Microsoft has added support for action accounts to its Microsoft Defender for Identity solution. The new action accounts feature was spotted by Twitter user @JimSycurity earlier this week, and it is now generally available for all enterprise customers worldwide.
The action accounts setting allows IT Admins to take actions (such as reset their password or disable them) on compromised accounts directly from Microsoft Defender for Identity. This new capability should make it easier for security teams to prevent cyber-attacks targeting employees in their organization.
Just noticed something new in Microsoft Defender for Identity: Action Accounts. This appears to let us disable a user or reset their password in on-prem AD based on incident or alerts in M365 Security Center.
Docs: https://t.co/B20caAbHJ1
CC: @NathanMcNulty pic.twitter.com/29s5blcBiI
— Jim Sykora (@JimSycurity) March 7, 2022
Microsoft Defender for Identity is a cloud-based security solution that allows organizations to detect and investigate compromised identities, threats, as well as malicious attacks targetted at the on-premises Active Directory. The security teams can use the Defender for Identity portal to analyze the data received from the sensors to investigate potential threats in their network environment.
To use this feature, IT Admins will need to define the group Managed Service Account (gMSA) that will be used to take actions by following these steps:
It is important to note that Microsoft is dropping support for the Defender for Identity sensor on Windows Server 2008 R2 devices in June of this year. The company recommends customers to update their Domain Controllers and servers to a supported version of the OS as soon as possible.