Configure Microsoft Defender for Identity sensor settings

In this article, you'll learn how to correctly configure Microsoft Defender for Identity sensor settings to start seeing data. You'll need to do additional configuration and integration to take advantage of Defender for Identity's full capabilities.

View and configure sensor settings

After the Defender for Identity sensor is installed, do the following to view and configure Defender for Identity sensor settings.

  1. In Microsoft 365 Defender, go to Settings and then Identities.

    The option of Identities on the Settings page

  2. Select the Sensors page, which displays all of your Defender for Identity sensors. For each sensor, you'll see its name, its domain membership, the version number, if updates should be delayed, the service status, sensor status, health status, the number of health issues, and when the sensor was created. For details about each column, see Sensor details.

    Sensor page.

    Note

    For information about how to configure delayed updates, see Delayed sensor update.

  3. If you select Filters, you can choose which filters will be available. Then with each filter, you can choose which sensors to display.

    Sensor filters.

    The Filtered sensor

  4. If you select one of the sensors, a pane will display with information about the sensor and its health status.

    Sensor details.

  5. If you select Manage sensor, a pane will open where you can configure the sensor details.

    The Manage sensor option

    The page on which you configure settings for the sensor

    You can configure the following sensor details:

    • Description: Enter a description for the Defender for Identity sensor (optional).

    • Domain Controllers (FQDN): This is required for the Defender for Identity standalone and AD FS sensors. (It can't be changed for the Defender for Identity sensor.) Enter the complete FQDN of your domain controller and select the plus sign to add it to the list. For example, DC1.domain1.test.local.

      Add domain controller.

    The following information applies to the servers you enter in the Domain Controllers list:

    • All domain controllers whose traffic is being monitored via port mirroring by the Defender for Identity standalone sensor must be listed in the Domain Controllers list. If a domain controller isn't listed in the Domain Controllers list, detection of suspicious activities might not function as expected.

    • At least one domain controller in the list should be a global catalog. This enables Defender for Identity to resolve computer and user objects in other domains in the forest.

    • Capture Network adapters (required):

    • For Defender for Identity sensors, all network adapters that are used for communication with other computers in your organization.

    • For Defender for Identity standalone sensor on a dedicated server, select the network adapters that are configured as the destination mirror port. These network adapters receive the mirrored domain controller traffic.

  6. In the Sensors page, you can export your list of sensors to a .csv file by selecting Export.

    The Export list of sensors

Validate installations

To validate that the Defender for Identity sensor has been successfully deployed, check the following:

  1. Check that the service named Azure Advanced Threat Protection sensor is running. After you save the Defender for Identity sensor settings, it might take a few seconds for the service to start.

  2. If the service doesn't start, review the "Microsoft.Tri.sensor-Errors.log" file located in the following default folder, "%programfiles%\Azure Advanced Threat Protection sensor\Version X\Logs".

    Note

    The version of Defender for Identity updates frequently, to check the latest version, in the Defender for Identity portal, go to Configuration and then About.

  3. Verify Defender for Identity connectivity on any domain device using the following steps:

    1. Open a command prompt
    2. Type nslookup
    3. Type server and the FQDN or IP address of the domain controller where the Defender for Identity sensor is installed. For example, server contosodc.contoso.azure
    4. Type ls -d contoso.azure
      • Make sure to replace contosodc.contoso.azure and contoso.azure with the FQDN of your Defender for Identity sensor and domain name respectively.
    5. Repeat the previous two steps for each sensor you wish to test.
    6. From the Defender for Identity console, open the entity profile for the computer you ran the connectivity test from.
    7. Sign in to the Microsoft 365 Defender portal. In the top middle search box, type in the name of the user you used to perform the commands detailed above, select the name in the results to view the user's page and all its related activities and alerts.

    Note

    If the domain controller you wish to test is your first deployed sensor, wait at least 15 minutes to allow the database backend to finish initial deployment of the necessary microservices before you attempt to verify the related logical activity for that domain controller.

To validate that the Defender for Identity sensor has been successfully deployed on an AD FS server, check the following:

  1. Check that the service named Azure Advanced Threat Protection sensor is running. After you save the Defender for Identity sensor settings, it might take a few seconds for the service to start.

  2. If the service doesn't start, review the "Microsoft.Tri.sensor-Errors.log" file located in the following default folder, "%programfiles%\Azure Advanced Threat Protection sensor\Version X\Logs".

    Note

    The version of Defender for Identity updates frequently, to check the latest version, in the Defender for Identity portal, go to Configuration and then About.

  3. Use AD FS to authenticate a user to any application.

  4. Verify that the AD FS authentication was observed by Defender for Identity using the following steps:

    1. Sign in to the Microsoft 365 Defender portal. From the navigation menu, select Hunting and then Advanced Hunting. In the Query pane, type in and run the following query:

      IdentityLogonEvents | where Protocol contains 'Adfs'
      
    2. The results pane should include a list of events with a LogonType of Logon with ADFS authentication. You can select a specific row and see additional details in the Inspect Record left pane.

    See results of ADFS logon advanced hunting query.

Next steps

Now that you've configured the initial configuration steps, you can configure more settings. Go to any of the pages below for more information: