You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/alerts-xdr.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,20 +1,20 @@
1
1
---
2
2
title: Microsoft Defender for Identity XDR security alerts
3
-
description: This article provides a list of the sXDR ecurity alerts issued by Microsoft Defender for Identity.
3
+
description: This article provides a list of the XDR security alerts issued by Microsoft Defender for Identity.
4
4
ms.date: 07/29/2025
5
5
ms.topic: reference
6
6
ms.reviewer: rlitinsky
7
7
---
8
8
9
9
# Microsoft Defender for Identity XDR alerts
10
10
11
-
Microsoft Defender for Identity alerts can appear in the Microsoft Defender XDR portal in two different formats depending on if the alert originates from Defender for Identity or Defender XDR. All alerts are based on detections from Defender for Identity sensors. The differences in layout and information are part of an ongoing transition to a unified alerting experience across Microsoft Defender products. This article lists
11
+
Microsoft Defender for Identity alerts can appear in the Microsoft Defender XDR portal in two different formats depending on if the alert originates from Defender for Identity or Defender XDR. All alerts are based on detections from Defender for Identity sensors. The differences in layout and information are part of an ongoing transition to a unified alerting experience across Microsoft Defender products. This article lists
12
12
13
13
To learn more about how to understand the structure, and common components of all Defender for Identity security alerts, see [View and manage alerts](understanding-security-alerts.md).
14
14
15
15
## Microsoft Defender for Identity XDR alert categories
16
16
17
-
Defender for Identity security alerts are categorized by their corresponding MITRE ATT&CK tactics. This makes it easier to understand the suspected attack technique potentially in use when a Defender for Identity alert is triggered. This page contains information on each alert, to help with your investigation and remediation tasks. This guide contains general information about the conditions for triggering alerts. However, it's important to note that since anomaly detections are nondeterministic by nature, they're only triggered when there's behavior that deviates from the norm.
17
+
Defender for Identity security alerts are categorized by their corresponding MITRE ATT&CK tactics. This makes it easier to understand the suspected attack technique potentially in use when a Defender for Identity alert is triggered. This page contains information on each alert, to help with your investigation and remediation tasks. This guide contains general information about the conditions for triggering alerts. Note that anomaly-based alerts are only triggered when behavior significantly deviates from established baselines.
18
18
19
19
*[Initial Access](#initial-access-alerts)
20
20
*[Execution](#execution-alerts)
@@ -97,8 +97,8 @@ This section describes alerts indicating that a malicious actor might be attempt
97
97
|<aname="as-rep-roasting"></a><details><summary>AS-REP roasting</summary><br>**Description**:<br><br>Multiple attempts to sign in without preauthentication were detected. This behavior might indicate an Authentication Server Response (AS-REP) roasting attack, which targets the Kerberos authentication protocol, specifically accounts that have turned off preauthentication.</details> | Medium |[T1558.004](https://attack.mitre.org/techniques/T1558/004)| xdr_AsrepRoastingAttack |
98
98
|<aname="honeytoken-activity"></a><details><summary>Honeytoken Activity</summary><br>**Description**:<br><br>Honeytoken user attempted to sign in</details> | High |[T1098](https://attack.mitre.org/techniques/T1098)| xdr_HoneytokenSignInAttempt |
99
99
|<aname="negoex-relay-attack"></a><details><summary>NEGOEX relay attack</summary><br>**Description**:<br><br>An attacker used NEGOEX to impersonate a server that a client wants to connect to so that the attacker can then relay the authentication process to any target. This allows the attacker to gain access to the target. NEGOEX is an authentication protocol designed to authenticate user accounts to Microsoft Entra joined devices.</details> | High |[T1187](https://attack.mitre.org/techniques/T1187), [T1557.001](https://attack.mitre.org/techniques/T1557/001)| xdr_NegoexRelayAttack |
100
-
|<aname="okta-privileged-role-assigned-to-application"></a><details><summary>Okta privileged role assigned to application</summary><br>**Description**:<br><br>{ActorAliasName} assigned {RoleDisplayName} role to applictaion: {ApplicationDisplayName}</details> | High |[T1003.006](https://attack.mitre.org/techniques/T1003/006)| xdr_OktaPrivilegedRoleAssignedToApplication |
101
-
|<aname="possible-as-rep-roasting-attack"></a><details><summary>Possible AS-REP roasting attack</summary><br>**Description**:<br><br>A suspicious Kerberos authentication request was made to accounts that do not require pre-authentication. An attacker might be performing an AS-REP roasting attack to steal passwords and gain further access into the network.</details> | Medium |[T1558.004](https://attack.mitre.org/techniques/T1558/004)| xdr_AsrepRoastingAttack |
100
+
|<aname="okta-privileged-role-assigned-to-application"></a><details><summary>Okta privileged role assigned to application</summary><br>**Description**:<br><br>{ActorAliasName} assigned {RoleDisplayName} role to application: {ApplicationDisplayName}</details> | High |[T1003.006](https://attack.mitre.org/techniques/T1003/006)| xdr_OktaPrivilegedRoleAssignedToApplication |
101
+
|<aname="possible-as-rep-roasting-attack"></a><details><summary>Possible AS-REP roasting attack</summary><br>**Description**:<br><br>A suspicious Kerberos authentication request was made to accounts that do not require preauthentication. An attacker might be performing an AS-REP roasting attack to steal passwords and gain further access into the network.</details> | Medium |[T1558.004](https://attack.mitre.org/techniques/T1558/004)| xdr_AsrepRoastingAttack |
102
102
|<aname="possible-golden-saml-attack"></a><details><summary>Possible Golden SAML attack</summary><br>**Description**:<br><br>A privileged user account authenticated with characteristics that might be related to a Golden SAML attack.</details> | High |[T1071](https://attack.mitre.org/techniques/T1071), [T1606.002](https://attack.mitre.org/techniques/T1606/002)| xdr_PossibleGoldenSamlAttack |
103
103
|<aname="possible-netsync-attack"></a><details><summary>Possible NetSync attack</summary><br>**Description**:<br><br>NetSync is a module in Mimikatz, a post-exploitation tool, that requests the password hash of a target device's password by pretending to be a domain controller. An attacker might be performing malicious activities inside the network using this feature to gain access to the organization's resources.</details> | High |[T1003.006](https://attack.mitre.org/techniques/T1003/006)| xdr_PossibleNetsyncAttack |
104
104
|<aname="possible-account-secret-leak"></a><details><summary>Possible account secret leak</summary><br>**Description**:<br><br>A failed attempt to sign in to a user account by a credential stuffing tool was detected. The error code indicates that the secret was valid but misused. The user account's credentials might have been leaked or are in the possession of an unauthorized party.</details> | Medium |[T1078](https://attack.mitre.org/techniques/T1078)| xdr_CredentialStuffingToolObserved |
@@ -108,12 +108,12 @@ This section describes alerts indicating that a malicious actor might be attempt
108
108
|<aname="possible-service-principal-account-secret-leak"></a><details><summary>Possible service principal account secret leak</summary><br>**Description**:<br><br>A failed attempt to sign in to a service principal account by a credential stuffing tool was detected. The error code indicates that the secret was valid but misused. The service principal account's credentials might have been leaked or are in the possession of an unauthorized party.</details> | Medium |[T1078](https://attack.mitre.org/techniques/T1078)| xdr_CredentialStuffingToolObserved |
109
109
|<aname="possibly-compromised-service-principal-account-signed-in"></a><details><summary>Possibly compromised service principal account signed in</summary><br>**Description**:<br><br>A possibly compromised service principal account signed in. A credential stuffing attempt was successfully authenticated, indicating that the service principal account's credentials might have been leaked or are in the possession of an unauthorized party.</details> | Medium |[T1078](https://attack.mitre.org/techniques/T1078)| xdr_CredentialStuffingToolObserved |
110
110
|<aname="possibly-compromised-user-account-signed-in"></a><details><summary>Possibly compromised user account signed in</summary><br>**Description**:<br><br>A possibly compromised user account signed in. A credential stuffing attempt was successfully authenticated, indicating that the user account's credentials might have been leaked or are in the possession of an unauthorized party.</details> | Medium |[T1078](https://attack.mitre.org/techniques/T1078)| xdr_CredentialStuffingToolObserved |
111
-
|<aname="suspicious-dmsa-related-activity-detected"></a><details><summary>Suspicious DMSA related activity detected</summary><br>**Description**:<br><br>A suspicious DMSA related activity was detected. This may indicate a compromised managed account or an attempt to exploit an DMSA account.</details> | High |[T1555](https://attack.mitre.org/techniques/T1555)| xdr_SuspiciousDmsaAction |
111
+
|<aname="suspicious-dmsa-related-activity-detected"></a><details><summary>Suspicious DMSA related activity detected</summary><br>**Description**:<br><br>A suspicious DMSA related activity was detected. This may indicate a compromised managed account or an attempt to exploit a DMSA account.</details> | High |[T1555](https://attack.mitre.org/techniques/T1555)| xdr_SuspiciousDmsaAction |
112
112
|<aname="suspicious-golden-gmsa-related-activity"></a><details><summary>Suspicious Golden gMSA related activity</summary><br>**Description**:<br><br>A suspicious read activity was made to sensitive group Managed Service Account (gMSA) objects, which could be associated with a threat actor trying to leverage the Golden gMSA attack.</details> | High |[T1555](https://attack.mitre.org/techniques/T1555)| xdr_SuspiciousGoldenGmsaActivity |
113
113
|<aname="suspicious-kerberos-authentication-ap-req"></a><details><summary>Suspicious Kerberos authentication (AP-REQ)</summary><br>**Description**:<br><br>A suspicious Kerberos application request (AP-REQ) was detected. An attacker might be using stolen credentials of a service account to attempt a silver ticket attack. In this kind of attack, an attacker forges a service ticket (Ticket Granting Service or TGS) for a specific service within a network, which allows the attacker to access that service without needing to interact with the domain controller after the initial compromise.</details> | High |[T1558](https://attack.mitre.org/techniques/T1558), [T1558.002](https://attack.mitre.org/techniques/T1558/002)| xdr_SuspiciousKerberosApReq |
114
114
|<aname="suspicious-kerberos-authentication-as-req"></a><details><summary>Suspicious Kerberos authentication (AS-REQ)</summary><br>**Description**:<br><br>A suspicious Kerberos authentication request (AS-REQ) for a ticket-granting ticket (TGT) was observed. This anomalous TGT request is suspected to have been specially crafted by an attacker. The attacker might be using stolen credentials to leverage this attack.</details> | Medium |[T1550](https://attack.mitre.org/techniques/T1550), [T1558](https://attack.mitre.org/techniques/T1558)| xdr_SusKerberosAuth_AsReq |
115
115
|<aname="suspicious-kerberos-authentication-tgt-request-using-tgs-req"></a><details><summary>Suspicious Kerberos authentication (TGT request using TGS-REQ)</summary><br>**Description**:<br><br>A suspicious Kerberos ticket-granting service request (TGS-REQ) involving the Service for User to Self (S4U2self) extension was observed. This anomalous TGS request is suspected to have been specially crafted by an attacker.</details> | Medium |[T1550](https://attack.mitre.org/techniques/T1550), [T1558](https://attack.mitre.org/techniques/T1558)| xdr_SusKerberosAuth_S4U2selfTgsReq |
116
-
|<aname="suspicious-creation-of-esxi-group"></a><details><summary>Suspicious creation of ESXi group</summary><br>**Description**:<br><br>A suspicious VMWare ESXi group was created in the domain. This might indicate that an attacker is trying to get more permissions for later steps in an attack.</details> | High |[T1098](https://attack.mitre.org/techniques/T1098)| xdr_SuspiciousUserAdditionToEsxGroup |
116
+
|<aname="suspicious-creation-of-esxi-group"></a><details><summary>Suspicious creation of ESXi group</summary><br>**Description**:<br><br>A suspicious VMware ESXi group was created in the domain. This might indicate that an attacker is trying to get more permissions for later steps in an attack.</details> | High |[T1098](https://attack.mitre.org/techniques/T1098)| xdr_SuspiciousUserAdditionToEsxGroup |
0 commit comments