Configure Microsoft Defender for Identity sensor settings
In this article, you'll learn how to correctly configure Microsoft Defender for Identity sensor settings to start seeing data. You'll need to do additional configuration and integration to take advantage of Defender for Identity's full capabilities.
View and configure sensor settings
After the Defender for Identity sensor is installed, do the following to view and configure Defender for Identity sensor settings.
In Microsoft 365 Defender, go to Settings and then Identities.
Select the Sensors page, which displays all of your Defender for Identity sensors. For each sensor, you'll see its name, its domain membership, the version number, if updates should be delayed, the service status, sensor status, health status, the number of health issues, and when the sensor was created. For details about each column, see Sensor details.
Note
For information about how to configure delayed updates, see Delayed sensor update.
If you select Filters, you can choose which filters will be available. Then with each filter, you can choose which sensors to display.
If you select one of the sensors, a pane will display with information about the sensor and its health status.
If you select Manage sensor, a pane will open where you can configure the sensor details.
You can configure the following sensor details:
Description: Enter a description for the Defender for Identity sensor (optional).
Domain Controllers (FQDN): This is required for the Defender for Identity standalone and AD FS sensors. (It can't be changed for the Defender for Identity sensor.) Enter the complete FQDN of your domain controller and select the plus sign to add it to the list. For example, DC1.domain1.test.local.
The following information applies to the servers you enter in the Domain Controllers list:
All domain controllers whose traffic is being monitored via port mirroring by the Defender for Identity standalone sensor must be listed in the Domain Controllers list. If a domain controller isn't listed in the Domain Controllers list, detection of suspicious activities might not function as expected.
At least one domain controller in the list should be a global catalog. This enables Defender for Identity to resolve computer and user objects in other domains in the forest.
Capture Network adapters (required):
For Defender for Identity sensors, all network adapters that are used for communication with other computers in your organization.
For Defender for Identity standalone sensor on a dedicated server, select the network adapters that are configured as the destination mirror port. These network adapters receive the mirrored domain controller traffic.
In the Sensors page, you can export your list of sensors to a .csv file by selecting Export.
Validate installations
To validate that the Defender for Identity sensor has been successfully deployed, check the following:
Check that the service named Azure Advanced Threat Protection sensor is running. After you save the Defender for Identity sensor settings, it might take a few seconds for the service to start.
If the service doesn't start, review the "Microsoft.Tri.sensor-Errors.log" file located in the following default folder, "%programfiles%\Azure Advanced Threat Protection sensor\Version X\Logs".
Note
The version of Defender for Identity updates frequently, to check the latest version, in the Defender for Identity portal, go to Configuration and then About.
Verify Defender for Identity connectivity on any domain device using the following steps:
- Open a command prompt
- Type
nslookup
- Type server and the FQDN or IP address of the domain controller where the Defender for Identity sensor is installed. For example,
server contosodc.contoso.azure
- Type
ls -d contoso.azure
- Make sure to replace contosodc.contoso.azure and contoso.azure with the FQDN of your Defender for Identity sensor and domain name respectively.
- Repeat the previous two steps for each sensor you wish to test.
- From the Defender for Identity console, open the entity profile for the computer you ran the connectivity test from.
- Sign in to the Microsoft 365 Defender portal. In the top middle search box, type in the name of the user you used to perform the commands detailed above, select the name in the results to view the user's page and all its related activities and alerts.
Note
If the domain controller you wish to test is your first deployed sensor, wait at least 15 minutes to allow the database backend to finish initial deployment of the necessary microservices before you attempt to verify the related logical activity for that domain controller.
To validate that the Defender for Identity sensor has been successfully deployed on an AD FS server, check the following:
Check that the service named Azure Advanced Threat Protection sensor is running. After you save the Defender for Identity sensor settings, it might take a few seconds for the service to start.
If the service doesn't start, review the "Microsoft.Tri.sensor-Errors.log" file located in the following default folder, "%programfiles%\Azure Advanced Threat Protection sensor\Version X\Logs".
Note
The version of Defender for Identity updates frequently, to check the latest version, in the Defender for Identity portal, go to Configuration and then About.
Use AD FS to authenticate a user to any application.
Verify that the AD FS authentication was observed by Defender for Identity using the following steps:
Sign in to the Microsoft 365 Defender portal. From the navigation menu, select Hunting and then Advanced Hunting. In the Query pane, type in and run the following query:
IdentityLogonEvents | where Protocol contains 'Adfs'
The results pane should include a list of events with a LogonType of Logon with ADFS authentication. You can select a specific row and see additional details in the Inspect Record left pane.
Related videos
Next steps
Now that you've configured the initial configuration steps, you can configure more settings. Go to any of the pages below for more information:
Feedback
Submit and view feedback for