Skip to content

Commit 3c84882

Browse files
authored
Merge pull request #3406 from MicrosoftDocs/main
Published main to live, Monday 10:30 AM PST, 04/07
2 parents 5f7805b + 0e8a1d1 commit 3c84882

File tree

61 files changed

+320
-44
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+320
-44
lines changed
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
---
2+
title: Integrate Defender for Identity with PAM services
3+
ms.service: microsoft-defender-for-identity
4+
ms.date: 03/30/2025
5+
ms.topic: concept-article
6+
#customerIntent: As a SOC engineer, I want to understand how to integrate Microsoft Defender for Identity with my PAM (Privilege Access Management) system to manage privileged access and detect threats.
7+
description: Learn how to integrate Microsoft Defender for Identity with your Privileged Access Management (PAM) services.
8+
---
9+
10+
# Integrate Defender for Identity with PAM services
11+
12+
## What are PAM services?
13+
14+
Privileged Access Management (PAM) solutions help reduce the risk of credential misuse by securing, monitoring, and controlling privileged account access to critical resources.
15+
PAM solutions secure privileged accounts by storing their credentials in a secure vault, controlling access through approval workflows, and monitoring active sessions to enforce just-in-time (JIT) and just-enough-access (JEA) policies. Common PAM capabilities include, automated password rotation, multifactor authentication, session isolation, and anomaly detection.
16+
17+
## Defender for Identity and PAM
18+
19+
Defender for Identity helps identify and investigate suspicious activities related to privileged accounts, such as unusual sign in patterns or privilege escalation attempts.
20+
When integrated with a PAM solution, Microsoft Defender for Identity can detect and investigate suspicious activity involving privileged accounts—such as abnormal sign-ins or privilege escalation attempts. The integration combines PAM’s access controls with Defender for Identity’s behavioral analytics for enhanced threat detection and containment.
21+
22+
## Technology partners
23+
24+
Microsoft Defender for Identity currently supports integration with the following PAM vendors. Dedicated integrations for each partner are now available in the Microsoft 365 Defender partner catalog for streamlined onboarding and visibility.
25+
26+
:::image type="content" source="media/integrate-with-partner-system-services/screenshot-of-mdi-technology-partners.png" alt-text="Screenshot of the defender for identity connections page":::
27+
28+
29+
|Vendor |Description |
30+
|---------|---------|
31+
|CyberArk | Provides credential vaulting, session monitoring, and threat remediation for privileged identities. |
32+
|BeyondTrust | BeyondTrust Offers identity-centric controls to manage the privilege attack surface and mitigate internal and external threats. |
33+
|Delinea | Delivers centralized authorization and session control for privileged identities across enterprise environments. |
34+
35+
### Reset password
36+
37+
Once PAM integration is enabled, Microsoft Defender XDR automatically tags identities managed by your PAM solution, providing critical context during investigations.
38+
39+
Additionally, you can initiate a password reset for high-risk privileged accounts directly from the Microsoft Defender XDR console. This action uses the connected PAM system.
40+
41+
To reset a password:
42+
43+
1. Go to **Assets > Identities**.
44+
2. Select the relevant identity.
45+
3. Click the three-dot menu (****) in the top-right corner.
46+
4. Select **Reset password**. The label might vary based on the vendor (for example, **Reset password by CyberArk**, **Reset password by BeyondTrust**).
47+
48+
:::image type="content" source="media/screenshot-of-privilege-access-management-tags-for-identities.png" alt-text="Screenshot of the priviledge access management tags assigned to identity accounts" lightbox="media/screenshot-of-privilege-access-management-tags-for-identities.png":::
49+
50+
This capability streamlines containment and response workflows by embedding privileged access controls directly into the investigation experience.
51+
52+
53+
### Next steps
54+
55+
For more information, see:
56+
57+
[How to integrate Defender for Identity with Delinea](https://docs.delinea.com/online-help/integrations/microsoft/mdi/integrating-mdi.htm)
58+
59+
[How to integrate Defender for Identity with CyberArk](https://community.cyberark.com/marketplace/s/#a35Ht0000018sDVIAY-a39Ht000004GLaEIAW)
230 KB
Loading
230 KB
Loading
378 KB
Loading
119 KB
Loading

ATPDocs/service-account-discovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ For a deeper dive into what's happening in your service account click on the dom
8181

8282
When you investigate a specific Service account, you'll see the following details under the connections tab:
8383

84-
:::image type="content" source="media/Screenshot-of-the-connections-page.png" alt-text="Screenshot of the connections page." lightbox="media/Screenshot-of-the-connections-page.png":::
84+
:::image type="content" source="media/screenshot-of-the-connections-page.png" alt-text="Screenshot of the connections page." lightbox="media/Screenshot-of-the-connections-page.png":::
8585

8686
|Service account connection details |Description |
8787
|---------|---------|

ATPDocs/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,10 @@ items:
8585
displayName: standalone
8686
- name: Activate Defender for Identity capabilities on your domain controller
8787
href: deploy/activate-capabilities.md
88+
- name: Integrate with PAM services
89+
items:
90+
- name: Integrate Defender for Identity with PAM services
91+
href: integrate-microsoft-and-pam-services.md
8892
- name: Manage
8993
items:
9094
- name: View the ITDR dashboard

ATPDocs/whats-new.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,20 @@ For more information, see also:
2222

2323
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2424

25+
## April 2025
26+
27+
### New Defender for Identity and PAM Integration
28+
29+
Microsoft Defender for Identity now supports integration with industry-leading Privileged Access Management (PAM) platforms to enhance detection and response for privileged identities.
30+
31+
**Supported PAM vendors**:
32+
33+
- CyberArk
34+
- Delinea
35+
- BeyondTrust
36+
37+
For more information see: [Integrations Defender for Identity and PAM services.](Integrate-microsoft-and-pam-services.md)
38+
2539
## March 2025
2640

2741
### New Service Account Discovery page
Lines changed: 158 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,158 @@
1+
---
2+
title: Investigate OAuth application attack paths in Defender for Cloud Apps
3+
description: Learn how to identify, analyze, and mitigate attack paths involving OAuth applications using Microsoft Defender for Cloud Apps and Security Exposure Management.
4+
ms.topic: how-to
5+
ms.date: 03/23/2025
6+
---
7+
8+
# Investigate OAuth application attack paths in Defender for Cloud Apps (Preview)
9+
10+
[Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) helps you to manage your company's attack surface and exposure risk effectively. By combining assets and techniques, [attack paths](/security-exposure-management/review-attack-paths) illustrate the end-to-end paths that attackers can use to move from an entry point within your organization to your critical assets.
11+
Microsoft Defender for Cloud Apps observed an increase in attackers using OAuth applications to access sensitive data in business-critical applications like Microsoft Teams, SharePoint, Outlook, and more. To support investigation and mitigation, these applications are integrated into the attack path and attack surface map views in Microsoft Security Exposure Management.
12+
13+
### Critical Asset Management - Service Principals
14+
15+
Microsoft Defender for Cloud Apps defines a set of critical privilege OAuth permissions. OAuth applications with these permissions are considered high-value assets. If compromised, an attacker can gain high privileges to SaaS applications. To reflect this risk, attack paths treat service principals with these permissions as target goals.
16+
17+
### Prerequisites
18+
19+
To get started with OAuth application attack path features in Exposure Management, make sure you meet the following requirements.
20+
21+
- A Microsoft Defender for Cloud Apps license with [App Governance](app-governance-get-started.md) enabled.
22+
23+
- Microsoft 365 app connector must be activated. For information about connecting and about which of the app connectors provide security recommendations, see [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md).
24+
25+
- Optional: To get full access to attack path data, we recommend having an E5 security license, Defender for Endpoint or Defender for Identity license.
26+
27+
### Required roles and permissions
28+
29+
To access all Exposure Management experiences, you need either a Unified Role-Based-Access-Control (RBAC) role or an Entra ID role. Only one is required.
30+
31+
- **Exposure Management (read)** (Unified RBAC)
32+
33+
Alternatively, you can use one of the following **Entra ID roles**:
34+
35+
|Permission |Actions |
36+
|---------|---------|
37+
|**Global Admin** | (read and write permissions) |
38+
|**Security Admin** | (read and write permissions) |
39+
|**Security Operator** | (read and limited write permissions) |
40+
|**Global Reader** | (read permissions) |
41+
|**Security Reader** | (read permissions) |
42+
43+
44+
>[!NOTE]
45+
> Currently available in commercial cloud environments only. Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High, DoD, and China Gov.
46+
47+
## View permissions for critical assets
48+
49+
To view the full list of permissions, go to the [Microsoft Defender portal](https://security.microsoft.com) and navigate to Settings > Microsoft Defender XDR > Rules > Critical asset management.
50+
51+
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-critical-asset-management-page.png" alt-text="Screenshot of the Critical asset management page in the Defender XDR portal." lightbox="media/saas-securty-initiative/Screenshot-of-the-critical-asset-management-page.png":::
52+
53+
> [!NOTE]
54+
> OAuth apps appear in the attack path surface map only when specific conditions are detected.
55+
> For example, an OAuth app may appear in the attack path only if a vulnerable component with an easily exploitable entry point is detected that allows lateral movement to service principals with high privileges.
56+
57+
## Investigation user flow: View attack paths involving OAuth applications
58+
59+
Once you understand which permissions represent high-value targets, use the following steps to investigate how these applications appear in your environment’s attack paths.
60+
For smaller organizations with a manageable number of attack paths, we recommend following this structured approach to investigate each attack path:
61+
62+
1. Go to Exposure Management > Attack surface > Attack paths.
63+
64+
1. Filter by 'Target type: AAD Service principal'
65+
66+
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-attack-paths-aad-service-principal.png" alt-text="Screenshot of the attack paths service add pricipal target type" lightbox="media/saas-securty-initiative/Screenshot-of-the-attack-paths-aad-service-principal.png":::
67+
68+
1. Select the attack path titled: "Device with high severity vulnerabilities allows lateral movement to service principal with sensitive permissions"
69+
70+
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-attack-path-name.png" alt-text="Screenshot of the attack path name" lightbox="media/saas-securty-initiative/Screenshot-of-the-attack-path-name.png":::
71+
72+
1. Click the View in map button to see the attack path.
73+
74+
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-view-in-map-button.png" alt-text="Screenshot of the view in map button" lightbox="media/saas-securty-initiative/Screenshot-of-the-view-in-map-button.png":::
75+
76+
1. Select the + sign to expand nodes and view detailed connections.
77+
78+
:::image type="content" source="media/saas-securty-initiative/attack-surface-map.png" alt-text="Screenshot of the attack surface map" lightbox="media/saas-securty-initiative/attack-surface-map.png":::
79+
80+
1. Hover or select nodes and edges to explore extra data such as which permissions this OAuth app has.
81+
82+
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-permissions-set-for-service-principal.png" alt-text="Screenshot showing the permissions assigned to the OAuth app as shown in the attack surface map":::
83+
84+
1. Copy the OAuth application's name and paste it into the search bar in the Applications page.
85+
86+
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-oauth-applications-page.png" alt-text="Screenshot showing the OAuth applications tab" lightbox="media/saas-securty-initiative/Screenshot-of-the-oauth-applications-page.png":::
87+
88+
1. Select the app name to review assigned permissions and usage insights, including whether high-privilege permissions are actively used.
89+
90+
:::image type="content" source="media/saas-securty-initiative/screenshot-of-permissions-assigned-to-the-oauth-app.png" alt-text="Screenshot showing the permissions assigned to the Oauth app" lightbox="media/saas-securty-initiative/Screenshot-of-permissions-assigned-to-the-oauth-app.png" :::
91+
92+
1. Optional: If you determine the OAuth application should be disabled, you can disable it from the Applications page.
93+
94+
### Decision maker user flow: Prioritize attack path using choke points
95+
96+
For larger organizations with numerous attack paths that can't be manually investigated, we recommend using attack path data and utilizing the Choke Points experience as a prioritization tool. This approach allows you to:
97+
98+
- Identify assets connected with the most attack paths.
99+
- Make informed decisions on which assets to prioritize for investigation.
100+
- Filter by Microsoft Entra OAuth app to see which OAuth apps are involved in the most attack paths.
101+
- Decide which OAuth applications to apply least privilege permissions to.
102+
103+
To get started:
104+
1. Go to the Attack Paths > Choke Points page.
105+
106+
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-choke-point-page.png" alt-text="Screenshot showing the choke points page" lightbox="media/saas-securty-initiative/Screenshot-of-the-choke-point-page.png":::
107+
108+
1. Select a choke point name to see more details about the top attack paths such as the name, entry point, and target.
109+
1. Click View blast radius to further investigate the choke point in the Attack Surface Map.
110+
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-view-blast-radius-button.png" alt-text="Screenshot showing the view blast radius button" lightbox="media/saas-securty-initiative/Screenshot-of-the-view-blast-radius-button.png":::
111+
112+
If the choke point is an OAuth application, continue the investigation in Applications page, as described in steps 7–9 above.
113+
114+
115+
## Analyze attack surface map and hunt with queries
116+
117+
In the [Attack surface map](/security-exposure-management/cross-workload-attack-surfaces), you can see connections from user-owned apps, OAuth apps, and service principals. This relationship data is available in:
118+
119+
- ExposureGraphEdges table (shows connections)
120+
121+
- ExposureGraphNodes table (includes node properties like permissions)
122+
123+
Use the following Advanced Hunting query to identify all OAuth applications with critical permissions:
124+
125+
```
126+
let RelevantNodes = ExposureGraphNodes
127+
| where NodeLabel == "Microsoft Entra OAuth App" or NodeLabel == "serviceprincipal"
128+
| project NodeId, NodeLabel, NodeName, NodeProperties;
129+
ExposureGraphEdges
130+
| where EdgeLabel == "has permissions to" or EdgeLabel == "can authenticate as"
131+
| make-graph SourceNodeId --> TargetNodeId with RelevantNodes on NodeId
132+
| graph-match (AppRegistration)-[canAuthAs]->(SPN)-[hasPermissionTo]->(Target)
133+
where AppRegistration.NodeLabel == "Microsoft Entra OAuth App" and
134+
canAuthAs.EdgeLabel == "can authenticate as" and
135+
SPN.NodeLabel == "serviceprincipal" and
136+
SPN.NodeProperties["rawData"]["criticalityLevel"]["criticalityLevel"] == 0 and
137+
hasPermissionTo.EdgeLabel == @"has permissions to" and
138+
Target.NodeLabel == "Microsoft Entra OAuth App" and
139+
Target.NodeName == "Microsoft Graph"
140+
project AppReg=AppRegistration.NodeLabel,
141+
canAuthAs=canAuthAs.EdgeLabel, SPN.NodeLabel, DisplayName=SPN.NodeProperties["rawData"]["accountDisplayName"],
142+
Enabled=SPN.NodeProperties["rawData"]["accountEnabled"], AppTenantID=SPN.NodeProperties["rawData"]["appOwnerOrganizationId"],
143+
hasPermissionTo=hasPermissionTo.EdgeLabel, Target=Target.NodeName,
144+
AppPerm=hasPermissionTo.EdgeProperties["rawData"]["applicationPermissions"]["permissions"]
145+
| mv-apply AppPerm on (summarize AppPerm = make_list(AppPerm.permissionValue))
146+
| project AppReg, canAuthAs, DisplayName, Enabled, AppTenantID, hasPermissionTo, Target, AppPerm
147+
```
148+
149+
## Next steps
150+
151+
For more information, see:
152+
153+
- [App governance in Microsoft Defender for Cloud Apps](/defender-cloud-apps/app-governance-manage-app-governance)
154+
155+
- [Overview of attack surface management](/security-exposure-management/cross-workload-attack-surfaces)
156+
157+
- [Overview of attack paths](/security-exposure-management/work-attack-paths-overview)
158+
100 KB
Loading

0 commit comments

Comments
 (0)