You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/pilot-deploy-defender-identity.md
+31-43Lines changed: 31 additions & 43 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,9 +5,9 @@ search.appverid: met150
5
5
ms.service: defender-xdr
6
6
f1.keywords:
7
7
- NOCSH
8
-
ms.author: dansimp
9
-
author: dansimp
10
-
ms.date: 05/31/2024
8
+
ms.author: bagol
9
+
author: batamig
10
+
ms.date: 01/12/2025
11
11
ms.localizationpriority: medium
12
12
manager: dansimp
13
13
audience: ITPro
@@ -29,9 +29,9 @@ ms.topic: conceptual
29
29
30
30
This article provides a workflow for piloting and deploying Microsoft Defender for Identity in your organization. You can use these recommendations to onboard Microsoft Defender for Identity as an individual cybersecurity tool or as part of an end-to-end solution with Microsoft Defender XDR.
31
31
32
-
This article assumes you have a production Microsoft 365 tenant and are piloting and deploying Microsoft Defender for Identity in this environment. This practice will maintain any settings and customizations you configure during your pilot for your full deployment.
32
+
This article assumes you have a production Microsoft 365 tenant and are piloting and deploying Microsoft Defender for Identity in this environment. This practice will maintain any settings and customizations you configure during your pilot for your [full deployment](/defender-for-identity/deploy/deploy-defender-identity).
33
33
34
-
Defender for Office 365 contributes to a Zero Trust architecture by helping to prevent or reduce business damage from a breach. For more information, see the [Prevent or reduce business damage from a breach](/security/zero-trust/adopt/prevent-reduce-business-damage-breach) business scenario in the Microsoft Zero Trust adoption framework.
34
+
Defender for Identity contributes to a Zero Trust architecture by helping to prevent or reduce business damage from a breach. For more information, see the [Prevent or reduce business damage from a breach](/security/zero-trust/adopt/prevent-reduce-business-damage-breach) business scenario in the Microsoft Zero Trust adoption framework.
35
35
36
36
## End-to-end deployment for Microsoft Defender XDR
37
37
@@ -51,7 +51,7 @@ The articles in this series correspond to the following phases of end-to-end dep
51
51
52
52
The following diagram illustrates a common process to deploy a product or service in an IT environment.
53
53
54
-
:::image type="content" source="./media/eval-defender-xdr/adoption-phases.svg" alt-text="Diagram of the pilot, evaluate, and full deployment adoption phases." lightbox="./media/eval-defender-xdr/adoption-phases.svg":::
54
+
:::image type="content" source="./media/eval-defender-xdr/adoption-phases.svg" alt-text="Diagram of the pilot, evaluate, and full deployment adoption phases." lightbox="./media/eval-defender-xdr/adoption-phases.svg" border="false":::
55
55
56
56
You start by evaluating the product or service and how it will work within your organization. Then, you pilot the product or service with a suitably small subset of your production infrastructure for testing, learning, and customization. Then, gradually increase the scope of the deployment until your entire infrastructure or organization is covered.
57
57
@@ -65,16 +65,15 @@ Follow these steps:
65
65
1.[Install and configure sensors](#step-2)
66
66
1.[Configure event log and proxy settings on machines with the sensor](#step-3)
67
67
1.[Allow Defender for Identity to identify local admins on other computers](#step-4)
68
-
1.[Configure benchmark recommendations for your identity environment](#step-5)
69
-
1.[Try out capabilities](#step-6)
68
+
1.[Try out capabilities](#step-5)
70
69
71
70
Here are the recommended steps for each deployment stage.
72
71
73
72
| Deployment stage | Description |
74
73
| --- | --- |
75
74
| Evaluate | Perform product evaluation for Defender for Identity. |
76
-
| Pilot | Perform Steps 1-6 for a suitable subset of servers with sensors in your production environment. |
77
-
| Full deployment | Perform Steps 2-5 for your remaining servers, expanding beyond the pilot to include all of them. |
75
+
| Pilot | Perform Steps 1-5 for a suitable subset of servers with sensors in your production environment. |
76
+
| Full deployment | Perform Steps 2-4 for your remaining servers, expanding beyond the pilot to include all of them. |
78
77
79
78
### Protecting your organization from hackers
80
79
@@ -113,42 +112,34 @@ In this illustration:
113
112
114
113
Defender for Identity sensors can be directly installed on the following servers:
115
114
116
-
- AD DS domain controllers
117
-
118
-
The sensor directly monitors domain controller traffic, without the need for a dedicated server or the configuration of port mirroring.
119
-
120
-
- AD CS servers
121
-
- AD FS servers
122
-
123
-
The sensor directly monitors network traffic and authentication events.
115
+
-**AD DS domain controllers**. The sensor directly monitors domain controller traffic, without the need for a dedicated server or the configuration of port mirroring.
116
+
-**AD FS servers / AD CS servers**. The sensor directly monitors network traffic and authentication events.
124
117
125
118
For a deeper look into the architecture of Defender for Identity, see [Microsoft Defender for Identity architecture](/defender-for-identity/architecture).
126
119
127
120
<aname="step-1"></a>
128
121
129
122
## Step 1: Set up the Defender for Identity instance
130
123
131
-
First, Defender for Identity requires some prerequisite work to ensure that your on-premises identity and networking components meet minimum requirements. Use the [Microsoft Defender for Identity prerequisites](/defender-for-identity/prerequisites) article as a checklist to ensure your environment is ready.
124
+
Sign in to the Defender portal to start deploying supported services, including Microsoft Defender for Identity. For more information, see [Start using Microsoft Defender XDR](/defender-for-identity/deploy/deploy-defender-identity##start-using-microsoft-defender-xdr).
132
125
133
-
Next, sign in to the Defender for Identity portal to create your instance and then connect this instance to your Active Directory environment.
126
+
<aname="step-2"></a>
134
127
135
-
| Step | Description | More information |
136
-
|---|---|---|
137
-
| 1 | Create the Defender for Identity instance |[Quickstart: Create your Microsoft Defender for Identity instance](/defender-for-identity/install-step1)|
138
-
| 2 | Connect the Defender for Identity instance to your Active Directory forest |[Quickstart: Connect to your Active Directory Forest](/defender-for-identity/install-step2)|
128
+
## Step 2: Install your sensors
139
129
140
-
<aname="step-2"></a>
130
+
First, Defender for Identity requires some prerequisite work to ensure that your on-premises identity and networking components meet minimum requirements. Use the [Microsoft Defender for Identity prerequisites](/defender-for-identity/prerequisites) article as a checklist to ensure your environment is ready.
141
131
142
-
## Step 2: Install and configure sensors
132
+
Next, make sure that you have the necessary permissions and prerequisites in place to install the Defender for Identity sensor in your environment, and plan your capacity requirements. For more information, see [Plan capacity for Microsoft Defender for Identity deployment](/defender-for-identity/deploy/capacity-planning).
143
133
144
-
Next, download, install, and configure the Defender for Identity sensor on the domain controllers, AD FS, and AD CS servers in your on-premises environment.
134
+
When you're ready, download, install, and configure the Defender for Identity sensor on the domain controllers, AD FS, and AD CS servers in your on-premises environment.
145
135
146
136
| Step | Description | More information |
147
137
|---|---|---|
148
-
| 1 | Determine how many Microsoft Defender for Identity sensors you need. |[Plan capacity for Microsoft Defender for Identity](/defender-for-identity/capacity-planning)|
149
-
| 2 | Download the sensor setup package |[Quickstart: Download the Microsoft Defender for Identity sensor setup package](/defender-for-identity/install-step3)|
150
-
| 3 | Install the Defender for Identity sensor |[Quickstart: Install the Microsoft Defender for Identity sensor](/defender-for-identity/install-step4)|
151
-
| 4 | Configure the sensor |[Configure Microsoft Defender for Identity sensor settings](/defender-for-identity/install-step5)|
138
+
| 1 | Confirm that your environment meets Defender for Identity prerequisites. |[Microsoft Defender for Identity prerequisites](/defender-for-identity/prerequisites)|
139
+
| 2 | Determine how many Microsoft Defender for Identity sensors you need. |[Plan capacity for Microsoft Defender for Identity](/defender-for-identity/capacity-planning)|
140
+
| 3 | Verify connectivity to the Defender for Identity service |[Check network activity](/defender-for-identity/deploy/quick-installation-guidecheck-network-connectivity)|
141
+
| 4 | Download and install the Defender for Identity sensor |[Install Defender for Identity](/defender-for-identity/deploy/quick-installation-guide#install-defender-for-identity)|
142
+
| 5 | Configure the sensor |[Configure Microsoft Defender for Identity sensor settings](/defender-for-identity/deploy/configure-sensor-settings)|
152
143
153
144
<aname="step-3"></a>
154
145
@@ -158,32 +149,29 @@ On the machines that you installed the sensor on, configure Windows event log co
158
149
159
150
| Step | Description | More information |
160
151
|---|---|---|
161
-
| 1 | Configure Windows event log collection |[Configure Windows Event collection](/defender-for-identity/configure-windows-event-collection)|
162
-
| 2 | Configure Internet proxy settings |[Configure endpoint proxy and Internet connectivity settings for your Microsoft Defender for Identity Sensor](/defender-for-identity/configure-proxy)|
152
+
| 1 | Configure Windows event log collection |[Event collection with Microsoft Defender for Identity](/defender-for-identity/event-collection-overview) and [Configure audit policies for Windows event logs](/defender-for-identity/deploy/configure-windows-event-collection)|
163
153
164
154
<aname="step-4"></a>
165
155
166
156
## Step 4: Allow Defender for Identity to identify local admins on other computers
167
157
168
-
Microsoft Defender for Identity lateral movement path detection relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity Service account.
158
+
Microsoft Defender for Identity lateral movement path (LMP) detection relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity Service account.
169
159
170
160
To ensure Windows clients and servers allow your Defender for Identity account to perform SAM-R, a modification to Group Policy must be made to add the Defender for Identity service account in addition to the configured accounts listed in the Network access policy. Make sure to apply group policies to all computers **except domain controllers**.
171
161
172
-
For instructions on how to do this, see [Configure Microsoft Defender for Identity to make remote calls to SAM](/defender-for-identity/install-step8-samr).
162
+
For instructions on how to do this, see [Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity](/defender-for-identity/deploy/remote-calls-sam).
173
163
174
164
<aname="step-5"></a>
175
165
176
-
## Step 5: Configure benchmark recommendations for your identity environment
177
-
178
-
Microsoft provides security benchmark recommendations for customers using Microsoft Cloud services. The [Azure Security Benchmark](/security/benchmark/azure/overview) (ASB) provides prescriptive best practices and recommendations to help improve the security of workloads, data, and services on Azure.
179
-
180
-
Implementing these recommendations can take some time to plan and implement. While these recommendations greatly increase the security of your identity environment, they shouldn't prevent you from continuing to evaluate and implement Microsoft Defender for Identity. These recommendations are provided here for your awareness.
166
+
## Step 5: Try out capabilities
181
167
182
-
<aname="step-6"></a>
168
+
The Defender for Identity documentation includes the following articles that walk through the process of identifying and remediating various attack types:
183
169
184
-
## Step 6: Try out capabilities
170
+
-[Investigate assets](/defender-for-identity/investigate-assets), including suspicious users, groups, and devices
171
+
-[Understand and investigate LMPs with Microsoft Defender for Identity](/defender-for-identity/understand-lateral-movement-paths)
The Defender for Identity documentation includes the following tutorials that walk through the process of identifying and remediating various attack types:
0 commit comments