Investigate assets
Microsoft Defender for Identity provides Microsoft Defender XDR users with evidence of when users, computers, and devices have performed suspicious activities or show signs of being compromised.
This article gives recommendations for how to determine risks to your organization, decide how to remediate, and determine the best way to prevent similar attacks in the future.
Investigation steps for suspicious users
Note
For information on how to view user profiles in Microsoft Defender XDR, see Microsoft Defender XDR documentation.
If an alert or incident indicates that a user may be suspicious or compromised, check and investigate the user profile for the following details and activities:
User identity
- Is the user a sensitive user (such as admin, or on a watchlist, etc.)?
- What is their role within the organization?
- Are they significant in the organizational tree?
Investigate suspicious activities, such as:
- Does the user have other opened alerts in Defender for Identity, or in other security tools such as Microsoft Defender for Endpoint, Microsoft Defender for Cloud and/or Microsoft Defender for Cloud Apps?
- Did the user have failed sign-ins?
- Which resources did the user access?
- Did the user access high value resources?
- Was the user supposed to access the resources they accessed?
- Which devices did the user sign in to?
- Was the user supposed to sign in to those devices?
- Is there a lateral movement path (LMP) between the user and a sensitive user?
Use the answers to these questions to determine if the account appears compromised or if the suspicious activities imply malicious actions.
Find identity information in the following Microsoft Defender XDR areas:
- Individual identity details pages
- Individual alert or incident details page
- Device details pages
- Advanced hunting queries
- The Action center page
For example, the following image shows the details on an identity details page:
Identity details
When you investigate a specific identity, you'll see the following details on an identity details page:
Identity details page area | Description |
---|---|
Overview tab | General identity data, such as the Microsoft Entra identity risk level, the number of devices the user is signed in to, when the user was first and last seen, the user's accounts and more important information. Use the Overview tab to also view graphs for incidents and alerts, the investigation priority score, an organizational tree, entity tags, and a scored activity timeline. |
Incidents and alerts | Lists active incidents and alerts involving the user from the last 180 days, including details like alert severity and the time the alert was generated. |
Observed in organization | Includes the following sub-areas: - Devices: The devices that the identity signed in to, including most and least used in the last 180 days. - Locations: The identity's observed locations over the last 30 days. - Groups: All observed on-premises groups for the identity. - Lateral movement paths - all profiled lateral movement paths from the on-premises environment. |
Identity timeline | The timeline represents activities and alerts observed from a user's identity from the last 180 days, unifying identity entries across Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Use the timeline to focus on activities a user performed or were performed on them in specific timeframes. Select the default 30 days to change the time range to another built-in value, or to a custom range. |
Remediation actions | Respond to compromised users by disabling their accounts or resetting their password. After taking action on users, you can check on the activity details in the Microsoft Defender XDR **Action center. |
Note
Investigation Priority Score has been deprecated on December 3, 2025. As a result, both the Investigation Priority Score breakdown and the scored activity timeline cards have been removed from the UI.
For more information, see Investigate users in the Microsoft Defender XDR documentation.
Investigation steps for suspicious groups
If an alert or incident investigation is related to an Active Directory group, check the group entity for the following details and activities:
Group entity
- Is the group a sensitive group, such as Domain Admins?
- Does the group include sensitive users?
Investigate suspicious activities, such as:
- Does the group have other opened, related alerts in Defender for Identity, or in other security tools such as Microsoft Defender for Endpoint, Microsoft Defender for Cloud and/or Microsoft Defender for Cloud Apps?
- What users were recently added to or removed from the group?
- Was the group recently queried, and by whom?
Use the answers to these questions to help in your investigation.
From a group entity details pane, select Go hunt or Open timeline to investigate. You can also find group information in the following Microsoft Defender XDR areas:
- Individual alert or incident details page
- Device or user details pages
- Advanced hunting queries
For example, the following image shows the Server Operators activity timeline, including related alerts and activities from the last 180 days:
Investigation steps for suspicious devices
Microsoft Defender XDR alert lists all devices and users connected to each suspicious activity. Select a device to view the device details page, and then investigate for the following details and activities:
What happened around the time of the suspicious activity?
- Which user was signed in to the device?
- Does that user normally sign into or access the source or destination device?
- Which resources were accessed? By which users? If resources were accessed, were they high-value resources?
- Was the user supposed to access those resources?
- Did the user that accessed the device perform other suspicious activities?
More suspicious activities to investigate:
- Were other alerts opened around the same time as this alert in Defender for Identity, or in other security tools such as Microsoft Defender for Endpoint, Microsoft Defender for Cloud and/or Microsoft Defender for Cloud Apps?
- Were there failed sign-ins?
- Were any new programs deployed or installed?
Use the answers to these questions to determine if the device appears compromised or if the suspicious activities imply malicious actions.
For example, the following image shows a device details page:
For more information, see Investigate devices in the Microsoft Defender XDR documentation.
Next steps
- Investigate Lateral Movement Paths (LMPs)
- Investigate users in Microsoft Defender XDR
- Investigate incidents in Microsoft Defender XDR
Tip
Try our interactive guide: Investigate and respond to attacks with Microsoft Defender for Identity