Microsoft Defender for Identity Flashcards
1
Q
What solution replaces Microsoft Advanced Threat Analytics
A
Microsoft Defender for Identity
2
Q
Where does Defender for Identity get logs from to analyze?
A
On-premises Active Directory
3
Q
How long does it take for Defender for Identity to start detecting known malicious attacks?
A
Immediately after Deployment
4
Q
How long does it take for Defender to detect suspicious behavioral activities?
A
3 Weeks after Deployment
5
Q
List 4 ways that Defender for Identity identifies suspicious activities and advanced attacks across the cyber-attack kill-chain.
A
- Reconnaissance: Identify suspicious information collection.
- Compromised Credentials
- Lateral Movement
- Domain dominance