Skip to content

Commit ffc5089

Browse files
authored
Merge pull request #314180 from evangelinew/identity-attack-graph
adding identity attack graph article
2 parents d5ee642 + 27363cb commit ffc5089

6 files changed

Lines changed: 91 additions & 1 deletion

File tree

articles/sentinel/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -614,7 +614,9 @@
614614
- name: Microsoft Sentinel graph overview
615615
href: datalake/sentinel-graph-overview.md
616616
- name: Graph visualization
617-
href: datalake/graph-visualization.md
617+
href: datalake/graph-visualization.md
618+
- name: Identity attack graph
619+
href: datalake/identity-attack-graph.md
618620
- name: Microsoft Sentinel custom graphs
619621
items:
620622
- name: Custom graphs overview
Lines changed: 88 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,88 @@
1+
---
2+
title: Identity attack graph in Microsoft Sentinel
3+
titleSuffix: Microsoft Security
4+
description: Learn how the identity attack graph in Microsoft Sentinel models identities, permissions, and Azure resources to surface lateral movement paths and privilege escalation risks.
5+
author: evangelinew
6+
ms.topic: overview
7+
ms.date: 04/10/2026
8+
ms.author: evwhite
9+
ms.service: microsoft-sentinel
10+
ms.subservice: sentinel-platform
11+
12+
#CustomerIntent: As a security analyst, I want to turn on the identity attack graph so that I can identify lateral movement paths and privilege escalation risks in my environment.
13+
---
14+
15+
# What is the identity attack graph?
16+
17+
The identity attack graph in Microsoft Sentinel visualizes how identities connect to Azure resources through permissions and group memberships. Security analysts can use the graph to identify lateral movement paths, which are the potential routes an attacker could take to move from one identity or resource to another by exploiting existing permissions, group memberships, or trust relationships, often to escalate privileges or reach sensitive assets.
18+
19+
The predefined identity attack graph represents your environment as interconnected entities and relationships, making it easier to answer complex questions, such as "What resources could an attacker reach if this account is compromised?" or "Which identities have paths to critical assets?"
20+
21+
SOC analysts, threat hunters, cloud security engineers, and IAM teams can use the graph to understand and reduce identity risk across Azure and Entra.
22+
23+
## How the identity attack graph works
24+
25+
The identity attack graph uses asset data from the Microsoft Sentinel lake's Entra ID asset and Azure resource graph connectors to build a comprehensive model of your environment:
26+
27+
- **Identities**: Users, service principals, managed identities, and groups
28+
- **Resources**: Azure subscriptions, resource groups, virtual machines, storage accounts, and other assets
29+
- **Access and permission relationships**: Role assignments and group memberships that create paths to resources they can access
30+
31+
After setup, use Graph Query Language (GQL) to uncover hidden risks that are difficult to detect with traditional methods.
32+
33+
You can query the graph to:
34+
35+
- **Surface lateral movement paths**: Find all routes an attacker could take from a compromised identity to reach critical resources
36+
- **Identify overprivileged accounts**: Discover identities with excessive permissions or indirect paths to privileged roles
37+
- **Prioritize remediation**: Focus on the shortest paths to your most sensitive assets
38+
39+
## Prerequisites
40+
41+
To set up the identity attack graph, make sure you meet the following prerequisites:
42+
43+
- Microsoft Sentinel data lake enabled in your environment
44+
- [Permissions](/azure/sentinel/datalake/enable-data-connectors#required-permissions-for-asset-sources) to turn on or update the **Microsoft Entra ID Assets** and **Azure Resource Graph connectors**
45+
- Global Administrator, Security Administrator to create the graph
46+
47+
## Set up the identity attack graph
48+
49+
Follow these steps to set up the identity attack graph:
50+
51+
1. In the Microsoft Defender portal, navigate to **Microsoft Sentinel** > **Graphs**.
52+
1. Locate the **identity attack graph** card and select **Set up graph**.
53+
1. Follow the setup steps and turn on or update the required connectors.
54+
1. Select **Turn on graph** to create your graph.
55+
1. Select **Query graph** on the graph tile to view the graph query page.
56+
57+
:::image type="content" source="./media/identity-attack-graph/identity-graph-overview-panel.png" alt-text="Screenshot showing the Microsoft Sentinel identity attack graph overview panel." lightbox="./media/identity-attack-graph/identity-graph-overview-panel.png":::
58+
59+
60+
After you turn on the graph, the graph begins ingesting data and building relationships. Initial processing may take up to 48 hours.
61+
62+
## Explore and query the identity attack graph
63+
64+
Follow these steps to query the graph when the graph is ready to use:
65+
66+
1. Use the **Schema** tab to understand the types of entities and relationships in the graph.
67+
68+
:::image type="content" source="./media/identity-attack-graph/visualize-graph-schema.png" alt-text="Screenshot showing the schema tab on the graph query page." lightbox="./media/identity-attack-graph/visualize-graph-schema.png":::
69+
70+
1. Select any node to view the detailed metadata.
71+
72+
1. Use the **Graph** tab to visualize relationships and privilege paths. Write your own GQL queries or use the predefined queries to get started.
73+
74+
:::image type="content" source="./media/identity-attack-graph/predefined-query.png" alt-text="Screenshot showing the predefined query on the graph." lightbox="./media/identity-attack-graph/predefined-query.png":::
75+
76+
> [!NOTE]
77+
> It's recommended that you start with the predefined queries, which are designed to surface common and high‑value investigation scenarios. These queries help you get immediate value without writing GQL from scratch.
78+
79+
1. Select **Run GQL query** to see the results.
80+
81+
:::image type="content" source="./media/identity-attack-graph/visualize-query.png" alt-text="Screenshot showing the graph tab to visualize query." lightbox="./media/identity-attack-graph/visualize-query.png":::
82+
83+
84+
## Related content
85+
86+
- [What is Microsoft Sentinel graph?](sentinel-graph-overview.md)
87+
- [Microsoft Sentinel data lake overview](sentinel-lake-overview.md)
88+
325 KB
Loading
312 KB
Loading
1.64 MB
Loading
2.45 MB
Loading

0 commit comments

Comments
 (0)