Loading...

Leveraging the convergence of Microsoft Defender for Identity in Microsoft 365 Defender Portal

Leveraging the convergence of Microsoft Defender for Identity in Microsoft 365 Defender Portal

The Microsoft Defender for Identity portal experience and functionality have been converged into Microsoft’s extended detection and response (XDR) platform, Microsoft 365 Defender. Converging core elements of the legacy Defender for Identity portal into our XDR platform experience you are better able to pair the advanced identity threat detection and investigation capabilities with other security workloads to maximize not only their identity protection but also deliver a more comprehensive security posture.

In this blog post, we explore the remarkable advantages this convergence brings, and guide you through the new ways you can access some of the core elements of the old Identity experience.  

 

One of the most important elements of Microsoft Defender for Identity is the prioritized view of all identity alerts. With the new experience, Microsoft 365 Defender automatically correlates these alerts with information with telemetry from across your Microsoft 365 security. The incident level visibility helps spot the increasingly sophisticated, cross-domain strategies attackers better than siloed alerts and signals. 

 

If you do only want to see Identity related alerts you can select Defender for Identity within the filters at the top of the page to see identity-based incidents and alerts from the last 180 days. Whileinvestigating an alert, you benefit from the broader platform integration and can link alert to incident or further tune itAlert tuning rules provide the ability to create complex exclusion rules that are not available via the exclusion feature. When drilling down into the alert, you can view the alert story which provides important information to help you understand the detected threats. By managing the alert, you can change its status, assign it to a specific persona, and classify it.

From the alert, you can also pivot to the impacted identity page to gather additional information and take remediation actions. 

 

alert page.png

 Figure 1: Microsoft Defender for Identity alert page

 

The Microsoft 365 Defender identity page provides necessary tools and insights to investigate user behavior, detect anomalies, and respond effectively to identity-related security incidents from the different available workloads. There, you can find information such as the Azure Active Directory Identity risk level, organization tree, user accounts, tags, Active Directory control flags, and more. Through the new user page, you can respond to compromised users by disabling their accounts or resetting their passwords. After taking actions on users, you can check the activity details in the action center. 

 

In addition, you can use the unified Identity Timeline, which displays a chronological view of user activities and alerts as it consolidates the user's identity activities across identity workloads such as Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. The timeline allows you to track the user's activities over time to identify notable or suspicious items and then further investigate with various filters and important information about each activity and alert.

user timeline pic.png

 Figure 2: Identity timeline in Microsoft 365 Defender portal


If you observe abnormal activity, you can pivot to the Advanced hunting view within Microsoft 365 Defender to query additional sources for information on advanced threats. Using these queries, you can search through vast amounts of data in a single pane of glass allowing a quick view critical information from across different deployed products. 
For example, in the updated IdentityInfo table, we provide account information (such as the roles assigned to the account) from various sources, including Azure Active Directory. The query below detects Defender for Identity logins which involves a sensitive user account. 

 

 

 

 

//Detect all sensitive logins IdentityLogonEvents | where Application == "Active Directory" //Logins detected by Defender for Identity | where LogonType == "Interactive" //Interactive login type | join kind=inner ( IdentityInfo | where Tags contains "Sensitive" //Only Sensitive identities ) on $left.AccountSid == $right.OnPremSid | summarize SensitiveLogins = count(LogonType) by AccountDisplayName1, DeviceName

 

 

 

 

Additionally, while working with Advanced hunting, you can create custom detection rules that automatically trigger alerts as well as response actions. This proactive monitoring and response capability helps you stay ahead of various events and system states. 

 

The Identities tab in the Microsoft 365 Defender settings page provides a variety of information about your workspace and allows you to adjust environment settings. For example, you can apply entity tags to sensitive or honeytoken accounts, configure detection exclusions to help Microsoft Defender for Identity ignore specific entities and reduce false positive alerts, manage action and directory service accounts for specific users to perform remediation actions, define alert notifications, and more. In the next coming weeks additional functionality from Microsoft Defender for Identity will also be gradually released including the reports feature. This capability will allow customers to either download reports immediately or schedule a report be delivered periodically via email through Microsoft 365 Defender portal. 

 

Identity related security posture assessments are also available within Microsoft 365 Defender. These assessments proactively identify potential identity risks and help reduce overall attack surface and can be accessed through the Secure Score recommended actions section within Microsoft 365 Defender and filtering on Defender for Identity. We continually update our recommendations and release new reports and assessments based on the latest strategies so check back often to ensure you have the latest protections in place.  

 

secure score.png

  Figure 3: Microsoft Defender for Identity's security posture assessments 

 

Thank you to all our customers for your continued support, suggestions, and feedback throughout this entire process. We will continue to work on improving your experience and provide you with the solutions you need to detect, investigate, and respond to identity-based attacks and threats in real time.  

 

Check out our updated documentation to learn more about the Microsoft Defender for Identity user experiences available within the Microsoft 365 Defender portal and follow the What’s New page to stay updated with new releases. 

 

Published on:

Learn more
Microsoft 365 Defender Blog articles
Microsoft 365 Defender Blog articles

Microsoft 365 Defender Blog articles

Share post:

Related posts

The Channel Agent Brings AI Interactions to Teams Channels

Chat and meetings have their agents, and now the Teams channel agent is available to help members understand what happens inside channels. Lik...

10 hours ago

Microsoft Teams: Browser selection for links in Teams Mobile

Starting February 2026, Teams Mobile on Android and iOS will prompt users to choose a browser for non-Office and PDF links, encouraging Micros...

1 day ago

Teams application update needed to enable Explicit Recording Consent feature on Teams Phone Devices

Microsoft Teams Phone Devices will require app version 1449/1.0.94.2025443703 to enable Explicit Recording Consent for 1:1 VoIP calls starting...

3 days ago

Microsoft Teams: Create custom environments and templates for immersive events in Microsoft Teams

This release brings the next evolution in immersive collaboration in Teams. Designed for creators and event organizers, these new capabilities...

3 days ago

Microsoft Copilot (Microsoft 365): Structured Document Generation with Forms

Structured Document Generation with Forms enables organizations to create, manage, and generate standardized documents at scale with built-in ...

3 days ago

Power Pages + Azure AD B2C: “The Provided Application Is Not Valid” Error

If you are new to configuring Azure AD B2C as Identity Provider in Power Pages, refer Power Pages : Set up Azure AD B2C After completing the s...

3 days ago

Microsoft 365 & Power Platform Community Call – January 8th, 2026 – Screenshot Summary

Call Highlights   SharePoint Quicklinks: Primary PnP Website: https://aka.ms/m365pnp Documentation & Guidance SharePoint Dev Videos Issues...

4 days ago

Microsoft 365 admin center multifactor authentication enforcement

Starting February 9, 2026, Microsoft will enforce mandatory multi-factor authentication (MFA) for all users signing into the Microsoft 365 adm...

4 days ago

SharePoint Embedded apps can now archive containers to reduce storage costs and improve Copilot results

SharePoint Embedded apps will support container archival starting February 2026, reducing storage costs by up to 75% and improving Copilot sea...

4 days ago

Microsoft Teams admin center: New Teams External Collaboration Administrator role

Microsoft Teams will introduce a new Teams External Collaboration Administrator RBAC role by mid-February 2026, allowing admins to manage exte...

4 days ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy