Microsoft Defender for Identity Flashcards

1
Q

What solution replaces Microsoft Advanced Threat Analytics

A

Microsoft Defender for Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where does Defender for Identity get logs from to analyze?

A

On-premises Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How long does it take for Defender for Identity to start detecting known malicious attacks?

A

Immediately after Deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How long does it take for Defender to detect suspicious behavioral activities?

A

3 Weeks after Deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List 4 ways that Defender for Identity identifies suspicious activities and advanced attacks across the cyber-attack kill-chain.

A
  • Reconnaissance: Identify suspicious information collection.
  • Compromised Credentials
  • Lateral Movement
  • Domain dominance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly