What's new in Microsoft Defender for Identity
This article is updated frequently to let you know what's new in the latest releases of Microsoft Defender for Identity.
What's new scope and references
Defender for Identity releases are deployed gradually across customer tenants. If there's a feature documented here that you don't see yet in your tenant, check back later for the update.
For more information, see also:
- What's new in Microsoft Defender XDR
- What's new in Microsoft Defender for Endpoint
- What's new in Microsoft Defender for Cloud Apps
For updates about versions and features released six months ago or earlier, see the What's new archive for Microsoft Defender for Identity.
October 2024
MDI is expanding coverage with new 10 Identity posture recommendations (preview)
The new Identity security posture assessments (ISPMs) can help customers monitor misconfiguration by watching for weak spots and reduce the risk of potential attack on on-premises infrastructure.
These new identity recommendations, as part of Microsoft Secure Score, are new security posture reports related to Active Directory infrastructure and Group policy Objects:
Additionally, we updated the existing recommendation of "Modify unsecure Kerberos delegations to prevent impersonation" to include indication of Kerberos Constrained Delegation with Protocol Transition to a privileged service.
August 2024
New Microsoft Entra Connect sensor:
As part of our ongoing effort to enhance Microsoft Defender for Identity coverage in hybrid identity environments, we have introduced a new sensor for Microsoft Entra Connect servers. Additionally, we've released new hybrid security detections and new identity posture recommendations specifically for Microsoft Entra Connect, helping customers stay protected and mitigate potential risks.
New Microsoft Entra Connect Identity posture recommendations:
- Rotate password for Microsoft Entra Connect connector account
- A compromised Microsoft Entra Connect connector account (AD DS connector account, commonly shown as MSOL_XXXXXXXX) can grant access to high-privilege functions like replication and password resets, allowing attackers to modify synchronization settings and compromise security in both cloud and on-premises environments as well as offering several paths for compromising the entire domain. In this assessment we recommend customers change the password of MSOL accounts with the password last set over 90 days ago. For more information click here.
- Remove unnecessary replication permissions for Microsoft Entra Connect Account
- By default, the Microsoft Entra Connect connector account has extensive permissions to ensure proper synchronization (even if they aren't actually required). If Password Hash Sync isn't configured, it’s important to remove unnecessary permissions to reduce the potential attack surface. For more information click here
- Change password for Microsoft Entra seamless SSO account configuration
- This report lists all Microsoft Entra seamless SSO computer accounts with password last set over 90 days ago. The password for the Azure SSO computer account isn't automatically changed every 30 days. If an attacker compromises this account, they can generate service tickets for the AZUREADSSOACC account on behalf of any user and impersonate any user in the Microsoft Entra tenant that is synchronized from Active Directory. An attacker can use this to move laterally from Active Directory into Microsoft Entra ID. For more information click here.
New Microsoft Entra Connect detections:
- Suspicious Interactive Logon to the Microsoft Entra Connect Server
- Direct logins to Microsoft Entra Connect servers are highly unusual and potentially malicious. Attackers often target these servers to steal credentials for broader network access. Microsoft Defender for Identity can now detect abnormal logins to Microsoft Entra Connect servers, helping you identify and respond to these potential threats faster. It's specifically applicable when the Microsoft Entra Connect server is a standalone server and not operating as a Domain Controller.
- User Password Reset by Microsoft Entra Connect Account
- The Microsoft Entra Connect connector account often holds high privileges, including the ability to reset user’s passwords. Microsoft Defender for Identity now has visibility into those actions and will detect any usage of those permissions that were identified as malicious and non-legitimate. This alert will be triggered only if the password writeback feature is disabled.
- Suspicious writeback by Microsoft Entra Connect on a sensitive user
- While Microsoft Entra Connect already prevents writeback for users in privileged groups, Microsoft Defender for Identity expands this protection by identifying additional types of sensitive accounts. This enhanced detection helps prevent unauthorized password resets on critical accounts, which can be a crucial step in advanced attacks targeting both cloud and on-premises environments.
Additional improvements and capabilities:
- New activity of any failed password reset on a sensitive account available in the ‘IdentityDirectoryEvents’ table in Advanced Hunting. This can help customers track failed password reset events and create custom detection based on this data.
- Enhanced accuracy for the DC sync attack detection.
- New health issue for cases where the sensor is unable to retrieve the configuration from the Microsoft Entra Connect service.
- Extended monitoring for security alerts, such as PowerShell Remote Execution Detector, by enabling the new sensor on Microsoft Entra Connect servers.
Learn more about the new sensor
Updated DefenderForIdentity PowerShell module
The DefenderForIdentity PowerShell module has been updated, incorporating new functionality and addressing several bug fixes. Key improvements include:
- New
New-MDIDSA
Cmdlet: Simplifies creation of service accounts, with a default setting for Group Managed Service Accounts (gMSA) and an option to create standard accounts. - Automatic PDCe Detection: Improves Group Policy Object (GPO) creation reliability by automatically targeting the Primary Domain Controller Emulator (PDCe) for most Active Directory operations.
- Manual Domain Controller Targeting: New Server parameter for
Get/Set/Test-MDIConfiguration
cmdlets, allowing you to specify a domain controller for targeting instead of the PDCe.
For more information, see:
- DefenderForIdentity PowerShell module (PowerShell Gallery)
- DefenderForIdentity PowerShell reference documentation
July 2024
6 New detections are new in public preview:
- Possible NetSync attack
- NetSync is a module in Mimikatz, a post-exploitation tool, that requests the password hash of a target device's password by pretending to be a domain controller. An attacker might be performing malicious activities inside the network using this feature to gain access to the organization's resources.
- Possible takeover of a Microsoft Entra seamless SSO account
- A Microsoft Entra seamless SSO (single sign-on) account object, AZUREADSSOACC, was modified suspiciously. An attacker might be moving laterally from the on-premises environment to the cloud.
- Suspicious LDAP query
- A suspicious Lightweight Directory Access Protocol (LDAP) query associated with a known attack tool was detected. An attacker might be performing reconnaissance for later steps.
- Suspicious SPN was added to a user
- A suspicious service principal name (SPN) was added to a sensitive user. An attacker might be attempting to gain elevated access for lateral movement within the organization
- Suspicious creation of ESXi group
- A suspicious VMWare ESXi group was created in the domain. This might indicate that an attacker is trying to get more permissions for later steps in an attack.
- Suspicious ADFS authentication
- A domain-joined account signed in using Active Directory Federation Services (ADFS) from a suspicious IP address. An attacker might have stolen a user's credentials and is using it to move laterally in the organization.
Defender for Identity release 2.238
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
June 2024
Easily Go Hunt For user Information From the ITDR Dashboard
The Shield Widget provides a quick overview of the number of users in hybrid, cloud, and on-premises environments. This feature now includes direct links to the Advanced Hunting platform, offering detailed user information at your fingertips.
ITDR Deployment Health Widget Now Include Microsoft Entra Conditional Access and Microsoft Entra Private Access
Now you can view the license availability for Microsoft Entra Workload Conditional Access, Microsoft Entra User Conditional Access, and Microsoft Entra Private Access.
Defender for Identity release 2.237
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
May 2024
Defender for Identity release 2.236
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Defender for Identity release 2.235
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
April 2024
Easily detect CVE-2024-21427 Windows Kerberos Security Feature Bypass Vulnerability
To help customers better identify and detect attempts to bypass security protocols according to this vulnerability, we have added a new activity within Advanced Hunting that monitors Kerberos AS authentication.
With this data customers can now easily create their own custom detection rules within Microsoft Defender XDR and automatically trigger alerts for this type of activity
Access Defender XDR portal -> Hunting -> Advanced Hunting.
Now, you can copy our recommended query as provided below, and click on “Create detection rule”. Please be aware that our provided query also tracks failed logon attempts, which may generate information unrelated to a potential attack. Therefore, feel free to customize the query to suit your specific requirements.
IdentityLogonEvents
| where Application == "Active Directory"
| where Protocol == "Kerberos"
| where LogonType in("Resource access", "Failed logon")
| extend Error = AdditionalFields["Error"]
| extend KerberosType = AdditionalFields['KerberosType']
| where KerberosType == "KerberosAs"
| extend Spns = AdditionalFields["Spns"]
| extend DestinationDC = AdditionalFields["TO.DEVICE"]
| where Spns !contains "krbtgt" and Spns !contains "kadmin"
| project Timestamp, ActionType, LogonType, AccountUpn, AccountSid, IPAddress, DeviceName, KerberosType, Spns, Error, DestinationDC, DestinationIPAddress, ReportId
Defender for Identity release 2.234
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Defender for Identity release 2.233
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
March 2024
New read-only permissions for viewing Defender for Identity settings
Now you can configure Defender for Identity users with read-only permissions to view Defender for Identity settings.
For more information, see Required permissions Defender for Identity in Microsoft Defender XDR.
New Graph based API for viewing and managing Health issues
Now you can view and manage Microsoft Defender for Identity health issues through the Graph API
For more information, see Managing Health issues through Graph API.
Defender for Identity release 2.232
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Defender for Identity release 2.231
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
February 2024
Defender for Identity release 2.230
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
New security posture assessment for insecure AD CS IIS endpoint configuration
Defender for Identity has added the new Edit insecure ADCS certificate enrollment IIS endpoints (ESC8) recommendation in Microsoft Secure Score.
Active Directory Certificate Services (AD CS) supports certificate enrollment through various methods and protocols, including enrollment via HTTP using the Certificate Enrollment Service (CES) or the Web Enrollment interface (Certsrv). Insecure configurations of the CES or Certsrv IIS endpoints might create vulnerabilities to relay attacks (ESC8).
The new Edit insecure ADCS certificate enrollment IIS endpoints (ESC8) recommendation is added to other AD CS-related recommendations recently released. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that post risks to the entire organization, together with related detections.
For more information, see:
- Security assessment: Edit insecure ADCS certificate enrollment IIS endpoints (ESC8)
- Security posture assessments for AD CS sensors
- Microsoft Defender for Identity's security posture assessments
Defender for Identity release 2.229
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Enhanced user experience for adjusting alert thresholds (Preview)
The Defender for Identity Advanced Settings page is now renamed to Adjust alert thresholds and provides a refreshed experience with enhanced flexibility for adjusting alert thresholds.
Changes include:
We've removed the previous Remove learning period option, and added a new Recommended test mode option. Select Recommended test mode to set all threshold levels to Low, increasing the number of alerts, and sets all other threshold levels to read-only.
The previous Sensitivity level column is now renamed as Threshold level, with newly defined values. By default, all alerts are set to a High threshold, which represents the default behavior and a standard alert configuration.
The following table lists the mapping between the previous Sensitivity level values and the new Threshold level values:
Sensitivity level (previous name) | Threshold level (new name) |
---|---|
Normal | High |
Medium | Medium |
High | Low |
If you had specific values defined on the Advanced Settings page, we've transferred them to the new Adjust alert thresholds page as follows:
Advanced settings page configuration | New Adjust alert thresholds page configuration |
---|---|
Remove learning period toggled on | Recommended test mode toggled off. Alert threshold configuration settings remain the same. |
Remove learning period toggled off | Recommended test mode toggled off. Alert threshold configuration settings are all reset to their default values, with a High threshold level. |
Alerts are always triggered immediately if the Recommended test mode option is selected, or if a threshold level is set to Medium or Low, regardless of whether the alert's learning period has already completed.
For more information, see Adjust alert thresholds.
Device details pages now include device descriptions (Preview)
Microsoft Defender XDR now includes device descriptions on device details panes and device details pages. The descriptions are populated from the device's Active Directory Description attribute.
For example, on the device details side pane:
For more information, see Investigation steps for suspicious devices.
Defender for Identity release 2.228
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor, and the following new alerts:
- Account Enumeration reconnaissance (LDAP) (external ID 2437) (Preview)
- Directory Services Restore Mode Password Change (external ID 2438) (Preview)
January 2024
Defender for Identity release 2.227
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Timeline tab added for group entities
Now you can view Active Directory group entity-related activities and alerts from the last 180 days in Microsoft Defender XDR, such as group membership changes, LDAP queries and so on.
To access the group timeline page, select Open timeline on the group details pane.
For example:
For more information, see Investigation steps for suspicious groups.
Configure and validate your Defender for Identity environment via PowerShell
Defender for Identity now supports the new DefenderForIdentity PowerShell module, which is designed to help you configure and validate your environment for working with Microsoft Defender for Identity.
Using the PowerShell commands to avoid misconfigurations and save time and avoiding unnecessary load on your system.
We added the following procedures to the Defender for Identity documentation to help you use the new PowerShell commands:
- Change proxy configuration using PowerShell
- Configure, get, and test audit policies using PowerShell
- Generate a report with current configurations via PowerShell
- Test your DSA permissions and delegations via PowerShell
- Test service connectivity using PowerShell
For more information, see:
- DefenderForIdentity PowerShell module (PowerShell Gallery)
- DefenderForIdentity PowerShell reference documentation
Defender for Identity release 2.226
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Defender for Identity release 2.225
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
December 2023
Note
If you're seeing a decreased number of Remote code execution attempt alerts, see our updated September announcements, which include an update to the Defender for Identity detection logic. Defender for Identity continues to record the remote code execution activities as before.
New Identities area and dashboard in Microsoft 365 Defender (Preview)
Defender for Identity customers now have a new Identities area in Microsoft 365 Defender for information about identity security with Defender for Identity.
In Microsoft 365 Defender, select Identities to see any of the following new pages:
Dashboard: This page shows graphs and widgets to help you monitor identity threat detection and response activities. For example:
For more information, see Work with Defender for Identity's ITDR dashboard.
Health issues: This page is moved from the Settings > Identities area, and lists any current health issues for your general Defender for Identity deployment and specific sensors. For more information, see Microsoft Defender for Identity sensor health issues.
Tools: This page contains links to helpful information and resources when working with Defender for Identity. On this page, find links to documentation, specifically on the capacity planning tool, and the Test-MdiReadiness.ps1 script.
Defender for Identity release 2.224
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Security posture assessments for AD CS sensors (Preview)
Defender for Identity's security posture assessments proactively detect and recommend actions across your on-premises Active Directory configurations.
Recommended actions now include the following new security posture assessments, specifically for certificate templates and certificate authorities.
Certificate templates recommended actions:
- Prevent users to request a certificate valid for arbitrary users based on the certificate template (ESC1)
- Edit overly permissive certificate template with privileged EKU (Any purpose EKU or No EKU) (ESC2)
- Misconfigured enrollment agent certificate template (ESC3)
- Edit misconfigured certificate templates ACL (ESC4)
- Edit misconfigured certificate templates owner (ESC4)
Certificate authority recommended actions:
The new assessments are available in Microsoft Secure Score, surfacing security issues and severe misconfigurations that pose risks to the entire organization, alongside detections. Your score is updated accordingly.
For example:
For more information, see Microsoft Defender for Identity's security posture assessments.
Note
While certificate template assessments are available to all customers that have AD CS installed on their environment, certificate authority assessments are available only to customers who've installed a sensor on an AD CS server. For more information, see New sensor type for Active Directory Certificate Services (AD CS).
Defender for Identity release 2.223
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Defender for Identity release 2.222
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Defender for Identity release 2.221
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
November 2023
Defender for Identity release 2.220
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Defender for Identity release 2.219
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Identity timeline includes more than 30 days of data (Preview)
Defender for Identity is gradually rolling out extended data retentions on identity details to more than 30 days.
The identity details page Timeline tab, which includes activities from Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint, currently includes a minimum of 150 days and is growing. There might be some variation in data retention rates over the next few weeks.
To view activities and alerts on the identity timeline within a specific time frame, select the default 30 Days and then select Custom range. Filtered data from more than 30 days ago is shown for a maximum of seven days at a time.
For example:
For more information, see Investigate assets and Investigate users in Microsoft Defender XDR.
Defender for Identity release 2.218
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
October 2023
Defender for Identity release 2.217
This version includes the following improvements:
Summary report: The summary report is updated to include two new columns in the Health issues tab:
- Details: Additional information on the issue, such as a list of impacted objects or specific sensors on which the issue occurs.
- Recommendations: A list of recommended actions that can be taken to resolve the issue, or how to investigate the issue further.
For more information, see Download and schedule Defender for Identity reports in Microsoft Defender XDR (Preview).
Health issues: Added the The 'Remove learning period' toggle was automatically switched off for this tenant health issue
This version also includes bug fixes for cloud services and the Defender for Identity sensor.
Defender for Identity release 2.216
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
September 2023
Decreased number of alerts for Remote Code Execution Attempts
To better align Defender for Identity and Microsoft Defender for Endpoint alerts, we updated the detection logic for the Defender for Identity Remote code execution attempt detections.
While this change results in a decreased number of Remote code execution attempt alerts, Defender for Identity continues to record the remote code execution activities. Customers can continue to build their own advanced hunting queries and create custom detection policies.
Alert sensitivity settings and learning period enhancements
Some Defender for Identity alerts wait for a learning period before alerts are triggered, while building a profile of patterns to use when distinguishing between legitimate and suspicious activities.
Defender for Identity now provides the following enhancements for the learning period experience:
Administrators can now use the Remove learning period setting to configure the sensitivity used for specific alerts. Define the sensitivity as Normal to configure the Remove learning period setting as Off for the selected type of alert.
After you deploy a new sensor in a new Defender for Identity workspace, the Remove learning period setting is automatically turned On for 30 days. When 30 days are complete, the Remove learning period setting is automatically turned Off, and alert sensitivity levels are returned to their default functionality.
To have Defender for Identity use standard learning period functionality, where alerts aren't generated until the learning period is done, configure the Remove learning periods setting to Off.
If you'd previously updated the Remove learning period setting, your setting remains as you'd configured it.
For more information, see Advanced settings.
Note
The Advanced Settings page originally listed the Account enumeration reconnaissance alert under the Remove learning period options as configurable for sensitivity settings. This alert was removed from the list and is replaced by the Security principal reconnaissance (LDAP) alert. This user interface bug was fixed in November 2023.
Defender for Identity release 2.215
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Defender for Identity reports moved to the main Reports area
Now you can access Defender for Identity reports from Microsoft Defender XDR's main Reports area instead of the Settings area. For example:
For more information, see Download and schedule Defender for Identity reports in Microsoft Defender XDR (Preview).
Go hunt button for groups in Microsoft Defender XDR
Defender for Identity added the Go hunt button for groups in Microsoft Defender XDR. Users can use the Go hunt button to query for group-related activities and alerts during an investigation.
For example:
For more information, see Quickly hunt for entity or event information with go hunt.
Defender for Identity release 2.214
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Performance enhancements
Defender for Identity made internal improvements for latency, stability, and performance when transferring real-time events from Defender for Identity services to Microsoft Defender XDR. Customers should expect no delays in Defender for Identity data appearing in Microsoft Defender XDR, such as alerts or activities for advanced hunting.
For more information, see:
- Security alerts in Microsoft Defender for Identity
- Microsoft Defender for Identity's security posture assessments
- Proactively hunt for threats with advanced hunting in Microsoft Defender XDR
August 2023
Defender for Identity release 2.213
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Defender for Identity release 2.212
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
Defender for Identity release 2.211
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.
New sensor type for Active Directory Certificate Services (AD CS)
Defender for Identity now supports the new ADCS sensor type for a dedicated server with Active Directory Certificate Services (AD CS) configured.
You see the new sensor type identified in the Settings > Identities > Sensors page in Microsoft Defender XDR. For more information, see Manage and update Microsoft Defender for Identity sensors.
Together with the new sensor type, Defender for Identity also now provides related AD CS alerts and Secure Score reports. To view the new alerts and Secure Score reports, make sure that the required events are being collected and logged on your server. For more information, see Configure auditing for Active Directory Certificate Services (AD CS) events.
AD CS is a Windows Server role that issues and manages public key infrastructure (PKI) certificates in secure communication and authentication protocols. For more information, see What is Active Directory Certificate Services?
Defender for Identity release 2.210
This version includes improvements and bug fixes for cloud services and the Defender for Identity sensor.