Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
Defender for Identity enables SecOp analysts and security professionals struggling to detect advanced attacks in hybrid environments to:
⢠Monitor users, entity behavior, and activities with learning-based analytics
⢠Protect user identities and credentials stored in Active Directory
⢠Identify and investigate suspicious user activities and advanced attacks throughout the kill chain
⢠Provide clear incident information on a simple timeline for fast triage
As part of securing your Identity, in this offer Bulletproof will:
⢠Configure required permissions for the Microsoft 365 Defender experience and Role Groups if needed
⢠Enable Microsoft Defender for Identity instance
⢠If needed, configure endpoint proxy and Internet connectivity settings for your Microsoft Defender for Identity sensor
⢠Plan capacity for Microsoft Defender for Identity deployment
⢠Configure domain service account DSA or gMSA
⢠Install Sensor on Domain Controllers
⢠Configure Windows Event Collection
⢠Configure Microsoft Defender for Identity action accounts
⢠Integrate MDI and other Defender solutions if needed
⢠Enable Azure Sentinel Data Connector if needed
⢠Configure Sensitive users and Honeytoken accounts
⢠Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity
Who will benefit the most out of this implementation:
⢠Customers with E5 or MDI standalone licenses who need help in implementation
⢠Customers who need to know what are the benefits of using Defender for Identity
⢠Customers who are exploring the use of Sentinel, and needs to enable all the Defender suite solutions to get full value of the Microsoft Defender suite.
⢠Customers who are in their journey in securing identities on-prem and in the cloud