Skip to content

Commit 0476698

Browse files
authored
Merge pull request #4891 from DeCohen/WI473943-account-view-manual-account-correlation
Unified Identity Inventory - Account View and Manual Account Correlation
2 parents 790235d + b7479e0 commit 0476698

File tree

8 files changed

+196
-44
lines changed

8 files changed

+196
-44
lines changed

defender-for-identity/identity-inventory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ The **Identities** list offers a consolidated view of identities across Active D
6060

6161
- __Object ID__ – A unique identifier for the identity in Microsoft Entra ID.
6262

63-
- __Source__ – Indicates whether the identity is on-premises (originate from Active Directory), Cloud only (Entra ID) or Hybrid (synced from Azure Active Directory to Entra ID).
63+
- __Source__ – Indicates whether the identity is on-premises (originate from Active Directory), Cloud only (Entra ID) or Hybrid (synced from Azure Active Directory to Microsoft Entra ID).
6464

6565
- __Type__ – Specifies if the identity is a user account or service account.
6666

@@ -76,7 +76,7 @@ The **Identities** list offers a consolidated view of identities across Active D
7676

7777
- __Last updated__ – The timestamp of the most recent update to the identity's attributes in Active Directory.
7878

79-
Nondefault columns: Email, Microsoft Entra ID risk level and Cloud ID.
79+
Nondefault columns: Email, Microsoft Entra ID risk level, and Cloud ID.
8080

8181
> [!TIP]
8282
> To see all columns, you likely need to do one or more of the following steps:

defender-for-identity/investigate-assets.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.reviewer: LiorShapiraa
88

99
# Investigate assets
1010

11-
Microsoft Defender for Identity provides Microsoft Defender XDR users with evidence of when users, computers, and devices have performed suspicious activities or show signs of being compromised.
11+
Microsoft Defender for Identity gives Microsoft Defender XDR users evidence when users, computers, and devices show signs of suspicious activities or compromise.
1212

1313
This article gives recommendations for how to determine risks to your organization, decide how to remediate, and determine the best way to prevent similar attacks in the future.
1414

@@ -17,7 +17,7 @@ This article gives recommendations for how to determine risks to your organizati
1717
> [!NOTE]
1818
> For information on how to view user profiles in Microsoft Defender XDR, see [Microsoft Defender XDR documentation](/microsoft-365/security/defender/investigate-users).
1919
20-
If an alert or incident indicates that a user may be suspicious or compromised, check and investigate the user profile for the following details and activities:
20+
If an alert or incident indicates that a user might be suspicious or compromised, check and investigate the user profile for the following details and activities:
2121

2222
- **User identity**
2323
- Is the user a [sensitive user](entity-tags.md) (such as admin, or on a watchlist, etc.)?
@@ -56,16 +56,17 @@ When you investigate a specific identity, you'll see the following details on an
5656

5757
|Identity details page area |Description |
5858
|---------|---------|
59-
|[Overview tab](/microsoft-365/security/defender/investigate-users#overview) | General identity data, such as the Microsoft Entra identity risk level, the number of devices the user is signed in to, when the user was first and last seen, the user's accounts and more important information. <br><br>Use the **Overview** tab to also view graphs for incidents and alerts, and an organizational tree, entity tags. |
59+
|[Overview tab](/microsoft-365/security/defender/investigate-users#overview) | Use the **Overview** tab to view graphs for incidents and alerts, an organizational tree, and entity tags. <br> General identity data includes: <br> - Microsoft Entra identity risk level <br> - The number of devices the identity is signed in to <br> - When the identity was first and last seen <br> - The identity's accounts and more important information. <br><br> |
6060
|[Incidents and alerts](/microsoft-365/security/defender/investigate-users#incidents-and-alerts) | Lists active incidents and alerts involving the user from the last 180 days, including details like alert severity and the time the alert was generated. |
61-
|[Observed in organization](/microsoft-365/security/defender/investigate-users#observed-in-organization) | Includes the following sub-areas: <br>- **Devices**: The devices that the identity signed in to, including most and least used in the last 180 days. <br>- **Locations**: The identity's observed locations over the last 30 days. <br>- **Groups**: All observed on-premises groups for the identity. <br> - **Lateral movement paths** - all profiled lateral movement paths from the on-premises environment. |
62-
|[Identity timeline](/microsoft-365/security/defender/investigate-users#timeline) |The timeline represents activities and alerts observed from a user's identity from the last 180 days, unifying identity entries across Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. <br><br>Use the timeline to focus on activities a user performed or were performed on them in specific timeframes. Select the default **30 days** to change the time range to another built-in value, or to a custom range. |
61+
|[Observed in organization](/microsoft-365/security/defender/investigate-users#observed-in-organization) | Includes the following sub-areas: <br>- **Devices**: The devices that the identity signed in to, including most and least used in the last 180 days. <br>- **Locations**: The identity's observed locations over the last 30 days. <br>- **Groups**: All observed on-premises groups for the identity. <br> - **Lateral movement paths** - all profiled lateral movement paths from the on-premises environment. <br> - **Accounts** View all accounts linked to a specific identity. |
62+
|[Identity timeline](/microsoft-365/security/defender/investigate-users#timeline) | The timeline represents activities and alerts observed from a user's identity within the last 180 days, to help unify identity entries across Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. <br><br> You can use the timeline to focus on activities a user performed or were performed on them in specific timeframes. Select the default **30 days** to change the time range to another built-in value, or to a custom range. |
6363
|Security recommendations|This tab displays all active security posture assessments (ISPMs) associated with an identity account. It includes Defender for Identity recommendations across available identity providers such as Active Directory, Okta, and others. Selecting an ISPM pivots you to the recommendation page in Microsoft Secure Score for additional details.|
6464
|Attack paths|This tab provides visibility into potential attack paths leading to a critical identity or involving it within the path, helping assess security risks. For more information, see Overview of attack path within Exposure Management.|
6565
|[Remediation actions](/microsoft-365/security/defender/investigate-users#remediation-actions) |Respond to compromised users by disabling their accounts or resetting their password. After taking action on users, you can check on the activity details in the Microsoft Defender XDR **Action center.|
6666

67+
6768
> [!NOTE]
68-
> **Investigation Priority Score** has been deprecated on December 3, 2024. As a result, both the Investigation Priority Score breakdown and the scored activity timeline cards have been removed from the UI.
69+
> **Investigation Priority Score** was deprecated on December 3, 2024. As a result, the Investigation Priority Score breakdown and the scored activity timeline cards are no longer available.
6970
7071

7172

Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
---
2+
title: Link/Unlink an account to an identity
3+
description: This article explains how to link or unlink an account to an identity in Microsoft Defender for Identity.
4+
ms.date: 09/01/2025
5+
ms.topic: how-to
6+
ms.service: microsoft-defender-for-identity
7+
ms.reviewer: Almog Omrad
8+
#customer intent: As a SOC analyst, I want to view all accounts linked to an identity so that I can gain a complete and accurate understanding of the identity’s footprint across the organization and validate accounts correlated are correct.
9+
---
10+
11+
# Link or Unlink an Account to an Identity (Preview)
12+
13+
## Overview
14+
15+
In enterprise environments, identity data is often fragmented. A single user might have multiple accounts across systems, including personal, privileged, legacy, or cloud-based accounts. These accounts can cover on-premises Active Directory, Microsoft Entra ID, or third-party identity providers such as Okta and Ping. Users may also maintain multiple accounts within the same system, such as a standard business account ([email protected]) and a privileged administrative account ([email protected]). This fragmentation makes it difficult to maintain a unified view of identity across the organization. The **Manual link or unlink accounts** feature in Microsoft Defender for Identity helps you correlate accounts with identities to build a complete identity footprint.
16+
17+
Consider a user named John Doe who has an Azure Active Directory account, an Okta account, and a Ping account. By manually linking these accounts to John’s identity in Microsoft Defender for Identity, you can create a consolidated view that supports identity-centric protection and investigation.
18+
19+
## Why use manual linking
20+
21+
Manual linking helps organizations:
22+
23+
- Correlate identity components across different systems
24+
- Improve protection by creating a complete identity context
25+
- Support investigations and response actions with unified identity views
26+
27+
### Scenarios and examples
28+
29+
- **Personal and privileged accounts**: A user might have two accounts, one for everyday work and another with elevated permissions for administrative tasks.
30+
**Example**
31+
- [email protected] (regular account)
32+
- [email protected] (privileged account)
33+
34+
- **Multiple domains**: Large organizations often manage several domains. Linking accounts across these domains provides full visibility into a user’s activity.
35+
**Example**
36+
37+
38+
39+
- **Personal and service accounts**: A user may have both a personal account and a service account they own or manage. Linking them helps connect ownership and responsibility to the same identity.
40+
**Example**
41+
- [email protected] (personal account)
42+
- [email protected] (service account)
43+
44+
- **Legacy accounts**: A user might still have an active account in a legacy system. Linking it ensures the account is monitored and tied back to the correct identity.
45+
**Example**
46+
- [email protected] (current account)
47+
- [email protected] (legacy account)
48+
49+
50+
51+
## Prerequisites
52+
53+
- You must have [Unified role-based access control (URBAC)](/defender-for-identity/role-groups) roles: Global Administrator or Security Data (Manage)
54+
55+
## How to Manually Link or Unlink Accounts to an Identity
56+
57+
Follow these steps to manually link accounts to a selected identity.
58+
59+
1. Navigate to **Assets** > **Identity Inventory**.
60+
1. Select an **Identity** from the list.
61+
62+
:::image type="content" source="media/identity-inventory/inventory11.png" alt-text="Screenshot of the Identity Inventory page in the Defender portal. " lightbox="media/identity-inventory/inventory11.png":::
63+
64+
1. Select the **Observed in organization** tab.
65+
1. Open the **Accounts** tab.
66+
67+
:::image type="content" source="media/link-unlink-account-to-identity/accounts-observed-in-organization.png" alt-text="Screenshot that shows the accounts observed in an organization." lightbox="media/link-unlink-account-to-identity/accounts-observed-in-organization.png":::
68+
69+
1. Select one or more accounts from the table. You must select at least one account to continue.
70+
1. You can search by:
71+
- Display name
72+
- User principal name (UPN)
73+
- Security identifier (SID)
74+
- Source provider account
75+
1. Select **Next**.
76+
1. Enter a short justification comment explaining why you're linking these accounts.
77+
1. Your justification must:
78+
- Be between 1 and 50 characters
79+
- Use only letters, numbers, spaces, @, and _
80+
- If your input includes invalid characters or exceeds the limit, an error message will appear.
81+
1. Select **Next**.
82+
1. Review the selected accounts and your justification.
83+
1. Confirm that the accounts listed are correct.
84+
1. The account list refreshes automatically.
85+
86+
## Unlink accounts from an identity
87+
88+
Follow these steps to manually unlink accounts from a selected identity.
89+
90+
1. Go to **Identity Inventory > Observed in organization**
91+
1. Open the **Accounts** tab.
92+
1. Select one or more account groups.
93+
1. Select **Unlink account**.
94+
1. A confirmation dialog appears with the identity name.
95+
1. Review the message and select **Unlink accounts** to confirm.
96+
97+
98+
## What to expect after linking or unlinking an account
99+
100+
- The selected accounts are linked or unlinked immediately.
101+
- The system updates the identity context and refreshes the account list.
102+
- All actions are recorded in the unified audit system, including the justification and the user who performed the action.
103+
104+
## See also
105+
106+
- [Investigate users](/microsoft-365/security/defender/investigate-users)
107+
- [Investigate assets](/defender-for-identity/investigate-assets)
127 KB
Loading

defender-for-identity/remediation-actions.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -37,28 +37,28 @@ The following Defender for Identity actions can be performed on Identities:
3737

3838
| Remediation Action | Description | Scope |
3939
| ------------------------------------- | ------------------------------------------------------------ | ------------------------------------------------------------ |
40-
|Disable user | This temporarily prevents a user from signing in. This can help prevent compromised users from moving laterally and attempting to exfiltrate data or further compromise the network. | Active Directory, Entra ID and Okta
41-
|Enable user | Enable a user to sign in. | Active Directory, Entra ID and Okta
42-
|Revoke all Users' sessions | Revoke a user's active sessions. | Entra ID and Okta
43-
|Confirm user compromised | The user's risk level is set to High | Entra ID
44-
| Reset user password| This prompts the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts| Active Directory
45-
|Deactivate user in Okta | This action can be used when a non-legit malicious account was detected, to deactivate the account permanently | Okta
46-
| Set user risk to High/Medium/Low |Set one user risk scoring to one of the defined levels. This action will only be available if [Risk Scoring](https://help.okta.com/en-us/Content/Topics/Security/Security_Risk_Scoring.htm) feature is enabled | Okta
40+
|Disable | You can choose to disable **all accounts linked to an identity** or **only one of them**. Disabling an identity prevents sign-in and access to network resources until the accounts are re-enabled. This action doesn’t delete the identity profile or associated data such as documents, calendar events, or email messages. | Active Directory, Microsoft Entra ID, and Okta
41+
|Enable | Re-enables accounts that were previously disabled for the selected identity. | Active Directory, Microsoft Entra ID, and Okta
42+
|Revoke session | Revoke an identity's active session. | Microsoft Entra ID and Okta
43+
|Confirm accounts compromised | Marks all accounts linked to the selected identity as compromised in Microsoft Entra ID. | Microsoft Entra ID
44+
|Reset password| Reset a password for one or more accounts linked to the selected identity.This prompts the identity to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts.| Active Directory
45+
|Deactivate | This action can be used when a non-legit malicious account was detected, to deactivate the account permanently | Okta
46+
|Set account risk to High/Medium/Low |Set account risk scoring to one of the defined levels. This action is only available if [Risk Scoring](https://help.okta.com/en-us/Content/Topics/Security/Security_Risk_Scoring.htm) feature is enabled | Okta
4747

4848

4949
Depending on your Microsoft Entra ID roles, you might see additional Microsoft Entra ID actions, such as requiring users to sign in again and confirming a user as compromised. For more information, see [Remediate risks and unblock users](/entra/id-protection/howto-identity-protection-remediate-unblock).
5050

5151
## Roles and Permissions
5252

53-
| Remediation Action | Active Directory |Entra ID | Okta |
53+
| Remediation Action | Active Directory |Microsoft Entra ID | Okta |
5454
|--|--|--|--|
55-
| Disable user | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr) | Global Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
56-
| Enable user | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr) | Global Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
57-
| Revoke all Users' sessions |N\A | Global Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
58-
| Confirm user compromised |N\A | - Global Administrator <br> -Security Administrator | N/A|
59-
| Reset user password | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr) | N\A | N\A
60-
| Deactivate user in Okta | N\A | N\A | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator
61-
| Set User risk to High/Medium/Low | N\A | N\A | A custom role defined with permissions for Response (manage) or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator
55+
|Disable | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr) | Global Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
56+
| Enable | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr) | Global Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
57+
| Revoke session |N\A | Global Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
58+
| Confirm accounts compromised |N\A | - Global Administrator <br> -Security Administrator | N/A|
59+
| Reset password | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr) | N\A | N\A
60+
| Deactivate | N\A | N\A | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator
61+
| Set identity risk to High/Medium/Low | N\A | N\A | A custom role defined with permissions for Response (manage) or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator
6262

6363
## Related videos
6464

0 commit comments

Comments
 (0)