Jaa


Tutorial: Use Lateral Movement Paths (LMPs)

Note

The experience described in this page can be accessed at https://security.microsoft.com as part of Microsoft Defender XDR.

Lateral movement attacks are typically accomplished using a number of different techniques. Some of the most popular methods used by attackers are credential theft and Pass the Ticket attacks. In both methods, non-sensitive accounts are used by attackers for lateral moves by exploiting non-sensitive machines that share stored log-in credentials in accounts, groups and machines with sensitive accounts.

In this tutorial, you'll learn how to use Microsoft Defender for Identity LMPs to investigate potential lateral movement paths, and along with Defender for Identity security alerts, gain a better understanding of what happened in your network and how. In addition, you'll learn how to use the LMP to sensitive account report to discover all of the sensitive accounts with potential lateral movement paths discovered in your network by time period.

  • Investigate LMPs
  • Discover your sensitive accounts at risk
  • Access the Lateral movement paths to sensitive accounts report

Investigate

There are multiple ways to use and investigate LMPs. In the Microsoft Defender portal, search by entity and then explore by path or activity.

  1. From the portal, search for a user or computer. Notice if a lateral movement badge was added to an entity profile. Badges will only display when an entity is discovered in a potential LMP within the last 48 hours.

    lateral icon. or path icon.

  2. In the user profile page that opens, click the Lateral movement paths tab.

    Defender for Identity Lateral Movement Path (LMP) tab

  3. The graph that is displayed provides a map of the possible paths to the sensitive user during the 48 hour time period. If no activity was detected in the last two days, the graph will not appear. Use the View a different date option to display the graph for previous lateral movement path detections for the entity.

    LMP view a different date.

  4. Review the graph to see what you can learn about exposure of your sensitive user's credentials. For example, in the path, follow the Logged into by gray arrows to see where Nick logged in with their privileged credentials. In this case, Nick's sensitive credentials were saved on the SHAREPOINT-SRV computer. Now, notice which other users logged into which computers that created the most exposure and vulnerability. You can see this by looking at the Administrator on black arrows to see who has admin privileges on the resource. In this example, everyone in the group HelpDesk has the ability to access user credentials from that resource.

    Defender for Identity Lateral Movement Path (LMP)

Discover your at-risk sensitive accounts

To discover all the sensitive accounts in your network that are exposed because of their connection to non-sensitive accounts, groups and machines in lateral movement paths, follow these steps.

  1. In the Defender for Identity portal menu, click the reports icon reports icon..

  2. Under Lateral movements paths to sensitive accounts, if there are no potential lateral movement paths found, the report is grayed out. If there are potential lateral movement paths, the report automatically pre-selects the first date when there is relevant data. The lateral movement path report provides data for up to 60 days.

    Screenshot showing report date selection.

  3. Click Download.

  4. An Excel file is created that provides you with details about your potential lateral movement paths and sensitive account exposure for the dates selected. The Summary tab provides graphs that detail the number of sensitive accounts, computers, and averages for at-risk access. The Details tab provides a list of the sensitive accounts that you should investigate further.

Schedule report

The Lateral movement to sensitive account report can also be scheduled using the set scheduled reports feature.

Note that the actual LMPs detailed in the downloadable report may no longer be available because they were detected in the past and may have been changed, modified or fixed since they were detected.

To review historical LMPs, select different available dates in the calendar selection when creating a report.

Next steps

In this tutorial, you've learned how to use LMPs to investigate suspicious activities. To learn more about entities involved in LMPs, continue to the investigate entities tutorial.

See Also

Learn more