS mapping,
- or incomplete source identity.
What to watch for
Before escalating an incident, ask:
- How certain is the source device?
- Is this a NAT or VPN address?
- Is the same IP shared by many users?
- Does MDE confirm the device identity?
- Does the device timeline support the MDI evidence?
- Is the domain controller sensor healthy?
- Were there health issues during the event window?
This is the difference between “alert handling” and real investigation.
8. Advanced Hunting: from alert review to identity threat hunting
Advanced Hunting is where detection engineers and senior SOC analysts can move beyond portal views.
MDI data appears in identity-focused hunting tables that can be used to investigate:
- authentication behavior,
- LDAP queries,
- directory changes,
- account metadata,
- alert evidence,
- incident relationships,
- and cross-domain activity.
Core tables include:
IdentityLogonEventsIdentityQueryEventsIdentityDirectoryEventsIdentityInfoAlertInfoAlertEvidence
Depending on tenant integrations, additional tables may help correlate with endpoint, cloud, email, or SaaS activity.
Table overview
| Table | Main use |
|---|---|
IdentityLogonEvents | Kerberos, NTLM, and identity authentication activity |
IdentityQueryEvents | LDAP and directory query behavior |
IdentityDirectoryEvents | Directory object changes, group changes, sensitive modifications |
IdentityInfo | Identity metadata and enrichment |
AlertInfo | Alert metadata |
AlertEvidence | Entities and evidence connected to alerts |
Consultant callout
Do not teach Advanced Hunting as “run some random KQL.”
Teach it as an investigation extension.
The hunting question should come from the incident.
Examples:
- Did this identity authenticate elsewhere?
- Did this device query other sensitive accounts?
- Did other accounts perform the same LDAP pattern?
- Did this source request unusual Kerberos tickets?
- Was a sensitive group modified recently?
- Are there other alerts involving the same entity?
- Did this on-premises identity later appear in cloud activity?
9. Hunting use case: suspicious LDAP reconnaissance
Use this when an MDI alert suggests LDAP reconnaissance and you want to see whether the behavior is isolated.
IdentityQueryEvents
| where Timestamp > ago(7d)
| where QueryType has_any ("LDAP", "SAMR")
| summarize QueryCount=count(),
FirstSeen=min(Timestamp),
LastSeen=max(Timestamp),
TargetCount=dcount(TargetAccountDisplayName)
by AccountName, DeviceName, QueryType
| where QueryCount > 50 or TargetCount > 20
| order by QueryCount desc
How to use it
This query helps identify accounts or devices performing unusually broad directory queries.
It is not a final detection by itself.
It is a triage query.
After finding a suspicious source, pivot into:
- the device page,
- identity timeline,
- related alerts,
- logon activity,
- endpoint process evidence,
- and whether the source is an approved admin or scanner system.
Field insight
Do not immediately assume high query count equals malicious.
Inventory tools, IAM platforms, backup systems, scanners, and admin tools may query AD heavily.
The investigation question is:
“Is this source expected to perform this kind of query?”
10. Hunting use case: Kerberos activity from a suspicious source
Use this when you suspect Kerberoasting, lateral movement, or abnormal Kerberos behavior.
IdentityLogonEvents
| where Timestamp > ago(7d)
| where Protocol == "Kerberos"
| summarize LogonCount=count(),
TargetCount=dcount(TargetDeviceName),
AccountCount=dcount(AccountName),
FirstSeen=min(Timestamp),
LastSeen=max(Timestamp)
by DeviceName, AccountName, LogonType
| order by TargetCount desc, LogonCount desc
How to use it
This helps identify identities or devices touching many targets through Kerberos.
It can support investigation of:
- lateral movement,
- unusual service access,
- broad ticket usage,
- or compromised admin accounts.
What to watch for
High target count may be normal for:
- service accounts,
- management servers,
- monitoring systems,
- backup platforms,
- deployment servers,
- or privileged admin workflows.
The goal is not to flag everything.
The goal is to identify behavior that does not match the role of the account or device.
11. Hunting use case: sensitive group modifications
Use this when investigating privilege escalation or persistence.
IdentityDirectoryEvents
| where Timestamp > ago(30d)
| where ActionType has_any ("Group Membership changed", "Member added to group", "Member removed from group")
| where TargetAccountDisplayName has_any ("Domain Admins", "Enterprise Admins", "Administrators", "Account Operators", "Backup Operators")
| project Timestamp,
ActionType,
AccountName,
AccountDomain,
TargetAccountDisplayName,
DestinationDeviceName,
AdditionalFields
| order by Timestamp desc
How to use it
This query helps identify recent changes to privileged groups.
For every result, ask:
- Who made the change?
- From which device?
- Was it approved?
- Was the source a PAW?
- Was the target account expected?
- Did the change happen near another alert?
- Was the account later used for authentication?
Field insight
A privileged group change by a real admin is not automatically benign.
Compromised admin accounts still generate legitimate-looking directory changes.
The investigation should validate intent, not just permissions.
12. Hunting use case: identity alerts connected to a user or device
Use this when pivoting from an incident to all related identity evidence.
let Lookback = 14d;
let EntityToInvestigate = "[email protected]";
AlertEvidence
| where Timestamp > ago(Lookback)
| where EntityType in ("User", "Machine", "Ip")
| where EvidenceRole in ("Impacted", "Related")
| where AccountUpn =~ EntityToInvestigate
or DeviceName =~ EntityToInvestigate
or RemoteIP =~ EntityToInvestigate
| join kind=inner (
AlertInfo
| where Timestamp > ago(Lookback)
| project AlertId, Title, Severity, Category, ServiceSource, DetectionSource, Timestamp
) on AlertId
| project Timestamp, Title, Severity, Category, ServiceSource, DetectionSource, EntityType, EvidenceRole, AccountUpn, DeviceName, RemoteIP
| order by Timestamp desc
How to use it
This helps analysts see whether an entity appears in other alerts.
It is useful for:
- scoping,
- prioritization,
- case management,
- and escalation.
Consultant callout
One identity alert may not look severe alone.
But if the same user appears in endpoint, identity, and cloud app alerts, the priority changes.
That is the value of XDR.
13. Hunting use case: suspicious directory changes by non-PAW sources
Use this when assessing whether privileged changes came from expected administrative workstations.
IdentityDirectoryEvents
| where Timestamp > ago(30d)
| where ActionType has_any ("Account modified", "Group Membership changed", "User Account Changed", "Computer Account Changed")
| where isnotempty(DeviceName)
| summarize ChangeCount=count(),
FirstSeen=min(Timestamp),
LastSeen=max(Timestamp),
ChangedObjects=dcount(TargetAccountDisplayName)
by AccountName, DeviceName, ActionType
| where ChangeCount > 5 or ChangedObjects > 3
| order by ChangeCount desc
How to use it
This is a starting point for identifying admin-like behavior from unexpected devices.
To make it production-ready, enrich it with:
- a PAW device list,
- privileged admin account list,
- known automation accounts,
- approved management servers,
- maintenance windows.
Field insight
If privileged directory changes are regularly performed from normal user workstations, do not only tune the alert.
Fix the admin model.
MDI can detect suspicious behavior, but it cannot compensate for poor Tier 0 discipline.
14. Response actions: containment must be designed before the incident
MDI supports response actions through the Defender portal, but response effectiveness depends on permissions, roles, approvals, and operating model.
Possible actions include:
- disable user accounts,
- enable accounts when appropriate,
- force password reset,
- revoke Entra ID sessions,
- mark user as compromised,
- deactivate Okta accounts where integrated,
- set Okta account risk level where integrated,
- trigger PAM-integrated password reset actions,
- track actions in Action Center.
These actions are powerful because identity compromise spreads quickly.
But they also require governance.
What usually goes wrong
The SOC sees a high-confidence identity alert but cannot act.
Reasons include:
- SOC only has read-only permissions,
- action account is not configured,
- Entra roles are missing,
- AD write permissions are missing,
- change approval is unclear,
- account disablement requires identity team approval,
- executives are excluded from response,
- or response actions were never tested.
Consultant callout
Do not wait for a real incident to discover that nobody can disable a compromised account.
During deployment or assessment, test response readiness with safe accounts.
Validate:
- who can perform the action,
- which systems are affected,
- where the action is logged,
- how rollback works,
- how Action Center tracks it,
- and how identity engineering is notified.
15. Automated Investigation and Response
MDI can participate in Automated Investigation and Response through Defender XDR.
AIR helps analyze and remediate threats across domains.
In practice, this means identity alerts can contribute to automated investigation chains that include endpoint and other Defender signals.
Field insight
AIR is useful, but it should not replace human understanding.
For identity incidents, analysts still need to answer:
- Was this a real compromise?
- Which credential material may be exposed?
- Which accounts need rotation?
- Which systems were touched?
- Was privilege escalated?
- Was persistence created?
- Did the attacker pivot to cloud?
- Which posture issue enabled the path?
Automation can help contain.
It does not replace root cause analysis.
16. Automatic Attack Disruption
Automatic Attack Disruption is one of the strongest examples of MDI’s value inside Defender XDR.
In high-confidence scenarios, Defender XDR can automatically interrupt an active attack chain.
For identity compromise, this may include disabling a compromised user account in Active Directory, which then syncs to Microsoft Entra ID.
That is powerful because it cuts across the hybrid identity boundary.
Why this matters
Attackers move fast.
Manual response often moves slowly.
If XDR has enough confidence, automatic disruption can reduce attacker dwell time and stop lateral movement before the SOC completes manual triage.
What to watch for
Automatic disruption should be understood, tested, and governed.
Security architects should know:
- which scenarios can trigger disruption,
- which identities are eligible,
- how exclusions are handled,
- how actions appear in Action Center,
- how identity teams are notified,
- how rollback works,
- and how business-critical accounts are protected without creating blind spots.
Consultant callout
Automatic disruption is not a reason to weaken detection review.
It is a reason to improve response governance.
The worst outcome is not automation.
The worst outcome is automation nobody understands.
17. Scenario response: credential compromise
Credential compromise is one of the most common identity incident types.
MDI may detect signals such as:
- brute force,
- password spray,
- suspicious Kerberos activity,
- Pass-the-Hash,
- Pass-the-Ticket,
- unusual logon behavior,
- or credential-based lateral movement.
Investigation priorities
Start with:
- impacted identity,
- source device,
- authentication protocol,
- successful vs failed logons,
- target systems,
- privilege level,
- cloud sign-in risk,
- recent endpoint alerts,
- recent password changes,
- MFA events,
- and timeline before and after compromise.
Response priorities
Typical actions include:
- disable the account,
- force password reset,
- revoke cloud sessions,
- mark user as compromised,
- review MFA registration,
- check recent group changes,
- identify systems accessed,
- rotate exposed service credentials if relevant,
- and allow Automatic Attack Disruption where triggered.
What to watch for
Do not reset the password too early if the attacker still has active sessions or tokens.
For hybrid compromise, password reset alone may not be enough.
Use session revocation where applicable.
Also check whether the account is used by services. Disabling a service account without planning may cause outages.
Field insight
The key credential compromise question is:
“What did the attacker do with the credential before we contained it?”
The answer comes from the identity timeline, logon events, endpoint data, and cloud activity.
18. Scenario response: lateral movement
Lateral movement often appears as suspicious authentication or remote access behavior.
MDI may detect:
- Pass-the-Hash,
- Pass-the-Ticket,
- Overpass-the-Hash,
- NTLM relay,
- suspicious SMB enumeration,
- remote execution attempts,
- or abnormal authentication paths.
Investigation priorities
Ask:
- What was the initial source device?
- Which account moved?
- Which authentication protocol was used?
- Which targets were accessed?
- Was the identity privileged?
- Was this account normally used from that source?
- Did MDE see remote execution?
- Did the attacker reach Tier 0 systems?
- Was lateral movement blocked or successful?
- Are there multiple target devices?
Response priorities
Actions may include:
- isolate or investigate the source endpoint through MDE,
- disable or reset the compromised identity,
- revoke sessions,
- remove active SMB/RDP exposure where needed,
- reset credentials used on touched systems,
- review local admin relationships,
- review lateral movement paths,
- restrict access to domain controllers,
- and validate whether privileged systems were reached.
Field insight
Lateral movement is where MDE and MDI must be used together.
MDI can show identity movement.
MDE can show process and device activity.
If you only look at one side, you may miss either the identity path or the execution mechanism.
19. Scenario response: domain controller compromise
Domain controller compromise is a Tier 0 incident.
Treat it differently from normal user compromise.
MDI may surface DC compromise through alerts related to:
- DCSync,
- DCShadow,
- suspicious service creation,
- Skeleton Key,
- Golden Ticket,
- abnormal replication,
- suspicious remote execution,
- or privileged directory modifications.
Investigation priorities
Immediately determine:
- which DC was involved,
- which identity performed the action,
- source device,
- replication activity,
- privileged group changes,
- GPO modifications,
- service creation,
- suspicious logons to DCs,
- AD CS or AD FS involvement,
- KRBTGT exposure possibility,
- and whether persistence exists.
Response priorities
Possible actions include:
- contain compromised accounts,
- restrict remote access to DCs,
- investigate source hosts,
- remove unauthorized DCSync rights,
- revert malicious GPO changes,
- remove suspicious services,
- patch vulnerable DCs,
- rotate exposed privileged credentials,
- review local admin exposure,
- validate AD replication health,
- and involve identity engineering immediately.
Common failure mode
Customers treat DC compromise as a normal SOC ticket.
That is wrong.
A domain controller is not just another server.
If the attacker controls a DC or DC-equivalent privileges, they may control the domain.
Consultant callout
For DC compromise, the response should be led as a Tier 0 incident with identity engineering, infrastructure, SOC, and security architecture involved.
The question is no longer:
“Which user was compromised?”
The question becomes:
“Can we still trust the domain?”
20. Scenario response: Golden Ticket
Golden Ticket detection is one of the most serious MDI scenarios.
It suggests forged Kerberos Ticket Granting Tickets and possible KRBTGT compromise.
Investigation priorities
Ask:
- Which account used the suspicious ticket?
- Which device presented it?
- Which domain controller observed it?
- What anomaly was detected?
- Was KRBTGT material potentially exposed?
- Was there prior DCSync activity?
- Was there Domain Admin compromise?
- Were there suspicious logons to DCs?
- Were privileged groups modified?
- Are there other persistence mechanisms?
Response priorities
For confirmed Golden Ticket activity:
- investigate how KRBTGT compromise occurred,
- identify Domain Admin or replication-rights compromise,
- check for DCSync,
- check for DC compromise,
- check for persistence,
- reset KRBTGT password twice,
- wait at least 10 hours between resets,
- rotate exposed privileged credentials,
- validate Kerberos ticket lifetimes,
- and monitor for continued forged ticket activity.
Why the double KRBTGT reset matters
Resetting KRBTGT once is not enough to fully invalidate all forged ticket scenarios.
The supported response requires resetting it twice, with appropriate waiting time between resets so existing Kerberos tickets can expire or be invalidated.
Field insight
A Golden Ticket alert is not the beginning of the incident.
It is usually evidence that the attacker already reached deep privilege.
The real investigation is backward:
“How did they get enough access to forge this?”
21. MDI as posture intelligence
MDI is not only detection technology.
It also contributes to identity posture management.
This is where security architects should pay close attention.
MDI can help identify systemic risks such as:
- stale accounts,
- unsecure Kerberos delegation,
- unmonitored domain controllers,
- risky lateral movement paths,
- local admin exposure on sensitive systems,
- weak password exposure,
- sensitive group changes,
- GPO modification risks,
- AD CS exposure,
- and Tier 0 monitoring gaps.
Lateral Movement Paths
Lateral Movement Path analysis helps visualize routes an attacker could take from a lower-privileged account or system toward a sensitive asset.
This matters because many incidents are not caused by one catastrophic misconfiguration.
They are caused by chains.
Example:
1
2
3
4
5
6
7
8
9
User workstation
↓ local admin relationship
Management server
↓ cached privileged session
Admin account
↓ group membership
Sensitive server
↓ domain privilege
Domain Admin path
MDI can help expose these paths so teams can reduce them before compromise.
Consultant callout
Lateral Movement Paths should not only be reviewed after incidents.
They should be part of recurring identity posture review.
The best time to remove an attack path is before an attacker uses it.
22. Secure Score and Identity Security Posture Management
MDI contributes identity-related posture recommendations into Microsoft Secure Score and identity security posture views.
Examples include:
- resolving unsecure Kerberos delegation,
- removing unnecessary local admins on identity assets,
- addressing unmonitored identity servers,
- removing risky DCSync permissions,
- hardening domain controller exposure,
- improving password hygiene,
- and reducing insecure configurations.
Field insight
Security leadership often wants scores.
Engineers often want evidence.
MDI posture data can serve both.
For leadership:
“Identity exposure is trending down.”
For engineers:
“These specific accounts, servers, permissions, and paths need remediation.”
The consultant’s job is to connect both views without turning Secure Score into a vanity metric.
23. Identity risk and prioritization
MDI can enrich identities with risk context.
Risk is influenced by factors such as:
- privileged role,
- sensitivity,
- alert history,
- exposure,
- lateral movement path involvement,
- and cloud identity signals where available.
This helps analysts prioritize.
A suspicious event involving a normal user is one thing.
The same event involving:
- a Domain Admin,
- Entra Connect account,
- AD FS service account,
- AD CS admin,
- Tier 0 operator,
- or sensitive service account
is very different.
What to watch for
Sensitive identities must be correctly tagged and maintained.
If the environment does not identify sensitive users, service accounts, PAWs, and Tier 0 assets, MDI and XDR correlation lose important prioritization context.
Consultant callout
Entity tagging is not cosmetic.
It affects investigation quality.
A well-tagged environment helps analysts understand impact faster.
24. Reporting and leadership value
MDI also provides reporting value for different audiences.
Auditors
Relevant outputs include:
- sensitive group modification reports,
- clear-text password exposure reports,
- summary reports,
- health issue history,
- Advanced Hunting data,
- RBAC scoping review.
Security leadership
Relevant views include:
- Identity Security Dashboard,
- Coverage and Maturity views,
- identity risk trends,
- identity security initiatives,
- deployment status,
- posture trends.
Risk assessors
Relevant capabilities include:
- Identity Security Posture Management,
- Lateral Movement Path analysis,
- Identity Risk Score,
- Domain Investigation views,
- Password Protection views.
Field insight
Do not present MDI reporting as “more dashboards.”
Present it as identity risk evidence.
The strongest executive message is:
“Here are the identity paths that could lead to domain compromise, and here is how we are reducing them.”
25. Case management and classification
MDI alerts should feed into a disciplined SOC classification process.
Recommended classifications include:
- True Positive,
- Benign True Positive,
- False Positive.
These categories matter.
True Positive
The alert represents malicious or unauthorized activity.
Action:
- contain,
- investigate scope,
- remediate root cause,
- document lessons learned.
Benign True Positive
The alert correctly identified suspicious-looking behavior, but the activity was authorized.
Example:
- approved scanner,
- approved admin script,
- planned maintenance,
- red team activity.
Action:
- document evidence,
- consider narrow tuning,
- avoid broad exclusion.
False Positive
The alert does not represent the behavior it claims or is technically incorrect in context.
Action:
- validate evidence,
- tune carefully,
- improve telemetry,
- review NNR or baseline issues.
Common failure mode
Many teams classify everything non-malicious as False Positive.
That is wrong.
A scanner triggering reconnaissance detection is often a Benign True Positive.
The detection worked.
The activity was just authorized.
That distinction helps preserve confidence in MDI.
26. Playbook structure for SOC teams
A practical MDI playbook should include the following phases.
Phase 1: Incident intake
- Start from the Defender XDR incident.
- Review severity.
- Identify impacted entities.
- Review all correlated alerts.
- Confirm whether MDI is one signal or the primary signal.
Phase 2: Identity story reconstruction
- Open Alert Story.
- Review Alert Graph.
- Pivot to Identity Timeline.
- Expand the time range.
- Filter by protocol and activity type.
- Look for reconnaissance, credential access, lateral movement, and modifications.
Phase 3: Evidence validation
- Validate source device.
- Check NNR certainty.
- Review domain controller evidence.
- Confirm user context.
- Review related endpoint evidence.
- Check cloud sign-in risk.
- Identify sensitive asset involvement.
Phase 4: Hunting and scoping
- Query
IdentityLogonEvents. - Query
IdentityQueryEvents. - Query
IdentityDirectoryEvents. - Join with
AlertInfoandAlertEvidence. - Search for related users, devices, IPs, groups, and domains.
- Identify whether the behavior occurred elsewhere.
Phase 5: Containment
- Disable compromised accounts where appropriate.
- Revoke sessions.
- Force password reset.
- Isolate endpoint through MDE if needed.
- Restrict access to sensitive systems.
- Allow or review Automatic Attack Disruption actions.
Phase 6: Eradication and recovery
- Remove persistence.
- Revert unauthorized directory changes.
- Reset exposed credentials.
- Remove risky permissions.
- Patch affected systems.
- Harden protocols.
- Review Tier 0 access.
Phase 7: Posture remediation
- Review lateral movement paths.
- Review Secure Score recommendations.
- Fix risky delegation.
- Remove unnecessary local admins.
- Monitor sensitive group changes.
- Improve NNR and sensor health.
- Update tuning rules.
27. What mature MDI operations look like
A mature MDI operating model has clear ownership.
Identity engineers own
- sensor coverage,
- sensor health,
- DSA/gMSA configuration,
- audit policy,
- NNR dependencies,
- AD FS coverage,
- AD CS coverage,
- Entra Connect coverage,
- response-action permissions,
- Tier 0 infrastructure readiness.
SOC analysts own
- incident triage,
- Alert Story review,
- Alert Graph review,
- Identity Timeline investigation,
- Advanced Hunting,
- alert classification,
- evidence validation,
- response execution,
- case notes,
- escalation.
Detection engineers own
- hunting content,
- detection validation,
- tuning rules,
- false-positive analysis,
- test mode planning,
- baseline-aware testing,
- identity threat queries,
- cross-domain correlation.
Security architects own
- Zero Trust alignment,
- Tier 0 design,
- privileged access model,
- lateral movement reduction,
- Secure Score prioritization,
- identity risk strategy,
- XDR integration model,
- response governance.
Field insight
MDI fails operationally when every team thinks another team owns it.
It is an identity product, an XDR signal source, a SOC investigation tool, and a posture engine.
That means ownership must be shared but clearly defined.
28. Final consultant framing
When explaining MDI operations to a customer, I would avoid saying:
“When MDI raises an alert, the SOC should investigate it.”
That is too generic.
A stronger framing is:
“MDI alerts should be investigated as identity evidence inside Defender XDR incidents. Analysts should start from the incident, reconstruct the attack sequence through Alert Story, Alert Graph, and Identity Timeline, validate raw evidence and attribution, use Advanced Hunting to scope related activity, execute response actions where appropriate, and feed lessons learned into identity posture remediation.”
That is the operating model.
MDI’s value is not only that it detects identity attacks.
Its value is that it helps answer five production questions:
- What happened?
- Which identity and device were involved?
- How far did the attacker move?
- What can we contain now?
- Which identity path must be removed so this does not happen again?
That is why MDI belongs inside the Defender XDR learning journey.
It is not just a sensor on a domain controller.
It is the identity layer that helps turn authentication, directory, protocol, and privilege activity into investigation, response, and risk reduction.
Series conclusion
Across this three-part series, the main message is consistent:
Microsoft Defender for Identity is the on-premises and hybrid identity signal engine inside Microsoft Defender XDR.
In Part 1, we looked at architecture and telemetry.
The key lesson was:
Detection quality starts with sensor coverage, event collection, ETW, directory enrichment, NNR, and Tier 0 visibility.
In Part 2, we looked at detection logic.
The key lesson was:
MDI detections are a mix of deterministic patterns and behavioral baselines. Testing and tuning must respect visibility, maturity, and context.
In Part 3, we looked at operations.
The key lesson is:
MDI alerts become valuable when they are investigated as part of Defender XDR incidents, enriched with identity timelines and hunting, connected to response actions, and used to reduce attack paths.
That is the consultant-grade view.
Not “MDI detects AD attacks.”
But:
MDI turns hybrid identity behavior into security intelligence that Defender XDR can use to detect, investigate, disrupt, and reduce identity-driven attack paths.