Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Task 08: Entra Identity Signals in Defender XDR (cloud-only prerequisites)

Identity investigations on Entra signals visible in Defender XDR (sign-in risk, token anomalies, OAuth app governance) rather than MDI sensors. Let’s demonstrate:

  • Risky sign-ins & conditional access blocks
  • Risky OAuth consent (create a test multi-tenant app and flag it via App Governance)
  • Identity Secure Score improvements (enforce MFA, block legacy auth)

The output will provide evidence-based insight into how Entra risk telemetry flows into your unified XDR environment, and a baseline for later posture-hardening exercises.

In a real-world scenario, Security Architecture would design, while a Security Admin could implement.

  1. Open Windows File Explorer, then go to ‌‌‌C:\LabFiles\E0.

  2. Right-click EntraXDR-Investigate, then select Run with PowerShell.

    3w5zvp5z.jpg

  3. Sign in with your global admin account.

  4. On the Permissions requested dialog, select Consent on behalf of your organization, then select Accept.

    Collects Entra ID risk telemetry (risky sign-ins, OAuth consent events, Identity Secure Score) and exports it to ./out for Defender XDR-style investigations, optionally generating report-only Conditional Access policy JSON and creating a harmless multi-tenant app stub when explicitly enabled.

  5. Observe the outputs in C:\LabFiles\E0\out.

    You may not see all files, depending on your environment.

    • risky-signins.json - Lists recent user sign-ins flagged as risky by Entra ID Protection (risk level, detail, IP, and user info).
    • oauth-consent-audit.json - Captures recent OAuth “Consent to application” audit events showing who granted access to which app.
    • secure-score.json - Contains the tenant’s current Identity Secure Score metrics and enabled security services.