Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement. Microsoft Security helps protect people and data against cyberthreats to give peace of mind.
Do You Manage Peer Insights at Microsoft?
Access Vendor Portal to update and manage your profile.
Between the things that I like the most are the holistic identity visibility. One of the biggest strengths is the unified identity view. It correlates identities across multiple systems, so security teams can see a single, consolidated profile of a user, including privileges and risk signals. Defender for Identity is particularly good at detecting classic identity-based attacks, such as lateral movement, credential theft, and privilege escalation. It monitors behavior patterns and flash anomalies early in the attack chain. The automated response capabilities is also very helpful. It can trigger automated actions like blocking access, enforcing conditional access, or escalating incidents - helping SOC teams respond faster without manual intervention.
The best feature is the strong identity-based threat detection. The behavioral analytics engine does an excellent job of detecting attacks such as Pass-the-Hash, Golden Ticket attacks, as well as identifying suspicious lateral movement. The attack timeline and entity mapping make it very easy to understand how an incident unfolded and can significantly speed up investigations. Another positive for MDI is its seamless integration with the Microsoft Security Ecosystem, embedded within Defender XDR, a truly unified experience can be achieved across endpoints, email, cloud apps and identities. Finally, its very low maintenance once setup. From an admin perspective, its heavily reliant on simple sensor deployment on domain controllers with minimal infrastructure maintenance and updates.
1. Active Directory focused detection. The detections around threats like lateral movement of credential theft were strong and gave us visibility we didn't have previously, to the point where we found real bad actors threats within the first month as a result. 2. Good context within Microsoft Defender XDR. Alerts come in with timelines and excellent context which enables faster triage without the pain points of engaging in raw log hunting. 3. Integration with the rest of the Microsoft Security stack made correlation clean and reduced much of the tool and context switching that came come from having disparate tools.
The fact that the best value is only inside the Microsoft Ecosystem. Defender for Identity works best if you're already heavily invested in Microsoft. Outside that ecosystem, it can feel limited compared to more vendor-agnostic ITDR tools. Compared to some newer ITDR platforms, customization and tuning options can feel restricted. You often rely on Microsoft's built-in detections rather than crafting your own logic. Also, it is powerful, but it's really just one component of a broader Defender suite. If you're looking for a single, independent ITDR product, this may feel incomplete without the rest of the stack.
One of the biggest drawbacks is the lack of use outside of Microsoft environments. While this is great within our Microsoft stack, we are left looking at other vendors for Identity protection among many of our other platforms. Also, during setup and onboarding, the platform can become very noisy with a lot of false-positive alerts. You will find that a lot of time needs to be allocated to tuning alerts in the early days to make best use of your analysts time. Finally, the flexibility and granular controls you would expect from a Microsoft solution are not present here. This is very much an off-the-shelf product with little room to customise if your environment has a particular niche.
1. Initial setup can be painful if you don't have a solid understanding of your Active Directory topology, otherwise it's far too easy to scope sensors improperly or even misread alerts. 2. While detection is strong, the native one-click remediation actions are quite a bit lighter than what I've seen from other tools. Manual playbooks or custom created automated remediations are still required. 3. Pricing was reasonable given the number of identities and DCs we were working with, but it's still something to consider if you still have a small AD footprint still.