You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/investigate-assets.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Investigate assets
3
3
description: This article explains how to investigate suspicious users, computers, and devices with Microsoft Defender for Identity.
4
-
ms.date: 01/17/2024
4
+
ms.date: 07/01/2025
5
5
ms.topic: how-to
6
6
ms.reviewer: LiorShapiraa
7
7
---
@@ -46,8 +46,7 @@ Find identity information in the following Microsoft Defender XDR areas:
46
46
47
47
For example, the following image shows the details on an identity details page:
48
48
49
-

50
-
49
+
:::image type="content" source="media/investigate-assets/investigate-assets.png" alt-text="Screenshot that shows a specific user's page in the Microsoft Defender portal." lightbox="media/investigate-assets/investigate-assets.png":::
51
50
52
51
53
52
### Identity details
@@ -57,7 +56,7 @@ When you investigate a specific identity, you'll see the following details on an
57
56
58
57
|Identity details page area |Description |
59
58
|---------|---------|
60
-
|[Overview tab](/microsoft-365/security/defender/investigate-users#overview)| General identity data, such as the Microsoft Entra identity risk level, the number of devices the user is signed in to, when the user was first and last seen, the user's accounts and more important information. <br><br>Use the **Overview** tab to also view graphs for incidents and alerts, the investigation priority score, an organizational tree, entity tags, and a scored activity timeline. |
59
+
|[Overview tab](/microsoft-365/security/defender/investigate-users#overview)| General identity data, such as the Microsoft Entra identity risk level, the number of devices the user is signed in to, when the user was first and last seen, the user's accounts and more important information. <br><br>Use the **Overview** tab to also view graphs for incidents and alerts, and an organizational tree, entity tags. |
61
60
|[Incidents and alerts](/microsoft-365/security/defender/investigate-users#incidents-and-alerts)| Lists active incidents and alerts involving the user from the last 180 days, including details like alert severity and the time the alert was generated. |
62
61
|[Observed in organization](/microsoft-365/security/defender/investigate-users#observed-in-organization)| Includes the following sub-areas: <br>- **Devices**: The devices that the identity signed in to, including most and least used in the last 180 days. <br>- **Locations**: The identity's observed locations over the last 30 days. <br>- **Groups**: All observed on-premises groups for the identity. <br> - **Lateral movement paths** - all profiled lateral movement paths from the on-premises environment. |
63
62
|[Identity timeline](/microsoft-365/security/defender/investigate-users#timeline)| The timeline represents activities and alerts observed from a user's identity from the last 180 days, unifying identity entries across Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. <br><br>Use the timeline to focus on activities a user performed or were performed on them in specific timeframes. Select the default **30 days** to change the time range to another built-in value, or to a custom range. |
- Direct integrations with other services like Microsoft Defender for Cloud Apps and Microsoft Entra for a hybrid view of what's taking place in both on-premises and hybrid environments
Copy file name to clipboardExpand all lines: ATPDocs/ops-guide/ops-guide-daily.md
-29Lines changed: 0 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,35 +52,6 @@ For more information, see [Work with Defender for Identity's ITDR dashboard (Pre
52
52
53
53
1. When the incident is remediated, resolve it to resolve all linked and related active alerts and set a classification.
54
54
55
-
## Investigate users with a high investigation score
56
-
57
-
**Where**: In Microsoft Defender XDR and in Microsoft Entra.
58
-
59
-
In Microsoft Defender XDR:
60
-
61
-
1. Check the **Users at risk** widget on the **Home** page or the **Entra ID users at risk** on the **Identities > Dashboard** page.
62
-
63
-
1. If you have users listed at *High risk*:
64
-
65
-
- Select **View all users** to review high risk identities in Microsoft Entra.
66
-
- Go to the **Identities** page and sort the grid to view users with high **Investigation priority** scores at the top. Select an identity to view the identity details page, including more details in the **Investigation priority** widget.
67
-
68
-
The investigation priority widget includes the calculated investigation priority score breakdown and a two-week trend for an identity, including whether the identity score is on the high percentile for that tenant.
69
-
70
-
Find more identity-related information on:
71
-
72
-
- Individual alert or incident details pages
73
-
- Device details pages
74
-
- Advanced hunting queries
75
-
- The Action center page
76
-
77
-
**Persona**: SOC analysts
78
-
79
-
For more information, see:
80
-
81
-
-[Investigate users in Microsoft Defender XDR](/microsoft-365/security/defender/investigate-users)
82
-
-[Investigate assets](../investigate-assets.md)
83
-
-[Work with Defender for Identity's ITDR dashboard (Preview)](../dashboard.md)
Copy file name to clipboardExpand all lines: ATPDocs/technical-faq.yml
+1-3Lines changed: 1 addition & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -68,8 +68,6 @@ sections:
68
68
69
69
- **[Microsoft Secure Score posture assessments](/defender-for-identity/security-assessment)**: Identifies common misconfigurations and exploitable components and provides remediation paths to reduce the attack surface.
70
70
71
-
- **[UEBA capabilities](/cloud-app-security/tutorial-ueba)**: Insights into individual user risk through user investigation priority scoring. The score can assist SecOps in their investigations and help analysts understand unusual activities for the user and the organization.
72
-
73
71
- **Native integrations**: Integrates with Microsoft Defender for Cloud Apps and Microsoft Entra ID Protection to provide a hybrid view of what's taking place in both on-premises and hybrid environments.
74
72
75
73
- **Contributes to Microsoft Defender XDR**: Contributes alert and threat data to Microsoft Defender XDR. Microsoft Defender XDR uses the Microsoft 365 security portfolio (identities, endpoints, data, and applications) to automatically analyze cross-domain threat data, building a complete picture of each attack in a single dashboard.
@@ -150,7 +148,7 @@ sections:
150
148
151
149
- question: Does Microsoft Defender for Identity require synchronizing users to Microsoft Entra ID?
152
150
answer: |
153
-
Microsoft Defender for Identity provides security value for all Active Directory accounts including those that are not synced to Microsoft Entra ID. User accounts that are synced to Microsoft Entra ID will also benefit of security value provided by Microsoft Entra ID (based on license level) and of Investigation Priority Scoring.
151
+
Microsoft Defender for Identity provides security value for all Active Directory accounts including those that are not synced to Microsoft Entra ID. User accounts that are synced to Microsoft Entra ID benefit from the security value provided by Microsoft Entra ID based on license level. For more detailse see: [Identity inventory](/defender-for-identity/identity-inventory).
0 commit comments