This is the Trace Id: d3c33ef8621511ba01a998dd743178cc
Skip to main content Why Microsoft Security AI-powered cybersecurity Cloud security Data security & governance Identity & network access Privacy & risk management Security for AI Unified SecOps Zero Trust Microsoft Defender Microsoft Entra Microsoft Intune Microsoft Priva Microsoft Purview Microsoft Sentinel Microsoft Security Copilot Microsoft Entra ID (Azure Active Directory) Microsoft Entra Agent ID Microsoft Entra External ID Microsoft Entra ID Governance Microsoft Entra ID Protection Microsoft Entra Internet Access Microsoft Entra Private Access Microsoft Entra Permissions Management Microsoft Entra Verified ID Microsoft Entra Workload ID Microsoft Entra Domain Services Azure Key Vault Microsoft Sentinel Microsoft Defender for Cloud Microsoft Defender XDR Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Defender for Identity Microsoft Defender for Cloud Apps Microsoft Security Exposure Management Microsoft Defender Vulnerability Management Microsoft Defender Threat Intelligence Microsoft Defender Suite for Business Premium Microsoft Defender for Cloud Microsoft Defender Cloud Security Posture Mgmt Microsoft Defender External Attack Surface Management Azure Firewall Azure Web App Firewall Azure DDoS Protection GitHub Advanced Security Microsoft Defender for Endpoint Microsoft Defender XDR Microsoft Defender for Business Microsoft Intune core capabilities Microsoft Defender for IoT Microsoft Defender Vulnerability Management Microsoft Intune Advanced Analytics Microsoft Intune Endpoint Privilege Management Microsoft Intune Enterprise Application Management Microsoft Intune Remote Help Microsoft Cloud PKI Microsoft Purview Communication Compliance Microsoft Purview Compliance Manager Microsoft Purview Data Lifecycle Management Microsoft Purview eDiscovery Microsoft Purview Audit Microsoft Priva Risk Management Microsoft Priva Subject Rights Requests Microsoft Purview Data Governance Microsoft Purview Suite for Business Premium Microsoft Purview data security capabilities Pricing Services Partners Cybersecurity awareness Customer stories Security 101 Product trials How we protect Microsoft Industry recognition Microsoft Security Insider Microsoft Digital Defense Report Security Response Center Microsoft Security Blog Microsoft Security Events Microsoft Tech Community Documentation Technical Content Library Training & certifications Compliance Program for Microsoft Cloud Microsoft Trust Center Security Engineering Portal Service Trust Portal Microsoft Secure Future Initiative Business Solutions Hub Contact Sales Start free trial Microsoft Security Azure Dynamics 365 Microsoft 365 Microsoft Teams Windows 365 Microsoft AI Azure Space Mixed reality Microsoft HoloLens Microsoft Viva Quantum computing Sustainability Education Automotive Financial services Government Healthcare Manufacturing Retail Find a partner Become a partner Partner Network Microsoft Marketplace Marketplace Rewards Software development companies Blog Microsoft Advertising Developer Center Documentation Events Licensing Microsoft Learn Microsoft Research View Sitemap

Microsoft Defender for Identity

Detect and respond to advanced identity cyberthreats across your identity fabric.
Person wearing an orange sweater working on a laptop indoors.
OVERVIEW

Identity threat detection and response for the SOC

Use Defender for Identity to deliver enriched identity insights and help your security operations teams better prevent, detect, and respond to identity-based cyberthreats.
  • Gain a deeper understanding of your organization’s unique identity landscape. Dedicated sensors and connectors provide rich insights into the identities, environments and applications that make up your identity fabric. These signals are then automatically correlated with data from other security domains to further augment and enrich insights across the platform.
  • Surface identity-specific identities to streamline your security hardening, incident investigation, and threat-response initiatives.
    A person typing on a laptop.
  • Automate response to identity threats and compromised identities to stop identity cyberattacks in real time.
    Person wearing headphones working at a desk with two monitors and holding a smartphone.

Capabilities

Prevent, detect, and respond to advanced identity threats across your identity fabric with Defender.

Dedicated sensors for on-premises infrastructure

Specialized sensors monitor critical on-premises identity infrastructure to provide unparalleled visibility and protection.

Native integration with Microsoft Entra ID

Integration between Microsoft Entra and Defender for Identity fosters collaboration across identity and security teams with consistent data, alerts, and workflows across teams and experiences.

Purpose-built connectors

Platform-level connectors bring insights from cloud identity providers and other elements of modern identity fabrics to further extend protection and enrich your understanding of your overall identity footprint.

Proactive posture and vulnerability management

Minimize your cyberattack surface area and harden your security posture with identity-specific recommendations to resolve vulnerabilities and close potential attack paths.

Advanced identity-threat detections

Spot identity cyberthreats in real time with preconfigured alerts and detections for common and emerging cyberattack patterns.

Powerful automation

Respond to threats at machine speed. Immediately restrict identities confirmed as compromised so they can’t persist in your organization or be further exploited.

Streamlined deployment

Quickly activate identity protections for qualifying on-premises infrastructure with the new pre-installed agent.

Enhanced identity inventory

Deliver true identity-level insights with linkages between accounts across environments, applications, and vendors.

Non-human identity protection

Monitor, secure, and manage non-human identities across your organization with Microsoft Defender for Identity.
THE INTEGRATED SOC

Unified security operations

Anticipate and stop cyberattacks with an AI-driven defense that unifies prevention, detection, and response, all in Microsoft Defender.

Modernize your identity defense with ITDR

Enable identity threat detection and response across your identity landscape using Microsoft Entra and Defender for Identity solutions.
A person sitting at a table with a cup and a tablet.
Resource library

Cybersecurity and AI news

Discover the latest trends and best practices in cyberthreat protection and AI for cybersecurity.
A group of people sitting in front of computers.
Get started

Protect everything

Make your future more secure. Explore your security options today.

Follow Microsoft Security