Skip to content

Commit 4fa5186

Browse files
Merge pull request #2496 from MicrosoftDocs/main
Publish main to live, 01/20/25, 10:30 AM PT
2 parents 07cd084 + a2e87a5 commit 4fa5186

11 files changed

+2554
-4916
lines changed

defender-xdr/media/eval-defender-xdr/defender-cloud-apps-siem-integration.svg

Lines changed: 0 additions & 402 deletions
This file was deleted.

defender-xdr/media/eval-defender-xdr/defender-identity-pilot-deploy-steps.svg

Lines changed: 132 additions & 197 deletions
Loading

defender-xdr/media/eval-defender-xdr/defender-identity-siem-integration.svg

Lines changed: 0 additions & 402 deletions
This file was deleted.

defender-xdr/media/eval-defender-xdr/m365-defender-mcas-architecture-a.svg

Lines changed: 0 additions & 496 deletions
This file was deleted.

defender-xdr/media/eval-defender-xdr/m365-defender-mcas-architecture-b.svg

Lines changed: 414 additions & 692 deletions
Loading

defender-xdr/media/eval-defender-xdr/m365-defender-mcas-architecture-c.svg

Lines changed: 340 additions & 398 deletions
Loading

defender-xdr/media/eval-defender-xdr/m365-defender-mcas-architecture-d.svg

Lines changed: 402 additions & 554 deletions
Loading

defender-xdr/media/eval-defender-xdr/m365-defender-mcas-architecture-e.svg

Lines changed: 1151 additions & 1657 deletions
Loading

defender-xdr/pilot-deploy-defender-cloud-apps.md

Lines changed: 72 additions & 65 deletions
Large diffs are not rendered by default.

defender-xdr/pilot-deploy-defender-identity.md

Lines changed: 39 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: How do I pilot and deploy Microsoft Defender for Identity>
3-
description: How to pilot and deploy Microsoft Defender for Identity in your production Microsoft 365 tenant.
2+
title: How do I pilot and deploy Microsoft Defender for Identity
3+
description: Learn how to pilot and deploy Microsoft Defender for Identity as part of Microsoft Defender XDR to enhance your organization's security posture.
44
search.appverid: met150
55
ms.service: defender-xdr
66
f1.keywords:
77
- NOCSH
88
ms.author: dansimp
99
author: dansimp
10-
ms.date: 05/31/2024
10+
ms.date: 01/12/2025
1111
ms.localizationpriority: medium
1212
manager: dansimp
1313
audience: ITPro
@@ -18,20 +18,20 @@ ms.collection:
1818
- zerotrust-solution
1919
- highpri
2020
- tier1
21-
ms.topic: conceptual
21+
ms.topic: concept-article
22+
#customerIntent: As a security admin, I want to pilot and deploy Microsoft Defender for Identity to evaluate it's ability to enhance my organization's security posture and protect against identity-based threats.
2223
---
2324

2425
# Pilot and deploy Microsoft Defender for Identity
2526

26-
2727
**Applies to:**
2828
- Microsoft Defender XDR
2929

30-
This article provides a workflow for piloting and deploying Microsoft Defender for Identity in your organization. You can use these recommendations to onboard Microsoft Defender for Identity as an individual cybersecurity tool or as part of an end-to-end solution with Microsoft Defender XDR.
30+
This article provides a workflow for piloting and deploying Microsoft Defender for Identity in your organization. Use these recommendations to onboard Microsoft Defender for Identity as part of an end-to-end solution with Microsoft Defender XDR.
3131

32-
This article assumes you have a production Microsoft 365 tenant and are piloting and deploying Microsoft Defender for Identity in this environment. This practice will maintain any settings and customizations you configure during your pilot for your full deployment.
32+
This article assumes you have a production Microsoft 365 tenant and are piloting and deploying Microsoft Defender for Identity in this environment. This practice will maintain any settings and customizations you configure during your pilot for your [full deployment](/defender-for-identity/deploy/deploy-defender-identity).
3333

34-
Defender for Office 365 contributes to a Zero Trust architecture by helping to prevent or reduce business damage from a breach. For more information, see the [Prevent or reduce business damage from a breach](/security/zero-trust/adopt/prevent-reduce-business-damage-breach) business scenario in the Microsoft Zero Trust adoption framework.
34+
Defender for Identity contributes to a Zero Trust architecture by helping to prevent or reduce business damage from a breach. For more information, see the [Prevent or reduce business damage from a breach](/security/zero-trust/adopt/prevent-reduce-business-damage-breach) business scenario in the Microsoft Zero Trust adoption framework.
3535

3636
## End-to-end deployment for Microsoft Defender XDR
3737

@@ -51,7 +51,7 @@ The articles in this series correspond to the following phases of end-to-end dep
5151

5252
The following diagram illustrates a common process to deploy a product or service in an IT environment.
5353

54-
:::image type="content" source="./media/eval-defender-xdr/adoption-phases.svg" alt-text="Diagram of the pilot, evaluate, and full deployment adoption phases." lightbox="./media/eval-defender-xdr/adoption-phases.svg":::
54+
:::image type="content" source="./media/eval-defender-xdr/adoption-phases.svg" alt-text="Diagram of the pilot, evaluate, and full deployment adoption phases." lightbox="./media/eval-defender-xdr/adoption-phases.svg" border="false":::
5555

5656
You start by evaluating the product or service and how it will work within your organization. Then, you pilot the product or service with a suitably small subset of your production infrastructure for testing, learning, and customization. Then, gradually increase the scope of the deployment until your entire infrastructure or organization is covered.
5757

@@ -65,16 +65,15 @@ Follow these steps:
6565
1. [Install and configure sensors](#step-2)
6666
1. [Configure event log and proxy settings on machines with the sensor](#step-3)
6767
1. [Allow Defender for Identity to identify local admins on other computers](#step-4)
68-
1. [Configure benchmark recommendations for your identity environment](#step-5)
69-
1. [Try out capabilities](#step-6)
68+
1. [Try out capabilities](#step-5)
7069

7170
Here are the recommended steps for each deployment stage.
7271

7372
| Deployment stage | Description |
7473
| --- | --- |
7574
| Evaluate | Perform product evaluation for Defender for Identity. |
76-
| Pilot | Perform Steps 1-6 for a suitable subset of servers with sensors in your production environment. |
77-
| Full deployment | Perform Steps 2-5 for your remaining servers, expanding beyond the pilot to include all of them. |
75+
| Pilot | Perform Steps 1-5 for a suitable subset of servers with sensors in your production environment. |
76+
| Full deployment | Perform Steps 2-4 for your remaining servers, expanding beyond the pilot to include all of them. |
7877

7978
### Protecting your organization from hackers
8079

@@ -113,77 +112,64 @@ In this illustration:
113112

114113
Defender for Identity sensors can be directly installed on the following servers:
115114

116-
- AD DS domain controllers
117-
118-
The sensor directly monitors domain controller traffic, without the need for a dedicated server or the configuration of port mirroring.
119-
120-
- AD CS servers
121-
- AD FS servers
122-
123-
The sensor directly monitors network traffic and authentication events.
115+
- **AD DS domain controllers**. The sensor directly monitors domain controller traffic, without the need for a dedicated server or the configuration of port mirroring.
116+
- **AD FS servers / AD CS servers**. The sensor directly monitors network traffic and authentication events.
124117

125118
For a deeper look into the architecture of Defender for Identity, see [Microsoft Defender for Identity architecture](/defender-for-identity/architecture).
126119

127120
<a name="step-1"></a>
128121

129122
## Step 1: Set up the Defender for Identity instance
130123

131-
First, Defender for Identity requires some prerequisite work to ensure that your on-premises identity and networking components meet minimum requirements. Use the [Microsoft Defender for Identity prerequisites](/defender-for-identity/prerequisites) article as a checklist to ensure your environment is ready.
132-
133-
Next, sign in to the Defender for Identity portal to create your instance and then connect this instance to your Active Directory environment.
134-
135-
| Step | Description | More information |
136-
|---|---|---|
137-
| 1 | Create the Defender for Identity instance | [Quickstart: Create your Microsoft Defender for Identity instance](/defender-for-identity/install-step1) |
138-
| 2 | Connect the Defender for Identity instance to your Active Directory forest | [Quickstart: Connect to your Active Directory Forest](/defender-for-identity/install-step2) |
124+
Sign in to the Defender portal to start deploying supported services, including Microsoft Defender for Identity. For more information, see [Start using Microsoft Defender XDR](/defender-for-identity/deploy/deploy-defender-identity##start-using-microsoft-defender-xdr).
139125

140126
<a name="step-2"></a>
141127

142-
## Step 2: Install and configure sensors
128+
## Step 2: Install your sensors
129+
130+
Defender for Identity requires some prerequisite work to ensure that your on-premises identity and networking components meet minimum requirements for you to install the Defender for Identity sensor in your environment.
143131

144-
Next, download, install, and configure the Defender for Identity sensor on the domain controllers, AD FS, and AD CS servers in your on-premises environment.
132+
Once you're sure of your environment's readiness, plan your capacity, and verify connectivity to Defender for Identity. Then when you're ready, download, install, and configure the Defender for Identity sensor on the domain controllers, AD FS, and AD CS servers in your on-premises environment.
145133

146134
| Step | Description | More information |
147135
|---|---|---|
148-
| 1 | Determine how many Microsoft Defender for Identity sensors you need. | [Plan capacity for Microsoft Defender for Identity](/defender-for-identity/capacity-planning) |
149-
| 2 | Download the sensor setup package | [Quickstart: Download the Microsoft Defender for Identity sensor setup package](/defender-for-identity/install-step3) |
150-
| 3 | Install the Defender for Identity sensor | [Quickstart: Install the Microsoft Defender for Identity sensor](/defender-for-identity/install-step4) |
151-
| 4 | Configure the sensor | [Configure Microsoft Defender for Identity sensor settings](/defender-for-identity/install-step5)|
136+
| 1 | Confirm that your environment meets Defender for Identity prerequisites. | [Microsoft Defender for Identity prerequisites](/defender-for-identity/prerequisites)|
137+
| 2 | Determine how many Microsoft Defender for Identity sensors you need. | [Plan capacity for Microsoft Defender for Identity](/defender-for-identity/capacity-planning) |
138+
| 3 | Verify connectivity to the Defender for Identity service | [Check network activity](/defender-for-identity/deploy/quick-installation-guide#check-network-connectivity) |
139+
| 4 | Download and install the Defender for Identity sensor | [Install Defender for Identity](/defender-for-identity/deploy/quick-installation-guide#install-defender-for-identity) |
140+
| 5 | Configure the sensor | [Configure Microsoft Defender for Identity sensor settings](/defender-for-identity/deploy/configure-sensor-settings)|
152141

153142
<a name="step-3"></a>
154143

155144
## Step 3: Configure event log and proxy settings on machines with the sensor
156145

157-
On the machines that you installed the sensor on, configure Windows event log collection and Internet proxy settings to enable and enhance detection capabilities.
146+
On the machines that you installed the sensor on, configure Windows event log collection to enable and enhance detection capabilities.
158147

159148
| Step | Description | More information |
160149
|---|---|---|
161-
| 1 | Configure Windows event log collection | [Configure Windows Event collection](/defender-for-identity/configure-windows-event-collection) |
162-
| 2 | Configure Internet proxy settings | [Configure endpoint proxy and Internet connectivity settings for your Microsoft Defender for Identity Sensor](/defender-for-identity/configure-proxy) |
150+
| 1 | Configure Windows event log collection | [Event collection with Microsoft Defender for Identity](/defender-for-identity/deploy/event-collection-overview) <br><br>[Configure audit policies for Windows event logs](/defender-for-identity/deploy/configure-windows-event-collection) |
163151

164152
<a name="step-4"></a>
165153

166154
## Step 4: Allow Defender for Identity to identify local admins on other computers
167155

168-
Microsoft Defender for Identity lateral movement path detection relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity Service account.
156+
Microsoft Defender for Identity lateral movement path (LMP) detection relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity Service account.
169157

170158
To ensure Windows clients and servers allow your Defender for Identity account to perform SAM-R, a modification to Group Policy must be made to add the Defender for Identity service account in addition to the configured accounts listed in the Network access policy. Make sure to apply group policies to all computers **except domain controllers**.
171159

172-
For instructions on how to do this, see [Configure Microsoft Defender for Identity to make remote calls to SAM](/defender-for-identity/install-step8-samr).
160+
For instructions on how to do this, see [Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity](/defender-for-identity/deploy/remote-calls-sam).
173161

174162
<a name="step-5"></a>
175163

176-
## Step 5: Configure benchmark recommendations for your identity environment
177-
178-
Microsoft provides security benchmark recommendations for customers using Microsoft Cloud services. The [Azure Security Benchmark](/security/benchmark/azure/overview) (ASB) provides prescriptive best practices and recommendations to help improve the security of workloads, data, and services on Azure.
179-
180-
Implementing these recommendations can take some time to plan and implement. While these recommendations greatly increase the security of your identity environment, they shouldn't prevent you from continuing to evaluate and implement Microsoft Defender for Identity. These recommendations are provided here for your awareness.
164+
## Step 5: Try out capabilities
181165

182-
<a name="step-6"></a>
166+
The Defender for Identity documentation includes the following articles that walk through the process of identifying and remediating various attack types:
183167

184-
## Step 6: Try out capabilities
168+
- [Investigate assets](/defender-for-identity/investigate-assets), including suspicious users, groups, and devices
169+
- [Understand and investigate LMPs with Microsoft Defender for Identity](/defender-for-identity/understand-lateral-movement-paths)
170+
- [Understand security alerts](/defender-for-identity/understanding-security-alerts)
185171

186-
The Defender for Identity documentation includes the following tutorials that walk through the process of identifying and remediating various attack types:
172+
For more information, see:
187173

188174
- [Reconnaissance alerts](/defender-for-identity/reconnaissance-alerts)
189175
- [Compromised credential alerts](/defender-for-identity/compromised-credentials-alerts)
@@ -197,13 +183,14 @@ The Defender for Identity documentation includes the following tutorials that wa
197183

198184
## SIEM integration
199185

200-
You can integrate Defender for Identity with Microsoft Sentinel or a generic security information and event management (SIEM) service to enable centralized monitoring of alerts and activities from connected apps. With Microsoft Sentinel, you can more comprehensively analyze security events across your organization and build playbooks for effective and immediate response.
186+
You can integrate Defender for Identity with Microsoft Sentinel as part of Microsoft's [unified security operations platform](/unified-secops-platform/) or a generic security information and event management (SIEM) service to enable centralized monitoring of alerts and activities from connected apps. With Microsoft Sentinel, you can more comprehensively analyze security events across your organization and build playbooks for effective and immediate response.
201187

202-
:::image type="content" source="./media/eval-defender-xdr/defender-identity-siem-integration.svg" alt-text="A diagram that shows the architecture for Microsoft Defender for Identity with SIEM integration." lightbox="./media/eval-defender-xdr/defender-identity-siem-integration.svg":::
188+
Microsoft Sentinel includes a Microsoft Defender for XDR data connector to bring all signals from Defender XDR, including Defender for Identity, to Microsoft Sentinel. Use the unified security operations platform in the Defender portal as a single platform for end-to-end security operations (SecOps).
203189

204-
Microsoft Sentinel includes a Defender for Identity connector. For more information, see [Microsoft Defender for Identity connector for Microsoft Sentinel](/azure/sentinel/data-connectors/microsoft-defender-for-identity).
190+
For more information, see:
205191

206-
For information about integration with third-party SIEM systems, see [Generic SIEM integration](/cloud-app-security/siem).
192+
- [Connect Microsoft Sentinel to the Microsoft Defender portal](/defender-xdr/microsoft-sentinel-onboard)
193+
- [Generic SIEM integration](/cloud-app-security/siem)
207194

208195
## Next step
209196

0 commit comments

Comments
 (0)