How To Block Malware Attacks With Azure Advanced Threat Protection
Azure Advanced Threat Protection (now Microsoft Defender for Identity) provides enterprise organizations with cloud-powered security intelligence to detect, investigate, and respond to advanced threats, compromised identities, and malicious insider actions. This guide covers the complete configuration and deployment of ATP policies to block malware attacks and protect your hybrid identity infrastructure.
Understanding Azure ATP and Microsoft Defender for Identity
Azure Advanced Threat Protection has evolved into Microsoft Defender for Identity as part of Microsoft's unified XDR (Extended Detection and Response) platform. It monitors on-premises Active Directory signals to identify advanced threats, compromised identities, and malicious actions directed at your organization.
- Identity threat detection — Detects reconnaissance, lateral movement, privilege escalation, and domain dominance attacks in real time
- Behavioral analytics — Uses machine learning to baseline normal user and entity behavior and flag anomalies
- MITRE ATT&CK mapping — Maps detected threats to the MITRE ATT&CK framework for standardized threat classification
- Integration with Microsoft 365 Defender — Correlates identity signals with endpoint, email, and cloud app detections for full attack chain visibility
- Hybrid monitoring — Monitors both on-premises Active Directory and Azure AD (Entra ID) authentication events
Deploying Microsoft Defender for Identity Sensors
The foundation of malware detection through identity monitoring starts with deploying sensors on your domain controllers and Active Directory Federation Services (AD FS) servers.
- Navigate to the Microsoft 365 Defender portal at security.microsoft.com
- Go to Settings > Identities > Sensors and download the sensor installer package
- Copy the access key from the portal — you will need it during installation
- Run the sensor installer on each domain controller in your environment
- Enter the access key and configure the sensor to connect through a proxy if required
- Verify sensor health in the portal — sensors should show as "Running" within minutes
- Install sensors on AD FS servers to monitor federated authentication events
Configuring Threat Detection Policies
Microsoft Defender for Identity includes dozens of built-in detection algorithms that identify malware-related activities across the kill chain. Fine-tuning these detections reduces false positives and ensures critical alerts receive immediate attention.
Key Detection Categories
- Reconnaissance — Account enumeration, network mapping (DNS), LDAP reconnaissance, and security principal reconnaissance
- Compromised credentials — Brute force attacks, honey token activity, suspicious LDAP binds, and protocol downgrades
- Lateral movement — Pass-the-hash, pass-the-ticket, overpass-the-hash, remote code execution, and malicious certificate requests
- Domain dominance — DCShadow, DCSync, Golden Ticket, Silver Ticket, and skeleton key attacks
- Exfiltration — Suspicious communication over DNS, data exfiltration over SMB, and modified Group Policy Objects
Alert Tuning Best Practices
- Configure exclusion lists for known service accounts and scanning tools that trigger false positives
- Set honeytoken accounts — decoy accounts that generate high-fidelity alerts when accessed
- Adjust alert thresholds based on your environment's normal baseline behavior
- Enable email notifications for high-severity and medium-severity alerts to your SOC team
- Integrate alerts with your SIEM (Sentinel, Splunk, QRadar) through the Defender API
Automated Response and Remediation
Beyond detection, enterprise organizations need automated response capabilities to contain malware attacks before they spread laterally through the environment.
- Automated investigation — Microsoft 365 Defender automatically investigates alerts and correlates them with related signals across endpoints and email
- User containment — Disable compromised accounts or force password resets directly from the alert timeline
- Conditional Access integration — Trigger Conditional Access policies based on user risk levels detected by Defender for Identity
- SOAR playbooks — Use Microsoft Sentinel playbooks or third-party SOAR platforms to automate incident response workflows
- Attack disruption — Microsoft 365 Defender can automatically contain compromised devices and disable accounts involved in active attacks
Complementary Security Layers
Defender for Identity is most effective when deployed alongside other Microsoft security solutions that provide defense-in-depth against malware and advanced persistent threats.
- Microsoft Defender for Endpoint — Endpoint detection and response (EDR) for workstations and servers
- Microsoft Defender for Office 365 — Safe Links, Safe Attachments, and anti-phishing policies for email-borne malware
- Microsoft Defender for Cloud Apps — Cloud Access Security Broker (CASB) for SaaS application monitoring
- Microsoft Sentinel — Cloud-native SIEM for centralized log aggregation, threat hunting, and incident management
- Azure Firewall Premium — Network-level threat intelligence, intrusion detection, and TLS inspection
Why Choose EPC Group for Azure Security Deployments
EPC Group has spent over 28 years helping enterprise organizations secure their Microsoft environments against evolving threats. As a Microsoft Gold Partner, our security consultants design and deploy comprehensive threat protection solutions for Fortune 500 companies in healthcare, financial services, government, and other compliance-heavy sectors. Our founder, Errin O'Connor, has authored four bestselling Microsoft Press books covering Azure, SharePoint, and enterprise security architecture.
- End-to-end Microsoft 365 Defender deployment and configuration
- Microsoft Sentinel SIEM implementation with custom detection rules
- Zero Trust architecture design for hybrid and cloud-native environments
- Security assessments and penetration testing for regulated industries
- Incident response planning and tabletop exercises
Strengthen Your Organization's Threat Protection
EPC Group's enterprise security consultants can assess your current threat posture and deploy Microsoft Defender for Identity alongside a comprehensive XDR strategy. Contact us for a security assessment.
Frequently Asked Questions
Is Azure ATP the same as Microsoft Defender for Identity?
Yes. Azure Advanced Threat Protection (Azure ATP) was rebranded to Microsoft Defender for Identity in 2020 as part of Microsoft's unification of security products under the Microsoft Defender brand. The underlying technology and capabilities remain the same, with continuous enhancements added to the platform.
What license is required for Microsoft Defender for Identity?
Microsoft Defender for Identity is included with Microsoft 365 E5, Microsoft 365 E5 Security, and Enterprise Mobility + Security E5 (EMS E5). It can also be purchased as a standalone license. Microsoft 365 E3 customers can add it through the E5 Security add-on.
Does Defender for Identity require on-premises infrastructure?
Yes. Defender for Identity sensors must be installed on domain controllers and AD FS servers to monitor Active Directory authentication traffic. The analysis and alerting are cloud-based, but the data collection requires on-premises sensor deployment. For cloud-only environments using Azure AD (Entra ID), identity protection is handled by Microsoft Entra ID Protection.
Can Defender for Identity detect ransomware attacks?
Defender for Identity detects many precursor activities that precede ransomware deployment, including reconnaissance, credential theft, lateral movement, and privilege escalation. Combined with Defender for Endpoint (which detects ransomware execution on endpoints), the full Microsoft 365 Defender suite provides comprehensive ransomware protection.
How quickly does Defender for Identity detect threats?
Most detections are near real-time, with alerts generated within seconds to minutes of suspicious activity. Some behavioral analytics detections require a learning period of up to 30 days to establish a baseline of normal behavior before they begin generating alerts. High-fidelity detections like honeytoken activity and known attack patterns alert immediately.
Related Resources
Continue exploring azure insights and services
