Install the Microsoft Defender for Identity sensor

This article describes how to install the Microsoft Defender for Identity sensor, including a standalone sensor. The default recommendation is to use the UI. However:

Prerequisites

Before you start, make sure that you have:

Install the sensor using the UI

Perform the following steps on the domain controller or AD FS / AD CS server.

  1. Verify the machine has connectivity to the relevant Defender for Identity cloud service endpoint(s).

  2. Extract the installation files from the zip file. Installing directly from the zip file fails.

  3. Run Azure ATP sensor setup.exe with elevated privileges (Run as administrator) and follow the setup wizard.

  4. On the Welcome page, select your language and select Next. For example:

    Screenshot of the Defender for Identity standalone sensor installation language selection.

    The installation wizard automatically checks if the server is a domain controller, AD FS server, AC CS server, or a dedicated server.

    • If it's a domain controller / AD FS server / AD CS server, the Defender for Identity sensor is installed.
    • If it's a dedicated server, the Defender for Identity standalone sensor is installed.

    For example, for a Defender for Identity sensor, the following screen is displayed to let you know that a Defender for Identity sensor is installed on your dedicated server:

    Screenshot of the Defender for Identity sensor installation.

  5. Select Next.

    A warning is issued if the domain controller / AD FS server / AD CS or dedicated server doesn't meet the minimum hardware requirements for the installation.

    The warning doesn't prevent you from selecting Next and proceeding with the installation, which might still be the right option. For example, you need less room for data storage when installing a small lab test environment.

    For production environments, we highly recommend working with Defender for Identity's capacity planning guide to make sure your domain controllers or dedicated servers meet the necessary requirements.

  6. On the Configure the sensor screen, enter the installation path and the setup package access key. For example:

    Screenshot of the Defender for Identity sensor configuration screen.

    Enter the following details:

    • Installation path: The location where the Defender for Identity sensor is installed. By default the path is %programfiles%\Azure Advanced Threat Protection sensor. Leave the default value.
    • Access key: Retrieved from the Microsoft Defender portal in a previous step.
  7. Select Install. The following components are installed and configured during the installation of the Defender for Identity sensor:

    • Defender for Identity sensor service and Defender for Identity sensor updater service

    • Npcap OEM version 1.0

      Important

      • Npcap OEM version 1.0 is automatically installed if no other version of Npcap is present. If you already have Npcap installed due to other software requirements or for any other reason, it's important to ensure that it's version 1.0 or later and that it has been installed with the required settings for Defender for Identity.

Viewing sensor versions

Beginning with version 2.176, when installing the sensor from a new package, the sensor's version under Add/Remove Programs appears with the full version number, such as 2.176.x.y, instead of the static 2.0.0.0 that was previously shown.

The installed version continues to show even after automatic updates are run from the Defender for Identity cloud services.

View the sensor's real version in the Microsoft Defender XDR sensor settings page, in the executable path or in the file version.

Defender for Identity sensor silent installation

The Defender for Identity silent installation is configured to automatically restart the server at the end of the installation if necessary.

Make sure to schedule a silent installation only during a maintenance window. Because of a Windows Installer bug, the norestart flag can't be reliably used to make sure the server doesn't restart.

To track your deployment progress, monitor the Defender for Identity installer logs, which are located in %AppData%\Local\Temp.

Silent installation via a deployment system

When silently deploying the Defender for Identity sensor via System Center Configuration Manager or other software deployment system, we recommend creating two deployment packages:

  • Net Framework 4.7 or later, which might include rebooting the domain controller
  • The Defender for Identity sensor

Make the Defender for Identity sensor package dependent on the deployment of the .NET Framework package deployment. If needed, get the .NET Framework 4.7 offline deployment package.

Run a silent installation

Use the following commands to perform a fully silent install of the Defender for Identity sensor, using the access key copied in a previous step.

cmd.exe syntax:

"Azure ATP sensor Setup.exe" /quiet NetFrameworkCommandLineArguments="/q" AccessKey="<Access Key>"

Powershell syntax:

.\"Azure ATP sensor Setup.exe" /quiet NetFrameworkCommandLineArguments="/q" AccessKey="<Access Key>"

Note

When using the Powershell syntax, omitting the .\ preface results in an error that prevents silent installation.

Installation options:

Name Syntax Mandatory for silent installation? Description
Quiet /quiet Yes Runs the installer displaying no UI and no prompts.
Help /help No Provides help and quick reference. Displays the correct use of the setup command including a list of all options and behaviors.
NetFrameworkCommandLineArguments="/q" NetFrameworkCommandLineArguments="/q" Yes Specifies the parameters for the .NET Framework installation. Must be set to enforce the silent installation of .NET Framework.

Installation parameters:

Name Syntax Mandatory for silent installation? Description
InstallationPath InstallationPath="" No Sets the path for the installation of Defender for Identity Sensor binaries. Default path: %programfiles%\Azure Advanced Threat Protection Sensor
AccessKey AccessKey="\*\*" Yes Sets the access key that is used to register the Defender for Identity sensor with the Defender for Identity workspace.
AccessKeyFile AccessKeyFile="" No Sets the workspace Access Key from the provided text file path.
DelayedUpdate DelayedUpdate=true No Sets the sensor's update mechanism to delay the update for 72 hours from the official release of each service update. For more information, see Delayed sensor update.
LogsPath LogsPath="" No Sets the path for the Defender for Identity Sensor logs. Default path: %programfiles%\Azure Advanced Threat Protection Sensor

Examples:

Use the following commands to silently install the Defender for Identity sensor:

"Azure ATP sensor Setup.exe" /quiet NetFrameworkCommandLineArguments="/q" AccessKey="<access key value>"
"Azure ATP sensor Setup.exe" /quiet NetFrameworkCommandLineArguments="/q" AccessKeyFile="C:\Path\myAccessKeyFile.txt"

Run a silent installation with a proxy configuration

Use the following command to configure your proxy together with a silent installation:

"Azure ATP sensor Setup.exe" [/quiet] [/Help] [ProxyUrl="http://proxy.internal.com"] [ProxyUserName="domain\proxyuser"] [ProxyUserPassword="ProxyPassword"]`

Note

If you've previously configured your proxy using legacy options, including WiniNet or a registry key update, you'll need to make any changes with the same method you used originally. For more information, see Change proxy configuration using legacy methods.

Installation parameters:

Name Syntax Mandatory for silent installation? Description
ProxyUrl ProxyUrl="http://proxy.contoso.com:8080" No Specifies the proxy URL and port number for the Defender for Identity sensor.
ProxyUserName ProxyUserName="Contoso\ProxyUser" No If your proxy service requires authentication, define a user name in the DOMAIN\user format.
ProxyUserPassword ProxyUserPassword="P@ssw0rd" No Specifies the password for your proxy user name.

Credentials are encrypted and stored locally by the Defender for Identity sensor.

Tip

If you need to update your proxy settings later on, use PowerShell or the CLI. For more information, see Configure endpoint proxy and internet connectivity settings. We recommend creating and using a custom DNS A record for the proxy server, which you can use to change the proxy server's address when needed and use the hosts file for testing.

If you installed the sensor on an AD FS / AD CS server, or if you installed a standalone sensor, following the extra post-installation steps:

Next step