We mainly use the solution to ensure our security and to increase our security score. We want to understand the threats or attacks to help prevent them.
Senior Manager ICT & at Bangalore International Airport Limited
Increases visibility, integrates well with other solution, and helps eliminate threats
Pros and Cons
- "It automates routine testing and helps automate the finding of high-value alerts."
- "The tracking instance needs to be configured appropriately."
What is our primary use case?
How has it helped my organization?
The product has given our security posture a very big score. It is very easy to integrate with other applications, other packages, and what we have. It helps to measure and block events.
What is most valuable?
It gives us visibility into advanced behavior activities. It’ll show a history of logins or events.
It’s efficient, and it provides all of the investigation reports, which is an advantage for us. It also helps us prioritize threats across the company. It helps us detect the exact timing of incidents, and we’ll see them when they happen. It helps us adhere to our SLAs. We can see threats and if they are of higher or lower severity. We can find the types of malicious events, see what’s happening, see what actions are taken, and understand what is happening.
It integrates with other products, and these solutions work natively together to deliver coordinated detection and response across the environment. These are all work through Jira.
The comprehensiveness of the threat protection provided by Microsoft security products is good. It is giving better visibility to us. We can understand what the false positives are. That gives us more confidence in the security posture of the environment.
We use Microsoft Defender for the cloud, and we use its directional sync capabilities. It’s important to be able to see both in and outbound reporting.
It automates routine testing and helps automate the finding of high-value alerts.
As we define policies and rules, automation makes it easier to do so.
The product helped eliminate having to look at multiple dashboards. It has a free single dashboard for us.
We’ve found that threat intelligence helps us prepare for potential threats before they even hit and we can take preventative steps. That is the beauty of it. It has good threat intelligence within the platform. We can prepare ourselves before we have an issue.
It continues to scan for threats on our devices. We’re always scanning.
We’ve been able to save time on security-related tasks. Right now, we’re saving two to three hours a day.
Microsoft Defender for Identity decreased our time to detect or our time to respond overall.
What needs improvement?
The tracking instance needs to be configured appropriately. They need to be able to identify more vulnerabilities in order to increase the efficiency of the solution.
Buyer's Guide
Microsoft Defender for Identity
March 2025

Learn what your peers think about Microsoft Defender for Identity. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
848,253 professionals have used our research since 2012.
For how long have I used the solution?
I've been using the solution for almost five years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
We have 600 people using the solution. It's in one location.
It's a scalable solution.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
How was the initial setup?
The initial setup was very easy. I found it to be straightforward. The deployment only takes one day. Our implementation strategy was to ensure all threats and vulnerabilities were covered.
We have two admins that cover the solution. However, it doesn't require maintenance.
What's my experience with pricing, setup cost, and licensing?
The enterprise pricing is reasonable. Our company has a good deal.
Which other solutions did I evaluate?
We did look at another solution before choosing this product. It was a filter scanner. However, we have other Microsoft products, so we went with this solution.
What other advice do I have?
I'm a customer.
I'd rate the solution nine out of ten.
It's covering all of our major vulnerabilities and threats without giving an inch. It's a one-stop solution. It can detect any type of suspicious activity, whether internal or external, and provides historical logs.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Helps keep our endpoints safe, protecting against DDoS and brute-force attacks
Pros and Cons
- "The feature I like most is that you can create your own customized detection rules. It has a lot of default alerts and rules, but you can customize them according to your business needs."
- "We observe a lot of false positives. Sometimes, when we go for a coffee break, we lock our screens. Locking the screen has a separate Windows event ID and sometimes I see it is detected as a failed login."
What is our primary use case?
Defender for Identity is mainly a monitoring tool for Active Directory activity. Active Directory logs are fixed into Defender for Identity and it has its own core rules. Based on those rules, it gives us an alert if any suspicious activity is going on in Active Directory.
Many organizations are using the Microsoft Windows operating system. Whenever users log in to their systems, all the login activity, the credentials et cetera, are managed by Active Directory. If suspicious login activity happens in that system, everything is logged and the logs are saved by the Defender for Identity. Based on the correlation rules and AI technology, it gives us alerts, such as brute-force and honey-token-related alerts, or login activity after office hours, or successful login after three consecutive login failures.
How has it helped my organization?
It helps our organization protect employee access and prevent anyone from outside of the organization from accessing our systems. It is very important for securing our organization's endpoints, our laptops and servers. No unauthorized person can access an endpoint or enter our assets. It is also very helpful for preventing DDoS alerts, brute-force alerts, and other Active Directory-related threats.
What is most valuable?
The feature I like most is that you can create your own customized detection rules. It has a lot of default alerts and rules, but you can customize them according to your business needs. For example, we have a prevention mechanism through a policy where, if anyone tries to access something and gives the wrong credentials three times, that account will automatically be deactivated for the next half hour.
Also, you can integrate Defender for Identity with any SIEM platform, like Splunk, QRadar, and all top SIEMs, and create your own dashboards and reports to identify any suspicious activity. It's also very user-friendly, UI-wise. Anyone can understand it. We integrated it with Splunk, which is a big analytics tool.
Visibility-wise, it's also quite useful. And if you want to enhance something based on your requirements, you can raise a ticket with the Microsoft team and they will review and implement it. That flexibility makes Microsoft very helpful to its clients.
In addition, there is only one dashboard where we get the alerts. They come in as low, medium, or high priority.
What needs improvement?
We observe a lot of false positives. Sometimes, when we go for a coffee break, we lock our screens. Locking the screen has a separate Windows event ID and sometimes I see it is detected as a failed login. The number of false positives needs to be improved. With the separate event ID for a locked screen, we have to segregate the event ID and correlate everything properly so that we can identify it as a false positive.
For how long have I used the solution?
I have been working with Microsoft Defender for Identity for the last four years.
What do I think about the stability of the solution?
It has never failed and it's never down. It's very stable.
What do I think about the scalability of the solution?
The scalability is very good. In our organization we have almost 10,000 associates and that means we have about 10,000 endpoints, including 3,000 servers.
How are customer service and support?
We have contacted their support several times, not only for Defender for Identity, due to false positives, but also for some other solutions. There is some delay in response, it's not an immediate reply. They will take one or two days to reply, based on the priority.
How would you rate customer service and support?
Neutral
How was the initial setup?
It's not very complicated to deploy, although we were not involved. It was deployed by Microsoft. We just provided the Active Directory server details and they integrated it. It took about one week to fully deploy it, and there were three people involved.
There is no maintenance required on our side. Everything is done by the vendor, including all the security patches. It is a cloud-based security solution, it's not on-premises, so we don't need to manage anything on our side. Everything, all the patches and all the application upgrades, happen automatically.
What other advice do I have?
You need to understand why this product is important and why it is required in your organization. What are the benefits? You have to identify that first. If you don't understand the requirements or the benefits, you will not get the proper answers. You have to evaluate your security design and identify the importance of Active Directory logs and Active Directory protection.
You also have to ensure your Active Directory policies are well maintained and monitor your Active Directory logs as well.
If I could choose between a single security vendor or having multiple vendors, I would always prefer a multi-vendor approach. A single vendor only has a single source of threat intelligence, but if you want to protect your organization, and the budget permits, you should have multiple security sources.
No one can say they are 100 percent secure, even after you put a lot of security devices in place and have done everything. Security devices are based on predefined rules or behavioral-based analysis or IOC-based. They have the intelligence to detect possible threats, but there are limitations. There are known and unknown threats. But with Defender for Identity, over the last five years, I have not observed any vulnerabilities. Several breaches have happened in our organization, but there have been no major breaches. There have been no ransomware or security events in that time. Everything has been detected. Sometimes we get false positives, but we notify Microsoft that those are not malicious files and they can be whitelisted. Defender is very good at detecting any abnormal behavior or malicious files.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Microsoft Defender for Identity
March 2025

Learn what your peers think about Microsoft Defender for Identity. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
848,253 professionals have used our research since 2012.
Self Employed, Freelance, Consultor, Sales - Learning Time at SpectralByte
The solution is easy to implement and helps us identify issues like weak or reused passwords
Pros and Cons
- "One of our users had the same password for every personal and company account. That was a problem because she started receiving phishing emails that could compromise all of her accounts. Defender told us that the user was not changing their password."
- "Microsoft should look at what competing vendors like CrowdStrike and Broadcom are doing and incorporate those features into Sentinel and Defender. At the same time, I think the intelligence inside the product is improving fast. They should incorporate more zero-trust and hybrid trust approaches. They need to build up threat intelligence based on threats and methods used in attacks on other companies."
What is our primary use case?
Defender for Identity provides intelligent authentication through conditional access policies and monitors user behavior. Defender looks at things like password changes and application use.
How has it helped my organization?
One of our users had the same password for every personal and company account. That was a problem because she started receiving phishing emails that could compromise all of her accounts. Defender told us that the user was not changing their password.
What needs improvement?
Microsoft should look at what competing vendors like CrowdStrike and Broadcom are doing and incorporate those features into Sentinel and Defender. At the same time, I think the intelligence inside the product is improving fast. They should incorporate more zero-trust and hybrid trust approaches. They need to build up threat intelligence based on threats and methods used in attacks on other companies.
For how long have I used the solution?
I have used Defender for two years.
What do I think about the stability of the solution?
I rate Defender for Identity nine out of 10 for stability.
What do I think about the scalability of the solution?
I rate Defender for Identity 10 out of 10 for scalability.
How are customer service and support?
Defender is pretty solid, so we rarely call support.
How was the initial setup?
The implementation is fast and easy. You only need to buy a license and assign it to a user.
What was our ROI?
We have seen a return on our investment.
What other advice do I have?
I rate Microsoft Defender for Identity nine out of 10. My advice to new users is to learn the product. Microsft has courses you can take. They offer one that covers all their security solutions. It only takes a day and is the best way to learn how to use the product.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cloud Solutions Architect at a tech services company with 201-500 employees
Integration with other Microsoft products is simple, providing a holistic security solution
Pros and Cons
- "The feature I like the most about Defender for Identity is the entity tags. They give you the ability to identify sensitive accounts, devices, and groups. You also have honeytoken entities, which are devices that are identified as "bait" for fraudulent actors."
- "An area for improvement is the administrative interface. It's basic compared to other administrative centers. They could make it more user-friendly and easier to navigate."
What is our primary use case?
The use case is securing identity on your on-premises Active Directory.
How has it helped my organization?
It helps identify insider leaks. If any of your users want to use their permissions to implement leaks or perform malicious actions, it alerts you.
It also performs reconnaissance. If someone has succeeded in gaining access to your Active Directory, it monitors anomalous behaviors, such as moving laterally.
Microsoft has also identified vulnerabilities globally and Defender for Identity prevents such security incidents from occurring in your domain controllers.
Another benefit is that Defender for Identity saves us time because it is automated and proactive. I don't have to monitor the environment, just the feedback and alerts from the solution. It also helps save us money because it prevents potential breaches that would cost money.
In addition, the solution has decreased our time to detection.
What is most valuable?
The feature I like the most about Defender for Identity is the entity tags. They give you the ability to identify sensitive accounts, devices, and groups. You also have honeytoken entities, which are devices that are identified as "bait" for fraudulent actors. Once these devices have been tagged, they give you alerts about when a malicious actor tries to explore the vulnerability that you created. You can monitor what the attacker is going after. Entity tagging is a big win for Defender for Identity.
There is a connection between the cloud, Defender for Endpoint, and Defender for Cloud Apps, in addition to Defender for Identity, so that you get feedback about activity on the cloud regarding a user if he tries to move laterally in the on-premises Active Directory.
It gives you visibility into threats. On the cloud, you already have Azure AD Identity Protection to secure your cloud identity. But the security of Defender for Endpoints requires certain protections for your on-premises identity. It's helpful for organizations that have quite a few on-premises entities. There aren't a lot of organizations like that now, as quite a few have already moved to the cloud, but for those that are still on-prem need that security.
We also use Microsoft Defender for Endpoint and Intune. The beauty of Microsoft is that, with just a few clicks, it integrates all the security features. Signals from Defender for Identity can move to Defender for Endpoint, Defender for Cloud Apps, and Intune. That ensures that it eliminates false positives and gives you a comprehensive overview, like a map, of what a malicious actor has done. It tells you how a user moved from this device to that device, which is very good.
When it comes to comprehensiveness, Microsoft has done a good job of making Defender for Identity pretty straightforward and easy to use. There are detection rules that help you identify potential attacks. Your role, as a security professional using Defender for Identity, is basically to monitor and implement a few configurations, after the initial deployment.
Defender for Identity is automated, in that you can specify specific alerts or incidents to defend against.
Defender for Identity, Defender for Endpoints, Defender for Office 365, and Defender for Cloud Apps all point to the Microsoft Defender Security Center. That gives you a one-stop-shop dashboard where you can see the activity for these four solutions.
What needs improvement?
An area for improvement is the administrative interface. It's basic compared to other administrative centers. They could make it more user-friendly and easier to navigate.
For how long have I used the solution?
I have been using Microsoft Defender for Identity for over a year.
What do I think about the stability of the solution?
So far, so good, when it comes to stability.
What do I think about the scalability of the solution?
You can add it to more servers. It has been developed in such a way that, if you have 20 servers in an enterprise, you can install it on all the servers in your environment, and it has a dashboard that tells you if the Defender for Identity sensor has stopped.
Our environment has about 700 end-users.
How are customer service and support?
I haven't had to contact their technical support.
Which solution did I use previously and why did I switch?
We did not have a solution before using Defender for Identity.
How was the initial setup?
The initial deployment of the solution, overall, is pretty straightforward. You install the sensor on-premises, on the virtual machine that is running Active Directory.
What about the implementation team?
I did it myself. I'm a security expert, working for a Microsoft managed-services provider. There were three to four people involved.
What was our ROI?
It's very tricky to identify a return on investment. A return on investment for a solution like this can only be quantified when you can measure its effects. Of course, it identifies and eliminates breaches, and since we have not had any breaches, the return on investment has been good. It's protecting the environment.
What other advice do I have?
I would always recommend a single-vendor security suite over multiple suppliers because you get a comprehensive overview of the handshake between all the security offerings in the Microsoft solution. In this case, they include Defender for Identity, which is integrated with Defender for Endpoint, Defender for Cloud Apps, and Defender for Office 365. A holistic, single security solution is better than having multiple solutions where you have to monitor different platforms, and where you can get conflicting reports.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner.
Threat Analysis Technology Risk & Cybersecurity Analyst II at a consultancy with 5,001-10,000 employees
Without some of the alerts we get, it would be very difficult to know what is happening
Pros and Cons
- "All the integration it has with different Microsoft packages, like Teams and Office, is good."
- "And when you are working in a priority IP address, Identity is not able to know that those IPs are from the company. It sees that the IPs are from Taiwan or from Hong Kong or from India, even though they are internal IPs, resulting in a lot of false positives."
What is our primary use case?
I work for a bank and use it to see if users are doing something illegal or are taking some kind of risk. We receive alerts from it and we follow up on the issues.
How has it helped my organization?
It gives us control over all our users and everything they are working on. Defender for Identity is good to have because there are some types of alerts that, without them, it would be very difficult to know what is happening. All the integration it has with different Microsoft packages, like Teams and Office, is good.
When there are potentially risky users, the solution automatically blocks them. That helps prevent security incidents, and it's also good because we don't have to block them manually.
It also helps us be prepared for threats before they hit. And it has decreased our time to respond because the analytics make it easier.
What is most valuable?
You can block users very easily, with just one click. And the information about the tokens is useful.
What needs improvement?
The logs are not too clear when you search in Azure Identity.
And when you are working in a priority IP address, Identity is not able to know that those IPs are from the company. It sees that the IPs are from Taiwan or Hong Kong or India, even though they are internal IPs, resulting in a lot of false positives.
For how long have I used the solution?
I have been using Microsoft Defender for Identity for one year.
What do I think about the stability of the solution?
It hasn't crashed and there hasn't been any downtime. The stability is good. It's in the cloud and it works.
What do I think about the scalability of the solution?
The scalability is good. We have about 50,000 users in several locations.
Which other solutions did I evaluate?
The visibility into threats with Defender for Identity is good, but I now use another identity tool, CrowdStrike Falcon Identity Protection and it may be better in certain ways. Still, the visibility with Defender for Identity is good and CrowdStrike is more difficult to implement.
We also use Microsoft Sentinel, but we have a lot of SIEMs, including CrowdStrike and Splunk. The problem with Sentinel is that it doesn't have specific rules. You can't change anything. It's difficult to work with it because the logs are not good enough. For investigations, it's more useful if you have another SIEM like Splunk. But when Microsoft Defender for Identity creates an alert, it's better. It gives you the user and the host, and it's easier to work with.
What makes Sentinel good is the description it provides. It's useful for knowing what is happening. But if you are going to do something deeper, it becomes more difficult. We don't have good queries because they are difficult to write. It's difficult to work with it.
What other advice do I have?
In the past, we had a dashboard for Defender for Identity that was really good, with a lot of views and information. But I think our company has changed things to SharePoint and, in SharePoint, the Identity information is not as clear. The old dashboard was better.
In the discussion about using one vendor's security suite versus products from various vendors, Microsoft is good but perhaps it would be good to have other products, such as internal solutions. Because with Microsoft, you can't change the rules or make your own rules, and that makes it difficult to get 100 percent protection. But Microsoft Defender for Identity is a good product.
It works well, but you have to work with the tool a lot to know when detections are false positives. If you put in an identity that was a false positive, sometimes you get an alert again. Sometimes, it doesn't learn.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Security Specialist at a construction company with 1,001-5,000 employees
Used for detecting user anomalies, sign-in anomalies, and user behavior analytics
Pros and Cons
- "The solution’s alerting is fairly efficient."
- "The solution should provide more detailed data regarding anomaly detections."
What is our primary use case?
The solution is primarily used for detecting user anomalies, sign-in anomalies, user behavior analytics, and identifying business compromises.
What is most valuable?
The solution’s alerting is fairly efficient.
What needs improvement?
The solution should provide more detailed data regarding anomaly detections. You get information occasionally, but it doesn't always correlate the different anomalies accurately. It takes quite a lot of effort to look at sign-in logs and security alert logs.
It would be nice to consolidate all that information into a more centralized view instead of going through different platforms in the Azure Stack to investigate.
For how long have I used the solution?
I have been using the solution for two to three years.
What do I think about the stability of the solution?
The agent deployed on domain controllers and servers isn't very stable. In some instances, agents needed to be redeployed. In other cases, we had to involve Microsoft engineers to fix the issues.
How are customer service and support?
Microsoft's first-level support is extremely pathetic. They take an extremely long time to escalate a call to a tier two or tier three analyst for extra in-depth investigations. We've had calls open for a month that weren't escalated to the correct people to solve them.
We have different channels to contact Microsoft support instead of the normal help center channels.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We haven't used anything besides Cisco Identity Services Engine (ISE), but that's just for identity protection for your on-premise networks. It's not cloud-integrated. In contrast, Microsoft Defender for Identity works for both on-premise and cloud environments.
How was the initial setup?
The solution’s initial setup was fairly straightforward. It probably took about a month to get it fully implemented.
What about the implementation team?
The solution was implemented through an in-house team.
What's my experience with pricing, setup cost, and licensing?
Microsoft's licensing model is very complex to understand. Microsoft Defender for Identity comes as part of the Microsoft E5 licensing stack. We do not have to pay additional costs for technical support.
What other advice do I have?
The solution uses machine learning to detect if a user has never used a certain service provider or public IP address. The tool picks that up as an anomaly. Then, the user gets flagged that it's a potentially risky sign-in. You get alerted about that, and then you need to investigate.
From a business perspective and brand image, the solution helps quite a lot by responding to incidents quickly. The solution’s alerting is fairly efficient. The solution has built-in automation that can automatically disrupt attacks and block or disable accounts. The solution's cost savings are probably hard to gauge as we haven't used another product in the past.
The solution integrates seamlessly with the other Microsoft tools we have. Microsoft Copilot for Security is an additional product that Microsoft has released for enhanced AI capabilities over the Microsoft Defender stack. It comes with additional licensing. I would recommend the solution to other users.
Overall, I rate the solution an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Sep 11, 2024
Flag as inappropriateOwner at a tech services company with 51-200 employees
Provides PIM management, access detection, and synchronization
What is our primary use case?
We use the solution for PIM management, access detection, and synchronization with Intra.
What is most valuable?
It has the ability to block access, monitor, and log in.
What needs improvement?
It integrates with on-premises Active Directory environments. It is designed to enhance security by providing advanced threat detection and response capabilities for both Azure Active Directory and on-premises Active Directory. This integration allows for comprehensive monitoring and protection of identity-related activities across both environments.
It focuses on protecting the on-premises Active Directory infrastructure and does not directly link both identity repositories. For users operating in mixed environments, while Defender for Identity offers robust protection for on-premises AD, additional solutions or configurations might be necessary to ensure seamless security management across Azure and on-premises AD systems.
What do I think about the stability of the solution?
It is stable.
I rate the solution’s stability a nine out of ten.
What do I think about the scalability of the solution?
It is scalable. It is suitable for large enterprises.
I rate the solution’s scalability a ten out of ten.
How are customer service and support?
Support varies depending on your subscription level. For corporate enterprise and premium plans, you can expect more comprehensive support. However, if you have a basic or standard subscription, you might experience lower-priority support. Generally, the support provided is good, but response times may be longer for lower-tier plans. The support team is often overwhelmed due to high demand.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is not very complex, but it could be easier. They are very easy to configure and set up. Two people—one a security consultant and another infra—are required for deployment.
I rate the initial setup an eight-point five out of ten, where one is difficult, and ten is easy.
What was our ROI?
It provides time-saving.
What's my experience with pricing, setup cost, and licensing?
It has a fair price.
What other advice do I have?
I recommend the solution.
Overall, I rate the solution an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Aug 11, 2024
Flag as inappropriateCyber Security BA/BSA at a insurance company with 10,001+ employees
Identifies, detects, and investigates advanced threats
Pros and Cons
- "This solution has advanced a lot over the last few years."
- "When the data leaves the cloud, there are security issues."
What is our primary use case?
We are looking at this solution as a trusted tenant for our network.
This way, all of the data that goes through is trusted and the communication between our on-prem system and the Azure Cloud remains protected. Our only concern is when the data leaves the Azure Cloud and goes to another third-party tenant.
Azure is our trusted tenant — we trust it. We're just concerned about the data when it leaves Azure and goes to another third-party tenant. For example, if you have a SaaS solution, like Salesforce, sometimes they send data to customers. In order to do this, the data has to leave the trusted cloud tenant.
What is most valuable?
We like the Active Directory Federation feature. We use it a lot with the Microsoft Azure Cloud.
What needs improvement?
When the data leaves the cloud, there are security issues.
The cloud security services and the integration with on-prem applications like SIEM, needs to be improved.
For how long have I used the solution?
We have been using this solution for roughly two years.
What do I think about the stability of the solution?
Microsoft Defender for Identity is very stable.
What do I think about the scalability of the solution?
As it's a cloud application, there are no issues with scalability.
How are customer service and technical support?
I've never had to deal with support regarding this solution; however, overall, Microsoft's support is quite good.
How was the initial setup?
I was not involved in the initial setup, but I think Microsoft has a good team that can help you set it up. I believe the initial setup went very well.
What other advice do I have?
Microsoft is a big company. They have put a lot of effort into their cloud solutions. They're the way of the future. They have done a lot to catch up with what Amazon did.
This solution has advanced a lot over the last few years. It integrates very well with Office 365. For this reason, I think it's the way of the future.
Overall, on a scale from one to ten, I would give this solution a rating of eight.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Microsoft Defender for Identity Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Product Categories
Identity Threat Detection and Response (ITDR) Advanced Threat Protection (ATP) Microsoft Security SuitePopular Comparisons
CrowdStrike Falcon
Varonis Platform
Cortex XSIAM
Microsoft Entra ID Protection
Securonix Next-Gen SIEM
SentinelOne Singularity Identity
BloodHound Enterprise
Semperis Directory Services Protector
Proofpoint Identity Threat Defense
Buyer's Guide
Download our free Microsoft Defender for Identity Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions: