Identity Attack Investigation Runbook
SOC & DFIR Operations Guide
Overview & Scope
Identity Attack Categories
Category
Techniques
Detection Sources & Data Mapping
Log Sources Matrix
Platform
Log Table
Key Events
Critical Windows Event IDs
Event ID
Description
Investigation Relevance
Investigation Workflows
Compromised Account Investigation
Step 1: Initial Triage
Step 2: Sign-In Analysis
Step 3: Activity Timeline
Step 4: Lateral Movement Check
Step 5: Containment Actions
Credential Attack Investigation
Detection Indicators
Investigation Steps
Kerberos Attack Investigation
Kerberoasting Indicators
Golden/Silver Ticket Indicators
KQL Query Cheat Sheet
Entra ID Sign-In Analysis
User Sign-In Summary (Last 7 Days)
Failed Sign-Ins with Error Details
Impossible Travel Detection
Password Spray Detection
Password Spray Pattern Detection
Successful Auth After Spray
Defender for Identity Queries
Kerberoasting Detection
DCSync Detection
On-Premises AD Queries
NTLM Authentication Analysis
Suspicious Service Ticket Requests (Kerberoasting)
Privileged Group Membership Changes
Prisma Access Queries
VPN Authentication Anomalies
Concurrent Session Detection
Response Actions & Remediation
Immediate Containment Actions
Scenario
Action
Command/Location
Post-Incident Hardening
Action
Details
Quick Reference Cards
Attack Type Quick Identification
Attack Type
Key Indicators
Primary Data Source
Entra ID Error Code Reference
Error Code
Description
Investigation Notes
Escalation Matrix
Severity Classification
Severity
Criteria
Response Time
Escalation Path
Tier
Responsibility
Documentation Requirements
MITRE ATT&CK Mapping
Tactic
Technique
ID
Detection
Appendix: PowerShell Commands
Entra ID / Azure AD (Microsoft Graph)
On-Premises Active Directory
Microsoft Graph API (REST)
Last updated