Edit

Share via


Remediation actions in Microsoft Defender for Identity

Applies to:

  • Microsoft Defender for Identity
  • Microsoft Defender XDR

Microsoft Defender for Identity allows you to respond to compromised users by disabling their accounts or resetting their password. After taking action on users, you can check on the activity details in the action center.

The response actions on users are available directly from the user page, the user side panel, the advanced hunting page, or in the action center.

Watch the following video to learn more about remediation actions in Defender for Identity:


Prerequisites

To perform any of the supported actions, you need to:

  • Configure the account that Microsoft Defender for Identity will use to perform them. By default, the Microsoft Defender for Identity sensor installed on a domain controller will impersonate the LocalSystem account of the domain controller and perform the above actions. However, you can change this default behavior by setting up a gMSA account and scope the permissions as you need.

  • Be signed into Microsoft Defender XDR to with relevant permissions. For Defender for Identity actions, you'll need a custom role with Response (manage) permissions. For more information, see Create custom roles with Microsoft Defender XDR Unified RBAC.

Supported actions

The following Defender for Identity actions can be performed on Identities:

  • Disable user in Active Directory - This temporarily prevents a user from signing in to the on-premises network. This can help prevent compromised users from moving laterally and attempting to exfiltrate data or further compromise the network.

  • Reset user password - This prompts the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts.

  • Mark User Compromised - The user's risk level is set to High.

  • Suspend User in Entra ID - Block new sign-ins and access to cloud resources.

  • Require User to Sign In Again - Revoke a user's active sessions.

  • Suspend User in Okta - Temporarily disables a user account. This action can be used when a legit user account was found to be compromised and needed to be disabled.

  • Deactivate User in Okta - This action can be used when a non-legit malicious account was detected, to deactivate the account permanently.

Depending on your Microsoft Entra ID roles, you might see additional Microsoft Entra ID actions, such as requiring users to sign in again and confirming a user as compromised. For more information, see Remediate risks and unblock users.

Roles and Permissions

Action XDR RBAC permissions
Mark User Compromised - Global Administrator
- Security Administrator
Suspend User in Entra ID - Global Administrator
Require User to Sign In Again - Global Administrator
Disable/Enable User in Active Directory Refer to Required permissions Defender for Identity in Microsoft Defender XDR
Force Password Reset in Active Directory Refer to Required permissions Defender for Identity in Microsoft Defender XDR
Suspend User in Okta A custom role defined with permissions for Response (manage) Or One of the following Microsoft Entra roles:
- Security Operator
- Security Administrator
- Global Administrator
Deactivate User in Okta A custom role defined with permissions for Response (manage) Or One of the following Microsoft Entra roles:
- Security Operator
- Security Administrator
- Global Administrator

Remediation actions in Defender for Identity

See also

Microsoft Defender for Identity action accounts