@@ -148,16 +148,7 @@ IdentityQueryEvents
148
148
For more information, see [ Advanced hunting in the Microsoft Defender portal] ( /microsoft-365/security/defender/advanced-hunting-microsoft-defender ) .
149
149
150
150
151
- ### Test Identity Security Posture Management (ISPM) recommendations
152
-
153
- Defender for Identity capabilities on domain controllers support the following ISPM assessments:
154
-
155
- - [ ** Install Defender for Identity Sensor on all Domain Controllers** ] ( ../security-assessment-unmonitored-domain-controller.md )
156
- - [ ** Microsoft LAPS usage** ] ( ../security-assessment-laps.md )
157
- - [ ** Resolve unsecure domain configurations** ] ( ../security-assessment-unsecure-domain-configurations.md )
158
- - ** Set a honeytoken account**
159
- - [ ** Unsecure account attributes** ] ( ../security-assessment-unsecure-account-attributes.md )
160
- - [ ** Unsecure SID History attributes** ] ( ../security-assessment-unsecure-sid-history-attribute.md )
151
+ ## Test Identity Security Posture Management (ISPM) recommendations
161
152
162
153
We recommend simulating risky behavior in a test environment to trigger supported assessments and verify that they appear as expected. For example:
163
154
@@ -187,37 +178,6 @@ For more information, see [Microsoft Defender for Identity's security posture as
187
178
188
179
### Test alert functionality
189
180
190
- The following alerts are supported by Defender for Identity capabilities on domain controllers:
191
-
192
- :::row:::
193
- :::column span="":::
194
- - [Account enumeration reconnaissance](../reconnaissance-discovery-alerts.md#account-enumeration-reconnaissance-external-id-2003)
195
- - [Active Directory attributes Reconnaissance using LDAP](../reconnaissance-discovery-alerts.md#active-directory-attributes-reconnaissance-ldap-external-id-2210)
196
- - [Exchange Server Remote Code Execution (CVE-2021-26855)](../lateral-movement-alerts.md#exchange-server-remote-code-execution-cve-2021-26855-external-id-2414)
197
- - [Honeytoken user attributes modified](../persistence-privilege-escalation-alerts.md#honeytoken-user-attributes-modified-external-id-2427)
198
- - [Honeytoken was queried via LDAP](../reconnaissance-discovery-alerts.md#honeytoken-was-queried-via-ldap-external-id-2429)
199
- - [Honeytoken authentication activity](../credential-access-alerts.md#honeytoken-authentication-activity-external-id-2014)
200
- - [Honeytoken group membership changed](../persistence-privilege-escalation-alerts.md#honeytoken-group-membership-changed-external-id-2428)
201
- - [Remote code execution attempt](../other-alerts.md#remote-code-execution-attempt-external-id-2019)
202
- - [Security principal reconnaissance (LDAP)](../credential-access-alerts.md#security-principal-reconnaissance-ldap-external-id-2038)
203
- - [Suspicious service creation](../other-alerts.md#suspicious-service-creation-external-id-2026)
204
- - [Suspected NTLM relay attack (Exchange account)](../lateral-movement-alerts.md#suspected-ntlm-relay-attack-exchange-account-external-id-2037)
205
- :::column-end:::
206
- :::column span="":::
207
- - [Suspicious modification of the Resource Based Constrained Delegation attribute by a machine account](../persistence-privilege-escalation-alerts.md#suspicious-modification-of-the-resource-based-constrained-delegation-attribute-by-a-machine-account--external-id-2423)
208
- - [Suspicious additions to sensitive groups](../persistence-privilege-escalation-alerts.md#suspicious-additions-to-sensitive-groups-external-id-2024)
209
- - [Suspicious modification of a dNSHostName attribute (CVE-2022-26923)](../persistence-privilege-escalation-alerts.md#suspicious-modification-of-a-dnshostname-attribute-cve-2022-26923--external-id-2421)
210
- - [Suspicious modification of a sAMNameAccount attribute (CVE-2021-42278 and CVE-2021-42287)](../credential-access-alerts.md#suspicious-modification-of-a-samnameaccount-attribute-cve-2021-42278-and-cve-2021-42287-exploitation-external-id-2419)
211
- - [Suspected DCShadow attack (domain controller promotion)](../other-alerts.md#suspected-dcshadow-attack-domain-controller-promotion-external-id-2028)
212
- - [Suspected DFSCoerce attack using Distributed File System Protocol](../credential-access-alerts.md#suspected-dfscoerce-attack-using-distributed-file-system-protocol-external-id-2426)
213
- - [Suspected DCShadow attack (domain controller replication request)](../other-alerts.md#suspected-dcshadow-attack-domain-controller-replication-request-external-id-2029)
214
- - [Suspected account takeover using shadow credentials](../credential-access-alerts.md#suspected-account-takeover-using-shadow-credentials-external-id-2431)
215
- - [Suspected SID-History injection](../persistence-privilege-escalation-alerts.md#suspected-sid-history-injection-external-id-1106)
216
- - [Suspected AD FS DKM key read](../credential-access-alerts.md#suspected-ad-fs-dkm-key-read-external-id-2413)
217
- :::column-end:::
218
- :::row-end:::
219
-
220
-
221
181
Test alert functionality by simulating risky activity in a test environment. For example:
222
182
223
183
- Tag an account as a honeytoken account, and then try signing in to the honeytoken account against the activated domain controller.
@@ -232,11 +192,7 @@ Test remediation actions on a test user. For example:
232
192
233
193
1. In the Defender portal, go to the user details page for a test user.
234
194
235
- 1. From the options menu, select any or all of the following, one at a time:
236
-
237
- - **Disable user in AD**
238
- - **Enable user in AD**
239
- - **Force password reset**
195
+ 1. From the options menu, select any of the avialable remediation actions.
240
196
241
197
1. Check Active Directory for the expected activity.
242
198
0 commit comments