Microsoft Defender for Identity Tutorial | Adding a sensor, policy management, account setup, config

แชร์
ฝัง
  • เผยแพร่เมื่อ 15 ต.ค. 2024

ความคิดเห็น • 7

  • @quanghuy147
    @quanghuy147 ปีที่แล้ว

    Thank you for your tutorial!

  • @TonyJuby
    @TonyJuby 2 ปีที่แล้ว +4

    This video was very helpful in configuring MDI. One minor note, if you have never created a gmsa service account you need to run this command to create a root key. Thanks for posting this video.
    Add-KdsRootKey -EffectiveTime ((get-date).addhours(-10))

  • @getoutmore
    @getoutmore 2 ปีที่แล้ว

    my Sensors show as Running on both DCs and I've set up the gMSA Account but I'm not getting any alerts, even when flooding the security log with rdp bruteforce. Any idea what it could be?

  • @titamun
    @titamun 2 ปีที่แล้ว +1

    Hi, do not have the identities option in settings, do you know what could be?

    • @AltaroSoftware
      @AltaroSoftware  2 ปีที่แล้ว +1

      Hi! Make sure you have the proper permissions added to the M365 account you're using to access these settings. Without them, you won't see the option as you've mentioned. Info on the needed permissions can be found here > docs.microsoft.com/en-us/defender-for-identity/role-groups#required-permissions-for-the-microsoft-365-defender-experience

  • @sergiomorante4743
    @sergiomorante4743 2 ปีที่แล้ว

    Is it needed a directory service account (as you create in min 3:01) for receiving alerts in MDI?
    I've tried everything but alerts not showing, between this and conection with MEM has to be I guess.

    • @AltaroSoftware
      @AltaroSoftware  2 ปีที่แล้ว +1

      Hi Sergio, the account created at 3:01 in the video is a managed service account which is the recommended approach today, but it can be just an ordinary user account (should not be Domain Admin), it's only there to read information from the directory. There's no relationship or reliance on MEM in MDI. I suspect that your MDI installation is working as expected (especially if the sensors tab in settings are listing your installed agents) - it should be quiet, unless you've got bad guys in your AD domain. You can test it though by doing your own fake attacks - see docs.microsoft.com/en-us/defender-for-identity/playbook-lab-overview. There are four playbooks you can use to test your detections. Good luck!