As most organizations embrace cloud environments, identity-based attacks have become more aggressive and frequent than ever. Microsoft’s eye-opening Digital Defense Report 2024 reveals a staggering 600 million identity attacks every single day! These numbers highlight a harsh reality: your identity, and the identities of everyone in your Microsoft 365 organization, are prime targets!

To help you stay ahead of these relentless identity threats, Microsoft provides the Identity Threat Detection and Response (ITDR) dashboard. This centralized dashboard allows you to assess your identity security posture, identify vulnerabilities, and take action to strengthen your defenses.

So, buckle up—let’s dive into how Microsoft Defender’s ITDR dashboard helps you stand strong against the tide of identity threats!

What is Identity Threat Detection and Response?

Identity Threat Protection and Response (ITDR) is a cybersecurity solution that helps detect, investigate, and respond to threats targeting user identities. Imagine an attacker stealing a user’s password and trying to access data from a foreign country.

ITDR continuously monitors user behavior for suspicious activity, such as unusual login locations, or unrecognized devices and alerts security teams to potential threats. It allows you to investigate alerts, block attackers, and secure compromised accounts to protect your organization’s data from identity-based attacks.

To put ITDR into action, Microsoft 365 Defender offers a dedicated ITDR dashboard that brings these detection and response capabilities into a single view for security teams.

How Does the ITDR Dashboard Help Detect Identity Threats in Microsoft 365?

The Identity Threat Detection and Response (ITDR) dashboard plays a central role in Microsoft Defender for Identity and Defender XDR. It helps security teams quickly detect and respond to identity-based threats across Microsoft 365 and on-premises environments. Here’s how its capabilities support your organization in identifying and mitigating threats:

  1. Centralized Identity Threat View: Offers a unified, prioritized view of identity risks and recommendations for security operations teams.
  2. Insights into Suspicious Activity: Showcases detection data for risks such as lateral movement, credential theft, unusual admin actions, and risky sign-ins.
  3. Highlights At-Risk Identities: Flags users with high privileges, exposed tokens, or abnormal behavior.
  4. Correlates Multiple Signals: Links identity data with device, app, and network activity for deeper threat analysis.
  5. Enables Quick Response: The ITDR dashboard helps streamline identity threat detection while accelerating incident investigation and response.

Prerequisites to Access Identity Threat Detection and Response Dashboard

To access the Identity Threat Detection and Response dashboard in Microsoft Defender, ensure the following requirements are met:

  • License Requirements: You must have a Microsoft Defender for Identity license and an Entra ID Protection license.
  • Role Requirements: At a minimum, you must have the Security Reader role to access the dashboard. The Global Administrator role is required to take action on the suggested security recommendations.

How to Access Identity Threat Detection and Response Dashboard?

Here’s how to access the ITDR dashboard in Microsoft 365 to view and improve your identity security posture.

  1. Sign in to the Microsoft Defender portal.
  2. Go to Identities > Dashboard.
Identity Threat Detection and Response Dashboard

Key Insights Provided by the Microsoft Defender ITDR Dashboard

Without further delay, let’s explore the key insights provided by Microsoft Defender’s Identity Threat Detection and Response (ITDR) dashboard.

  1. Overview of identities
  2. Top insights on risky and dormant users
  3. ITDR deployment health status
  4. Microsoft Identity secure score
  5. High privileged entities list
  6. Identity related incidents
  7. Domains with unsecured configuration
  8. Entra ID active users at risk

1. Overview of User Identity Distribution Across Environments

The ITDR dashboard offers a visual breakdown of identities across Entra ID, on-premises Active Directory, and hybrid configurations. This helps security teams understand where identities reside and how they’re distributed across environments.

User Identities in Identity Threat Detection and Response Dashboard

When you click on the respective card, you’re taken to the Microsoft Defender Advanced Hunting platform. There, you can run pre-defined queries using Kusto Query Language (KQL) to get detailed information about each user within a few clicks.

2. Top Insights on Risky and Dormant Users in ITDR

This section provides two key insights that help identify potential security risks and inactive accounts. These include Users Identified in a Risky Lateral Movement Path and Dormant Active Directory Users.

Top Insights in Identity Threat Detection and Response Dashboard

Users Identified in a Risky Lateral Movement Path

The Top Insights widget shows how many sensitive accounts are exposed through risky lateral movement paths. Lateral movement happens when attackers use non-sensitive accounts to eventually access sensitive ones across your network. These paths open up opportunities for attackers and increase security risks.

Based on the insights, you can take immediate actions—such as removing the entity from a group or revoking local administrator permissions assigned to the user account.

Dormant Active Directory Users

This card highlights user accounts that have been inactive for at least 180 days. It specifically lists unused accounts that still belong to sensitive groups, posing a potential security risk.

In response to these findings, consider removing inactive Active Directory users from sensitive groups in your on-premises environment to reduce security risks.

3. ITDR Deployment Health Status in Microsoft Defender

The ITDR Deployment Health section provides a quick overview of the Microsoft Defender for Identity sensors deployment status. It helps ensure that sensors are healthy and running as expected. This is an essential step for monitoring your on-premises Active Directory for threats and suspicious activity.

ITDR Deployment Health Status

It also highlights deployment issues including disconnected sensors. It also shows the license status for Defender for Identity and Entra ID Protection, helping you identify gaps before they impact security.

4. Microsoft Entra Identity Secure Score

Identity Secure Score is Microsoft’s way of measuring how well your organization’s identity configurations align with recommended security best practices. It evaluates protections around user accounts, role assignments, password policies, MFA usage, and other identity-related configurations.

Microsoft Entra Identity Secure Score

This section displays the Identity Secure Score of your organization, with options to Improve Your Score and View History. Clicking “Improve Your Score” shows recommended actions to boost your security, such as enabling MFA, minimizing global admins, and configuring sign-in risk policies. As you implement these improvements, the score updates automatically. The “View History” option allows you to track your Identity Secure Score progress over time.

5. High Privileged Identities in Microsoft Entra ID

The highly privileged identities list highlights sensitive user accounts in your Microsoft 365 and hybrid organizations. It lists global administrators, Entra ID security administrators, and accounts that are manually tagged as sensitive. For each priority account, it displays details like username, source, user type, and the assigned role or sensitivity tag.

High Privileged Identities in Identity Threat Detection and Response Dashboard

This insight helps you regularly monitor and review high-impact accounts in Microsoft 365 and Active Directory. When you select a user, you’ll see essential details such as their risk level, related actions, an account overview, and the Conditional Access policies applied to them.

6. Microsoft Identity Related Alerts and Incidents

This section displays alerts from both Defender for Identity and Microsoft Entra ID Protection, along with any related incidents from the past 30 days. By showing only relevant identity-based alerts, it ensures that critical incidents stand out and aren’t lost in a flood of notifications.

Incidents in Identity Threat Detection and Response Dashboard

You can identify patterns and trends in these Microsoft 365 activity alerts to support a proactive response. Based on the detected risk level, you can configure automatic remediation actions. For example, requiring a password change or enforcing strong authentication through risk-based Conditional Access policies.

7. Active Directory Domains with Unsecured Configuration

Identifying Active Directory domains with unsecured configurations is critical, as these weaknesses act like open doors for attackers. To help mitigate this, Microsoft Defender for Identity continuously monitors your environment and flags any domains with settings that pose a security risk.

For instance, if LDAP signing is not enforced, attackers can exploit this to compromise domain accounts. This becomes even more dangerous when those accounts hold privileged access.

This dashboard lists the Active Directory domains with insecure configurations, giving administrators a clear starting point to strengthen security. With this insight, admins can take targeted action to apply security best practices and reduce the risk of identity compromise.

Domains with unsecured configurations in ITDR

8. Active Risky Users in Microsoft Entra ID

Proactively identifying and managing Entra ID risky users is essential to maintaining a strong security posture and reducing vulnerabilities. This dashboard highlights active user accounts that may be exposed to threats, show unusual activity, or face a risk of compromise. It includes both high and low-risk users.

Active risky users in ITDR Dashboard

Final Impressions

Ultimately, securing your organization comes down to a clear vision and swift action. The ITDR dashboard is your strategic lens, exposing hidden identity risks from lateral movement to misconfigurations. It not only helps you see the whole picture and act decisively but also provides guided links for deeper insights.

Complementing this, further enhance your defenses with the Entra ID Protection dashboard, your proactive shield. These aren’t just tools; they’re your essential safeguards, empowering you to detect, investigate, and respond to identity threats with confidence. Strengthen your security posture, one insight at a time. Happy securing!