|
| 1 | +--- |
| 2 | +title: Identity attack graph in Microsoft Sentinel |
| 3 | +titleSuffix: Microsoft Security |
| 4 | +description: Learn how the identity attack graph in Microsoft Sentinel models identities, permissions, and Azure resources to surface lateral movement paths and privilege escalation risks. |
| 5 | +author: evangelinew |
| 6 | +ms.topic: overview |
| 7 | +ms.date: 04/10/2026 |
| 8 | +ms.author: evwhite |
| 9 | +ms.service: microsoft-sentinel |
| 10 | +ms.subservice: sentinel-platform |
| 11 | + |
| 12 | +#CustomerIntent: As a security analyst, I want to turn on the identity attack graph so that I can identify lateral movement paths and privilege escalation risks in my environment. |
| 13 | +--- |
| 14 | + |
| 15 | +# What is the identity attack graph? |
| 16 | + |
| 17 | +The identity attack graph in Microsoft Sentinel visualizes how identities connect to Azure resources through permissions and group memberships. Security analysts can use the graph to identify lateral movement paths, which are the potential routes an attacker could take to move from one identity or resource to another by exploiting existing permissions, group memberships, or trust relationships, often to escalate privileges or reach sensitive assets. |
| 18 | + |
| 19 | +The predefined identity attack graph represents your environment as interconnected entities and relationships, making it easier to answer complex questions, such as "What resources could an attacker reach if this account is compromised?" or "Which identities have paths to critical assets?" |
| 20 | + |
| 21 | +SOC analysts, threat hunters, cloud security engineers, and IAM teams can use the graph to understand and reduce identity risk across Azure and Entra. |
| 22 | + |
| 23 | +## How the identity attack graph works |
| 24 | + |
| 25 | +The identity attack graph uses asset data from the Microsoft Sentinel lake's Entra ID asset and Azure resource graph connectors to build a comprehensive model of your environment: |
| 26 | + |
| 27 | +- **Identities**: Users, service principals, managed identities, and groups |
| 28 | +- **Resources**: Azure subscriptions, resource groups, virtual machines, storage accounts, and other assets |
| 29 | +- **Access and permission relationships**: Role assignments and group memberships that create paths to resources they can access |
| 30 | + |
| 31 | +After setup, use Graph Query Language (GQL) to uncover hidden risks that are difficult to detect with traditional methods. |
| 32 | + |
| 33 | +You can query the graph to: |
| 34 | + |
| 35 | +- **Surface lateral movement paths**: Find all routes an attacker could take from a compromised identity to reach critical resources |
| 36 | +- **Identify overprivileged accounts**: Discover identities with excessive permissions or indirect paths to privileged roles |
| 37 | +- **Prioritize remediation**: Focus on the shortest paths to your most sensitive assets |
| 38 | + |
| 39 | +## Prerequisites |
| 40 | + |
| 41 | +To set up the identity attack graph, make sure you meet the following prerequisites: |
| 42 | + |
| 43 | +- Microsoft Sentinel data lake enabled in your environment |
| 44 | +- [Permissions](/azure/sentinel/datalake/enable-data-connectors#required-permissions-for-asset-sources) to turn on or update the **Microsoft Entra ID Assets** and **Azure Resource Graph connectors** |
| 45 | +- Global Administrator, Security Administrator to create the graph |
| 46 | + |
| 47 | +## Set up the identity attack graph |
| 48 | + |
| 49 | +Follow these steps to set up the identity attack graph: |
| 50 | + |
| 51 | +1. In the Microsoft Defender portal, navigate to **Microsoft Sentinel** > **Graphs**. |
| 52 | +1. Locate the **identity attack graph** card and select **Set up graph**. |
| 53 | +1. Follow the setup steps and turn on or update the required connectors. |
| 54 | +1. Select **Turn on graph** to create your graph. |
| 55 | +1. Select **Query graph** on the graph tile to view the graph query page. |
| 56 | + |
| 57 | + :::image type="content" source="./media/identity-attack-graph/identity-graph-overview-panel.png" alt-text="Screenshot showing the Microsoft Sentinel identity attack graph overview panel." lightbox="./media/identity-attack-graph/identity-graph-overview-panel.png"::: |
| 58 | + |
| 59 | + |
| 60 | +After you turn on the graph, the graph begins ingesting data and building relationships. Initial processing may take up to 48 hours. |
| 61 | + |
| 62 | +## Explore and query the identity attack graph |
| 63 | + |
| 64 | +Follow these steps to query the graph when the graph is ready to use: |
| 65 | + |
| 66 | +1. Use the **Schema** tab to understand the types of entities and relationships in the graph. |
| 67 | + |
| 68 | + :::image type="content" source="./media/identity-attack-graph/visualize-graph-schema.png" alt-text="Screenshot showing the schema tab on the graph query page." lightbox="./media/identity-attack-graph/visualize-graph-schema.png"::: |
| 69 | + |
| 70 | +1. Select any node to view the detailed metadata. |
| 71 | + |
| 72 | +1. Use the **Graph** tab to visualize relationships and privilege paths. Write your own GQL queries or use the predefined queries to get started. |
| 73 | + |
| 74 | + :::image type="content" source="./media/identity-attack-graph/predefined-query.png" alt-text="Screenshot showing the predefined query on the graph." lightbox="./media/identity-attack-graph/predefined-query.png"::: |
| 75 | + |
| 76 | + > [!NOTE] |
| 77 | + > It's recommended that you start with the predefined queries, which are designed to surface common and high‑value investigation scenarios. These queries help you get immediate value without writing GQL from scratch. |
| 78 | +
|
| 79 | +1. Select **Run GQL query** to see the results. |
| 80 | + |
| 81 | + :::image type="content" source="./media/identity-attack-graph/visualize-query.png" alt-text="Screenshot showing the graph tab to visualize query." lightbox="./media/identity-attack-graph/visualize-query.png"::: |
| 82 | + |
| 83 | + |
| 84 | +## Related content |
| 85 | + |
| 86 | +- [What is Microsoft Sentinel graph?](sentinel-graph-overview.md) |
| 87 | +- [Microsoft Sentinel data lake overview](sentinel-lake-overview.md) |
| 88 | + |
0 commit comments