Azure servicesCyber SecurityMicrosoft Defender

Microsoft Defender for Identity Part 05 – MDI Sensor installation

MDI Sensor installation is the Part 05 of the Microsoft Defender for Identity blog series. So far we learned about following about MDI,

Part 01MDI Overview

Part 02Create Directory Service Account

Part 03Collect Windows Events

Part 04Network Requirements

In this blog post, I am going to demonstrate how to enable a MDI instance and then install the first MDI sensor in the environment. Before we go into the deployment we need to make sure we have the following in place,

Prerequisites

1) Global Administrator or Security Administrator account in the tenant.

2) Microsoft Defender for Identity Licences – More info about this is available on https://docs.microsoft.com/en-us/defender-for-identity/technical-faq#licensing-and-privacy

3) Microsoft defender for identity prerequisites – This is covered by Part 02 to Part 04 in this blog series.

Setup Microsoft Defender for Identity Instance

Before we go into the sensor setup, we need to create an MDI instance. To setup MDI instance,

1) Log in to the MDI portal https://portal.atp.azure.com/ as Global / Security Administrator.

2) Then click on Create.

First MDI instance setup

3) MDI instance creation process will take a few minutes to complete. After that, you can see the following window,

Initial configuration of the MDI instance

4) As we can see above, the first task is to provide DSA account details. To configure this, click on Provide a username and password link.

Define DSA login

5) In part 02 of this blog series we have created a new DSA account and it is time to use that info to connect MDI to Active Directory. In the form, type the manager service account name in the Username field. Then tick Group managed service account option. After that type the AD domain name in the Domain field.

DSA details

6) Finally, to apply settings, click on Save.

Save DSA details

Install the first Microsoft Defender for Identity sensor

Before we install the sensor, we need to install the Npcap driver. Npcap is a packet-sniffing library for the Windows platform and the MDI sensor uses it. Installation of the driver before the sensor installation will ensure the MDI sensor uses Npcap instated of unsupported WinPcap.

To install the driver,

1) Log in to the server selected for the MDI sensor

2) Go to MDI portal https://portal.atp.azure.com/ as Global / Security Administrator.

3) On the configuration page, we can see the link to Download Sensor Setup. Go ahead and click on it.

MDI Sensor Setup files

4) Then from the sensor page, click on the Download button.

Download MDI sensor installation files

5) This will give a zip file and it has a separate folder called NPCAP. Double click on the exe. File in NPCAP folder.

Npcap driver installation file

6) It will open up a new wizard. On the first page accept the license agreement. On the installation options page, leave the default Install Npcap in WinPcap API-compatible Mode selected and click on Install.

Npcap drive installation settings

7) Once installation is completed close the installation wizard.

Install MDI sensor

Now we have the Npcap driver. The next step is to install the MDI sensor. To do that,

1) Open the Zip file we downloaded in the previous step.

2) Double click on the “Azure ATP Sensor Setup.exe”.

3) This will open up the sensor installation wizard. For sensor deployment type system should automatically choose the Sensor option. To continue with the installation click on Next.

MDI sensor settings

4) On the configuration page, we need to provide the access key. This can be found on the sensor download page in the MDI portal.

MDI sensor access key details

5) Copy the key value and past it in the sensor configuration window and click on Install.

Provide access key details

6) Once installation is completed, click on Finish.

Validation

To validate the sensor installation,

1) Open services and confirm the Azure Advanced Threat Protection Sensor service is running.

Azure advanced threat protection service

2) Log in to MDI portal and confirm the sensor status.

MDI sensor health status

3) In the portal, use the search option to search for AD user.

Search for AD user

4) As the next step let’s see if the sensor picks up alerts as expected. Before we do that, let’s go ahead and update the notification settings in the MDI portal. In the portal go to Settings | Notification and then add the relevant email address for mail notification. After that click on Save to apply changes.

MDI notification settings

5) Then I installed Metasploit pentest tool (This is not recommended to use in a production environment ) and use the PSExec module to create a service in the domain controller.

psexec exploit

6) As expected it is detected as Suspicious service creation (external ID 2026) alert.

MDI email alert

 

MDI alert in timeline

MDI alert details

Note – In a production environment we can do initial MDI testing by simply running the following commands from a PC.

net group “Domain Admins” /domain
net group “Enterprise Admins” /domain

This will log events under the PC entry in MDI.

Sensitive group query

As we can see the sensor installation is completed and it is working as expected. In the next blog post let’s explore MDI capabilities further. Meantime If you have any questions, feel free to contact me at rebeladm@live.com also follow me on Twitter @rebeladm to get updates about new blog posts.

Related posts
Cyber SecurityMicrosoft Entra IDMicrosoft Technologies

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Entra ID Entitlement Management access packages enable administrators to offer a self-service…
Read more
Cyber SecurityMicrosoft Entra ID

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

In my previous blog post, I explained how to use Entra ID lifecycle workflow to trigger actions…
Read more
Azure servicesMicrosoft Entra IDMicrosoft Technologies

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

The Entra ID lifecycle workflow is a feature of Microsoft Entra ID identity governance and Microsoft…
Read more
Newsletter
Become a Trendsetter

Sign up and get the best of RebelAdmin, tailored for you.

Leave a Reply

Your email address will not be published. Required fields are marked *