docs.microsoft.com
Open in
urlscan Pro
2a02:26f0:2b00:3ae::353e
Public Scan
Submitted URL: https://aka.ms/atasaguide-recenum
Effective URL: https://docs.microsoft.com/en-us/defender-for-identity/reconnaissance-alerts
Submission: On September 09 via api from US — Scanned from DE
Effective URL: https://docs.microsoft.com/en-us/defender-for-identity/reconnaissance-alerts
Submission: On September 09 via api from US — Scanned from DE
Form analysis
5 forms found in the DOMName: nav-bar-search-form — GET /en-us/search/
<form class="nav-bar-search-form" method="GET" name="nav-bar-search-form" role="search" id="nav-bar-search-form" aria-label="Search" aria-expanded="false" action="/en-us/search/">
<div class="autocomplete" data-bi-name="autocomplete"><!---->
<div class="control ">
<input role="combobox" maxlength="100" aria-autocomplete="list" autocapitalize="off" autocomplete="off" autocorrect="off" spellcheck="false" id="site-search-input" class="autocomplete-input input is-small" type="search" name="terms"
aria-expanded="false" aria-owns="ax-32-listbox" aria-activedescendant="" aria-label="Search" placeholder="Search">
<span aria-hidden="true" class="icon is-small is-left" hidden="">
<span class="has-text-primary docon docon-undefined"></span>
</span>
<span aria-hidden="true" class="autocomplete-loader loader has-text-primary " hidden=""></span>
</div>
<ul class="autocomplete-suggestions is-vertically-scrollable" role="listbox" id="ax-32-listbox" aria-label="site-search-input-suggestions" hidden="">
</ul><!---->
</div>
<!-- mobile safari will not dispatch submit event unless there's a submit button that is not display:none -->
<button type="submit" class="visually-hidden" tabindex="-1" aria-hidden="true"></button>
<input name="category" hidden="" value="">
<input name="scope" hidden="" value="Defender for Identity">
</form>
Name: nav-bar-search-form — GET /en-us/search/
<form class="nav-bar-search-form" method="GET" name="nav-bar-search-form" role="search" id="nav-bar-search-form-desktop" aria-label="Search" aria-expanded="false" action="/en-us/search/">
<div class="autocomplete" data-bi-name="autocomplete"><!---->
<div class="control has-icons-left">
<input role="combobox" maxlength="100" aria-autocomplete="list" autocapitalize="off" autocomplete="off" autocorrect="off" spellcheck="false" id="ax-33" class="autocomplete-input input control has-icons-left is-small" type="search" name="terms"
aria-expanded="false" aria-owns="ax-34-listbox" aria-activedescendant="" aria-label="Search" placeholder="Search">
<span aria-hidden="true" class="icon is-small is-left">
<span class="has-text-primary docon docon-search"></span>
</span>
<span aria-hidden="true" class="autocomplete-loader loader has-text-primary " hidden=""></span>
</div>
<ul class="autocomplete-suggestions is-vertically-scrollable" role="listbox" id="ax-34-listbox" aria-label="ax-33-suggestions" hidden="">
</ul><!---->
</div>
<!-- mobile safari will not dispatch submit event unless there's a submit button that is not display:none -->
<button type="submit" class="visually-hidden" tabindex="-1" aria-hidden="true"></button>
<input name="category" hidden="" value="">
<input name="scope" hidden="" value="Defender for Identity">
</form>
javascript:
<form action="javascript:" role="search" aria-label="Search" class="has-margin-bottom-small"><label class="visually-hidden" for="ax-35">Search</label>
<div class="autocomplete is-block" data-bi-name="autocomplete"><!---->
<div class="control has-icons-left">
<input role="combobox" maxlength="100" aria-autocomplete="list" autocapitalize="off" autocomplete="off" autocorrect="off" spellcheck="false" id="ax-35" class="autocomplete-input input control has-icons-left is-full-width is-small" type="text"
aria-expanded="false" aria-owns="ax-36-listbox" aria-activedescendant="" placeholder="Filter by title">
<span aria-hidden="true" class="icon is-small is-left">
<span class="has-text-primary docon docon-filter-settings"></span>
</span>
<span aria-hidden="true" class="autocomplete-loader loader has-text-primary " hidden=""></span>
</div>
<ul class="autocomplete-suggestions is-vertically-scrollable" role="listbox" id="ax-36-listbox" aria-label="ax-35-suggestions" hidden="">
</ul><!---->
</div>
</form>
<form class="feedback-verbatim-form is-hidden" id="rating-container-desktop">
<div class="verbatim-textarea box position-relative box-shadow-none border has-margin-top-small has-padding-extra-small font-size-xs">
<label for="rating-textarea-desktop" class="visually-hidden">Any additional feedback?</label>
<textarea id="rating-textarea-desktop" rows="4" maxlength="999" placeholder="Any additional feedback?" required="" class="textarea border-none box-shadow-none has-inner-focus"></textarea>
</div>
<p class="font-size-xs has-line-height-reset">Feedback will be sent to Microsoft: By pressing the submit button, your feedback will be used to improve Microsoft products and services.
<a href="https://privacy.microsoft.com/en-us/privacystatement">Privacy policy.</a></p>
<div class="buttons is-right margin-top-xs has-margin-right-extra-small">
<button class="skip-rating button is-transparent has-text-primary is-small border-none" type="button">Skip</button>
<button class="submit-rating button is-primary is-small" data-bi-name="rating-verbatim" disabled="" type="submit">Submit</button>
</div>
</form>
<form class="feedback-verbatim-form is-hidden" id="rating-container-mobile">
<div class="verbatim-textarea box position-relative box-shadow-none border has-margin-top-small has-padding-extra-small font-size-xs">
<label for="rating-textarea-mobile" class="visually-hidden">Any additional feedback?</label>
<textarea id="rating-textarea-mobile" rows="4" maxlength="999" placeholder="Any additional feedback?" required="" class="textarea border-none box-shadow-none has-inner-focus"></textarea>
</div>
<p class="font-size-xs has-line-height-reset">Feedback will be sent to Microsoft: By pressing the submit button, your feedback will be used to improve Microsoft products and services.
<a href="https://privacy.microsoft.com/en-us/privacystatement">Privacy policy.</a></p>
<div class="buttons is-right margin-top-xs has-margin-right-extra-small">
<button class="skip-rating button is-transparent has-text-primary is-small border-none" type="button">Skip</button>
<button class="submit-rating button is-primary is-small" data-bi-name="rating-verbatim" disabled="" type="submit">Submit</button>
</div>
</form>
Text Content
Skip to main content We use cookies to improve your experience on our websites and for advertising. Privacy Statement Accept all Manage cookies This browser is no longer supported. Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. Download Microsoft Edge More info Documentation Global navigation * Docs * Documentation * Learn * Q&A * Code Samples * More * Documentation * Learn * Q&A * Code Samples Search Sign in * Profile * Collections * Challenges Sign out * Docs * Tutorials * Reconnaissance alerts Contents Exit focus mode * Read in English * Save * Feedback * Edit * Share * Twitter * LinkedIn * Facebook * Email Table of contents Search * Microsoft Defender for Identity Documentation * Overview * Quickstarts * Create your Defender for Identity instance * Connect to Active Directory * Download the Defender for Identity sensor package * Install the Defender for Identity sensor * Tutorials * Reconnaissance alerts * Compromised credential alerts * Lateral movement alerts * Domain dominance alerts * Exfiltration alerts * Investigate a user * Investigate a computer * Investigate lateral movement paths * Investigate entities * Concepts * How-to guides * Reference * Resources Download PDF TUTORIAL: RECONNAISSANCE ALERTS * 12/23/2020 * 16 minutes to read * * d * r * s * D * m IN THIS ARTICLE 1. Account enumeration reconnaissance (external ID 2003) 2. Active Directory attributes reconnaissance (LDAP) (external ID 2210) 3. Network-mapping reconnaissance (DNS) (external ID 2007) 4. Security principal reconnaissance (LDAP) (external ID 2038) 5. User and Group membership reconnaissance (SAMR) (external ID 2021) 6. User and IP address reconnaissance (SMB) (external ID 2012) 7. See Also Typically, cyberattacks are launched against any accessible entity, such as a low-privileged user, and then quickly move laterally until the attacker gains access to valuable assets. Valuable assets can be sensitive accounts, domain administrators, or highly sensitive data. Microsoft Defender for Identity identifies these advanced threats at the source throughout the entire attack kill chain and classifies them into the following phases: 1. Reconnaissance 2. Compromised credentials 3. Lateral Movements 4. Domain dominance 5. Exfiltration To learn more about how to understand the structure, and common components of all Defender for Identity security alerts, see Understanding security alerts. For information about True positive (TP), Benign true positive (B-TP), and False positive (FP), see security alert classifications. The following security alerts help you identify and remediate Reconnaissance phase suspicious activities detected by Defender for Identity in your network. In this tutorial, learn how to understand, classify, remediate, and prevent the following types of attacks: * Account enumeration reconnaissance (external ID 2003) * Active Directory attributes reconnaissance (LDAP) (external ID 2210) * Network mapping reconnaissance (DNS) (external ID 2007) * Security principal reconnaissance (LDAP) (external ID 2038) * User and Group membership reconnaissance (SAMR) (external ID 2021) * User and IP address reconnaissance (SMB) (external ID 2012) ACCOUNT ENUMERATION RECONNAISSANCE (EXTERNAL ID 2003) Previous name: Reconnaissance using account enumeration Description In account enumeration reconnaissance, an attacker uses a dictionary with thousands of user names, or tools such as KrbGuess in an attempt to guess user names in the domain. Kerberos: Attacker makes Kerberos requests using these names to try to find a valid username in the domain. When a guess successfully determines a username, the attacker gets the Preauthentication required instead of Security principal unknown Kerberos error. NTLM: Attacker makes NTLM authentication requests using the dictionary of names to try to find a valid username in the domain. If a guess successfully determines a username, the attacker gets the WrongPassword (0xc000006a) instead of NoSuchUser (0xc0000064) NTLM error. In this alert detection, Defender for Identity detects where the account enumeration attack came from, the total number of guess attempts, and how many attempts were matched. If there are too many unknown users, Defender for Identity detects it as a suspicious activity. The alert is based on authentication events from sensors running on domain controller and AD FS servers. MITRE Table 1 Primary MITRE tactic Discovery (TA0007) MITRE attack technique Account Discovery (T1087) MITRE attack sub-technique Domain Account (T1087.002) Learning period None TP, B-TP, or FP Some servers and applications query domain controllers to determine if accounts exist in legitimate usage scenarios. To determine if this query was a TP, BTP, or FP, select the alert to get to its detail page: 1. Check if the source computer was supposed to perform this type of query. Examples of a B-TP in this case could be Microsoft Exchange servers or human resource systems. 2. Check the account domains. * Do you see additional users who belong to a different domain? A server misconfiguration such as Exchange/Skype or ADSF can cause additional users that belong to different domains. * Look at the configuration of the problematic service to fix the misconfiguration. If you answered yes to the questions above, it's a B-TP activity. Close the security alert. As the next step, look at the source computer: 1. Is there a script or application running on the source computer that could generate this behavior? * Is the script an old script running with old credentials? If yes, stop and edit or delete the script. * Is the application an administrative or security script/application that is supposed to run in the environment? If you answered yes to previous question, Close the security alert and exclude that computer. It's probably a B-TP activity. Now, look at the accounts: Attackers are known to use a dictionary of randomized account names to find existing account names in an organization. 1. Do the non-existing accounts look familiar? * If the non-existing accounts look familiar, they may be disabled accounts or belong to employees who left the company. * Check for an application or script that checks to determine which accounts still exist in Active Directory. If you answered yes to one of the previous questions, Close the security alert, it's probably a B-TP activity. 2. If any of the guess attempts match existing account names, the attacker knows of the existence of accounts in your environment and can attempt to use brute force to access your domain using the discovered user names. * Check the guessed account names for additional suspicious activities. * Check to see if any of the matched accounts are sensitive accounts. Understand the scope of the breach 1. Investigate the source computer 2. If any of the guess attempts match existing account names, the attacker knows of the existence of accounts in your environment, and can use brute force to attempt to access your domain using the discovered user names. Investigate the existing accounts using the user investigation guide. Note Examine the evidence to learn the authentication protocol used. If NTLM authentication was used, enable NTLM auditing of Windows Event 8004 on the domain controller to determine the resource server the users attempted to access. Windows Event 8004 is the NTLM authentication event that includes information about the source computer, user account, and server that the source user account attempted to access. Defender for Identity captures the source computer data based on Windows Event 4776, which contains the computer defined source computer name. Using Windows Event 4776 to capture this information, the information source field is occasionally overwritten by the device or software and only displays Workstation or MSTSC as the information source. In addition, the source computer might not actually exist on your network. This is possible because adversaries commonly target open, internet-accessible servers from outside the network and then use it to enumerate your users. If you frequently have devices that display as Workstation or MSTSC, make sure to enable NTLM auditing on the domain controllers to get the accessed resource server name. You should also investigate this server, check if it is opened to the internet, and if you can, close it. 3. When you learn which server sent the authentication validation, investigate the server by checking events, such as Windows Event 4624, to better understand the authentication process. 4. Check if this server is exposed to the internet using any open ports. For example, is the server open using RDP to the internet? Suggested remediation and steps for prevention 1. Contain the source computer. 1. Find the tool that performed the attack and remove it. 2. Look for users who were logged on around the same time as the activity occurred, as these users may also be compromised. 3. Reset their passwords and enable MFA or, if you've configured the relevant high-risk user policies in Azure Active Directory Identity Protection, you can use the Confirm user compromised action in the Cloud App Security portal. 2. Enforce Complex and long passwords in the organization. Complex and long passwords provide the necessary first level of security against brute-force attacks. Brute force attacks are typically the next step in the cyber-attack kill chain following enumeration. ACTIVE DIRECTORY ATTRIBUTES RECONNAISSANCE (LDAP) (EXTERNAL ID 2210) Description Active Directory LDAP reconnaissance is used by attackers to gain critical information about the domain environment. This information can help attackers map the domain structure, as well as identify privileged accounts for use in later steps in their attack kill chain. Lightweight Directory Access Protocol (LDAP) is one of the most popular methods used for both legitimate and malicious purposes to query Active Directory. MITRE Active Directory attributes reconnaissance (LDAP) (external ID 2210) Primary MITRE tactic Discovery (TA0007) MITRE attack technique Account Discovery (T1087), Indirect Command Execution (T1202), Permission Groups Discovery (T1069) MITRE attack sub-technique Domain Account (T1087.002), Domain Groups (T1069.002) Learning period None TP, B-TP, or FP 1. Select the alert to view the queries that were performed. * Check if the source computer is supposed to make these queries * If yes, close the security alert as an FP. If it's an ongoing activity, exclude the suspicious activity. 2. Select the source computer and go to its profile page. * Look for any unusual activities that occurred around the time of the queries such as the following types of search: logged in users, accessed resources, and other probing queries. * If Microsoft Defender for Endpoint integration is enabled, select its icon to further investigate the machine. * Look for unusual processes and alerts that occurred around the time of the queries 3. Check exposed accounts. * Look for unusual activities. If you answered yes to questions 2 or 3, consider this alert a TP and follow the instructions in Understand the scope of the breach. Understand the scope of the breach 1. Investigate the source computer. 2. Is the computer running a scanning tool that performs various of LDAP queries? * Investigate whether the specific queried users and groups in the attack are privileged or high-value accounts (that is, CEO, CFO, IT management, etc.). If so, look at other activities on the endpoint as well and monitor computers that the queried accounts are logged into, as they're probably targets for lateral movement. 3. Check the queries and their attributes, and determine if they were successful. Investigate each exposed group, search for suspicious activities made on the group or by member users of the group. 4. Can you see SAM-R, DNS, or SMB reconnaissance behavior on the source computer? Suggested remediation and steps for prevention 1. Contain the source computer 1. Find the tool that performed the attack and remove it. 2. If the computer is running a scanning tool that performs a variety of LDAP queries, look for users who were logged on around the same time as the activity occurred, as these users may also be compromised. Reset their passwords and enable MFA or, if you've configured the relevant high-risk user policies in Azure Active Directory Identity Protection, you can use the Confirm user compromised action in the Cloud App Security portal. 2. Reset the password if SPN resource access was made that runs under a user account (not machine account). NETWORK-MAPPING RECONNAISSANCE (DNS) (EXTERNAL ID 2007) Previous name: Reconnaissance using DNS Description Your DNS server contains a map of all the computers, IP addresses, and services in your network. This information is used by attackers to map your network structure and target interesting computers for later steps in their attack. There are several query types in the DNS protocol. This Defender for Identity security alert detects suspicious requests, either requests using an AXFR (transfer) originating from non-DNS servers, or those using an excessive number of requests. MITRE Table 3 Primary MITRE tactic Discovery (TA0007) MITRE attack technique Account Discovery (T1087), Network Service Scanning (T1046), Remote System Discovery (T1018) MITRE attack sub-technique N/A Learning period This alert has a learning period of eight days from the start of domain controller monitoring. TP, B-TP, or FP 1. Check if the source computer is a DNS server. * If the source computer is a DNS server, close the security alert as an FP. * To prevent future FPs, verify that UDP port 53 is open between the Defender for Identity sensor and the source computer. Security scanners and legitimate applications can generate DNS queries. 1. Check if this source computer is supposed to generate this type of activity? * If this source computer is supposed to generate this type of activity, Close the security alert and exclude the computer as a B-TP activity. Understand the scope of the breach 1. Investigate the source computer. Suggested remediation and steps for prevention Remediation: * Contain the source computer. * Find the tool that performed the attack and remove it. * Look for users who were logged on around the same time as the activity occurred, as these users may also be compromised. Reset their passwords and enable MFA or, if you've configured the relevant high-risk user policies in Azure Active Directory Identity Protection, you can use the Confirm user compromised action in the Cloud App Security portal. Prevention: It's important to preventing future attacks using AXFR queries by securing your internal DNS server. * Secure your internal DNS server to prevent reconnaissance using DNS by disabling zone transfers or by restricting zone transfers only to specified IP addresses. Modifying zone transfers is one task among a checklist that should be addressed for securing your DNS servers from both internal and external attacks. SECURITY PRINCIPAL RECONNAISSANCE (LDAP) (EXTERNAL ID 2038) Description Security principal reconnaissance is used by attackers to gain critical information about the domain environment. Information that helps attackers map the domain structure, as well as identify privileged accounts for use in later steps in their attack kill chain. Lightweight Directory Access Protocol (LDAP) is one the most popular methods used for both legitimate and malicious purposes to query Active Directory. LDAP focused security principal reconnaissance is commonly used as the first phase of a Kerberoasting attack. Kerberoasting attacks are used to get a target list of Security Principal Names (SPNs), which attackers then attempt to get Ticket Granting Server (TGS) tickets for. To allow Defender for Identity to accurately profile and learn legitimate users, no alerts of this type are triggered in the first 10 days following Defender for Identity deployment. Once the Defender for Identity initial learning phase is completed, alerts are generated on computers that perform suspicious LDAP enumeration queries or queries targeted to sensitive groups that using methods not previously observed. MITRE Security principal reconnaissance (LDAP) (external ID 2038) Primary MITRE tactic Discovery (TA0007) Secondary MITRE tactic Credential Access (TA0006) MITRE attack technique Account Discovery (T1087) MITRE attack sub-technique Domain Account (T1087.002) Learning period 15 days per computer, starting from the day of the first event, observed from the machine. TP, B-TP, or FP 1. Select the source computer and go to its profile page. 1. Is this source computer expected to generate this activity? 2. If the computer and activity are expected, Close the security alert and exclude that computer as a B-TP activity. Understand the scope of the breach 1. Check the queries that were performed (such as Domain admins, or all users in a domain) and determine if the queries were successful. Investigate each exposed group search for suspicious activities made on the group, or by member users of the group. 2. Investigate the source computer. * Using the LDAP queries, check if any resource access activity occurred on any of the exposed SPNs. Suggested remediation and steps for prevention 1. Contain the source computer 1. Find the tool that performed the attack and remove it. 2. Is the computer running a scanning tool that performs various LDAP queries? 3. Look for users logged on around the same time as the activity occurred as they may also be compromised. Reset their passwords and enable MFA or, if you've configured the relevant high-risk user policies in Azure Active Directory Identity Protection, you can use the Confirm user compromised action in the Cloud App Security portal. 2. Reset the password if SPN resource access was made that runs under a user account (not machine account). Kerberoasting specific suggested steps for prevention and remediation 1. Reset the passwords of the compromised users and enable MFA or, if you've configured the relevant high-risk user policies in Azure Active Directory Identity Protection, you can use the Confirm user compromised action in the Cloud App Security portal. 2. Require use of long and complex passwords for users with service principal accounts. 3. Replace the user account by Group Managed Service Account (gMSA). Note Security principal reconnaissance (LDAP) alerts are supported by Defender for Identity sensors only. USER AND GROUP MEMBERSHIP RECONNAISSANCE (SAMR) (EXTERNAL ID 2021) Previous name: Reconnaissance using directory services queries Description User and group membership reconnaissance are used by attackers to map the directory structure and target privileged accounts for later steps in their attack. The Security Account Manager Remote (SAM-R) protocol is one of the methods used to query the directory to perform this type of mapping. In this detection, no alerts are triggered in the first month after Defender for Identity is deployed (learning period). During the learning period, Defender for Identity profiles which SAM-R queries are made from which computers, both enumeration and individual queries of sensitive accounts. Learning period Four weeks per domain controller starting from the first network activity of SAMR against the specific DC. MITRE Table 5 Primary MITRE tactic Discovery (TA0007) MITRE attack technique Account Discovery (T1087), Permission Groups Discovery (T1069) MITRE attack sub-technique Domain Account (T1087.002), Domain Group (T1069.002) TP, B-TP, or FP 1. Select the source computer to go to its profile page. * Is the source computer supposed to generate activities of this type? * If yes, Close the security alert and exclude that computer, as a B-TP activity. * Check the user/s that performed the operation. * Do those users normally log into that source computer, or are they administrators that should be performing those specific actions? * Check the user profile, and their related user activities. Understand their normal user behavior and search for additional suspicious activities using the user investigation guide. If you answered yes to the previous above, Close the alert as a B-TP activity. Understand the scope of the breach 1. Check the queries that were performed, for example, Enterprise admins, or Administrator, and determine if they were successful. 2. Investigate each exposed user using the user investigation guide. 3. Investigate the source computer. Suggested remediation and steps for prevention 1. Contain the source computer. 2. Find and remove the tool that performed the attack. 3. Look for users logged on around the same time as the activity, as they may also be compromised. Reset their passwords and enable MFA or, if you've configured the relevant high-risk user policies in Azure Active Directory Identity Protection, you can use the Confirm user compromised action in the Cloud App Security portal. 4. Reset the source user password and enable MFA or, if you've configured the relevant high-risk user policies in Azure Active Directory Identity Protection, you can use the Confirm user compromised action in the Cloud App Security portal. 5. Apply Network access and restrict clients allowed to make remote calls to SAM group policy. USER AND IP ADDRESS RECONNAISSANCE (SMB) (EXTERNAL ID 2012) Previous name: Reconnaissance using SMB Session Enumeration DESCRIPTION Enumeration using Server Message Block (SMB) protocol enables attackers to get information about where users recently logged on. Once attackers have this information, they can move laterally in the network to get to a specific sensitive account. In this detection, an alert is triggered when an SMB session enumeration is performed against a domain controller. MITRE Description Primary MITRE tactic Discovery (TA0007) MITRE attack technique Account Discovery (T1087), System Network Connections Discovery (T1049) MITRE attack sub-technique Domain Account (T1087.002) TP, B-TP, or FP Security scanners and applications may legitimately query domain controllers for open SMB sessions. 1. Is this source computer supposed to generate activities of this type? 2. Is there some kind of security scanner running on the source computer? If the answer is yes, it's probably a B-TP activity. Close the security alert and exclude that computer. 3. Check the users that performed the operation. Are those users supposed to perform those actions? If the answer is yes, Close the security alert as a B-TP activity. Understand the scope of the breach 1. Investigate the source computer. 2. On the alert page, check if there are any exposed users. To further investigate each exposed user, check their profile. We recommend you begin your investigation with sensitive and high investigation priority users. Suggested remediation and steps for prevention 1. Contain the source computer. 2. Find and remove the tool that performed the attack. Note To disable any Defender for Identity security alert, contact support. Compromised credential alert tutorial SEE ALSO * Investigate a computer * Investigate a user * Working with security alerts * Compromised credential alerts * Lateral movement alerts * Domain dominance alerts * Exfiltration alerts * Defender for Identity SIEM log reference * Working with lateral movement paths * Check out the Defender for Identity forum! IS THIS PAGE HELPFUL? Yes No Any additional feedback? Feedback will be sent to Microsoft: By pressing the submit button, your feedback will be used to improve Microsoft products and services. Privacy policy. Skip Submit Thank you. -------------------------------------------------------------------------------- RECOMMENDED CONTENT * MICROSOFT DEFENDER FOR IDENTITY COMPROMISED CREDENTIALS PHASE SECURITY ALERTS This article explains the Microsoft Defender for Identity alerts issued when attacks typical of the compromised credentials phase are detected against your organization. * MICROSOFT DEFENDER FOR IDENTITY DOMAIN DOMINANCE SECURITY ALERTS This article explains the Microsoft Defender for Identity alerts issued when attacks typically part of domain dominance phase efforts are detected against your organization. * MICROSOFT DEFENDER FOR IDENTITY LATERAL MOVEMENT SECURITY ALERTS This article explains the Microsoft Defender for Identity alerts issued when attacks typically part of lateral movement phase efforts are detected against your organization. * MICROSOFT DEFENDER FOR IDENTITY CLEAR TEXT EXPOSURE ASSESSMENT This article provides an overview of Microsoft Defender for Identity's clear text exposure identity security posture assessment report. * MICROSOFT DEFENDER FOR IDENTITY SIEM LOG REFERENCE Provides samples of suspicious activity logs sent from Microsoft Defender for Identity to your SIEM. * MICROSOFT DEFENDER FOR IDENTITY SECURITY ALERT GUIDE This article provides a list of the security alerts issued by Microsoft Defender for Identity. * MICROSOFT DEFENDER FOR IDENTITY COMPUTER INVESTIGATION TUTORIAL This article explains how to use Microsoft Defender for Identity security alerts to investigate a suspicious computer. * CONFIGURE WINDOWS EVENT COLLECTION MICROSOFT DEFENDER FOR IDENTITY In this step of installing Microsoft Defender for Identity, you configure Windows Event collection. Show more FEEDBACK Submit and view feedback for This product This page View all page feedback English (United States) Theme * Light * Dark * High contrast * Manage cookies * Previous Version Docs * Blog * Contribute * Privacy & Cookies * Terms of Use * Trademarks * © Microsoft 2021 IS THIS PAGE HELPFUL? Yes No Any additional feedback? Feedback will be sent to Microsoft: By pressing the submit button, your feedback will be used to improve Microsoft products and services. Privacy policy. Skip Submit Thank you. IN THIS ARTICLE 1. Account enumeration reconnaissance (external ID 2003) 2. Active Directory attributes reconnaissance (LDAP) (external ID 2210) 3. Network-mapping reconnaissance (DNS) (external ID 2007) 4. Security principal reconnaissance (LDAP) (external ID 2038) 5. User and Group membership reconnaissance (SAMR) (external ID 2021) 6. User and IP address reconnaissance (SMB) (external ID 2012) 7. See Also English (United States) Theme * Light * Dark * High contrast * Manage cookies * Previous Version Docs * Blog * Contribute * Privacy & Cookies * Terms of Use * Trademarks * © Microsoft 2021