One of the key components of Managed Detection Response (MDR) services to ensure comprehensive protection against advanced AI-enabled cyberattacks is the Identity Threat Detection and Response (ITDR).
Identity threats are those threats that target user accounts, credentials, and other identity related vulnerabilities. The hackers exploit these threats by using cyberattacks to gain unauthorized access to systems and data. These cyberattacks are techniques like phishing, credential stuffing, and password spraying to steal or misuse identities for malicious purposes, like performing lateral movement or escalating privileges within a network.
Identity-based attacks are currently the most focused and prevalent type of attack by hackers. They have surpassed previous top threats like software vulnerabilities and are now the primary attack surface, accounting for a majority of incidents, driven by the accessibility of tools like phishing-as-a-service platforms and infostealer malware. Other reasons why hackers focus on identity theft are:
Here are some of the common identity-based attack methods used by cyber criminals:
Although quite a bit of focus is on Business Email Compromise or BEC, the cyber criminals are usually not after email data, but the information stored on SharePoint.
SharePoint is often the main prize for attackers. It’s where companies keep the good stuff—sensitive docs, spreadsheets, contracts, credentials—all neatly organized and easy to search.
There are instances where attackers don’t even touch the mailbox. They log in, skip email entirely, and head straight for SharePoint.
And when they do, they move fast. Attackers can get their hands on sensitive data in less than 10 seconds.
It’s also worth remembering: SharePoint isn’t just a target – it can become a weapon. SM team has noticed that attackers use compromised SharePoint infrastructure to host malicious files and launch new phishing campaigns.
So next time you’re responding to a BEC, and all the focus is on login anomalies or inbox rules, stop and ask: What did the attacker get from SharePoint?
If SharePoint’s in scope for the attacker, it better be in scope for you as a defender too.
Companies should think about layered cybersecurity protection and utilize Identity Threat Detection and Response (ITDR) systems. ITDR is a cybersecurity approach focused on finding and stopping threats that target user accounts, credentials, and other identity-based vulnerabilities. It involves monitoring user activity and identity systems for signs of compromise, such as leaked passwords or unusual login patterns, and then responding to mitigate the risks. This helps protect organizations from identity-based attacks like phishing and ransomware by strengthening their security posture around identities, which are becoming a new perimeter for security.
ITDR Focuses on:
Traditional ITDR tools were designed for an era with a clear perimeter and focused primarily on reactive alerts from identity systems. Enhanced ITDR moves beyond this by addressing the complexity of modern, decentralized cloud environments, where threats can emerge from various SaaS applications that often lack formal oversight. It focuses on preventing identity-based threats in modern SaaS environments, not just detecting and responding to them after they occur. This updated approach emphasizes continuous risk reduction by proactively identifying issues like unused credentials, excessive permissions, and risky integrations, and providing tools for immediate action to strengthen security posture.
Consider the following features of Enhanced ITDR when selecting a solution:
To integrate ITDR with your Managed Detection and Response (MDR) solution, you can use native integrations within your selected ITDR solution (like Petra Security) where identity-based threat alerts are automatically escalated to the MDR team for investigation and response.
For multi-vendor environments, configure the ITDR solution to send security events to your Security Information Event Management (SIEM) platform where the MDR service is already monitoring, enabling the MDR team to correlate identity threats with other security data.
Majority of the time, SIEM software is used as a central hub. The ITDR solution can be configured to send security alerts directly to the SIEM. Ensure the MDR service is already ingesting and monitoring data from this SIEM. This allows the MDR team to correlate identity threat data with other logs (from endpoints, network devices, etc.) for a comprehensive view.
Create alert escalation and response playbooks and clearly define what constitutes a critical identity threat that should be escalated to the MDR team. Work with your MDR provider to develop specific response playbooks for identity-based threats (e.g., account lockout, password reset, session termination). The ITDR tool can automate initial containment actions, with the MDR team handling complex investigations and out-of-band responses.
In addition, continuously review the integration and the types of alerts being generated. Tune your ITDR rules and MDR playbooks to reduce false positives and ensure that genuine threats are being detected and responded to efficiently.
SM has partnered with Petra Security to provide you with the ability to monitor identity threats and integrate Enhanced ITDR capabilities with the SIEM and SOC. Petra detects attackers in your M365 environment, kicks them out, and gives you a detailed report of everything they did. Petra gives you a fast and easy way to search for all your M365 logs. Whereas SIEM generally tells you, “Jack clicked on an email in his Inbox at 9:04 am.”, Petra will tell you the title of the email, senders and recipients, whether it has attachments, etc.
In addition, Petra:
Petra integrates seamlessly to protect your M365 environment in the cloud like your other security products protect your on-prem environment:

Enhanced ITDR Managed Security Services are available from SM. Please contact us at info@securelymanaged.com for more information or to set up a demo of Enhanced ITDR solution.