90%
Of incident response investigations in 2025 involved identity weaknesses, per Unit 42 and CrowdStrike reporting
65%
Of initial access in enterprise breaches was identity-driven in 2025: phishing, stolen credentials, or brute force
25 min
Time for AI-assisted attack simulations to achieve full exfiltration in Unit 42 2026 research, leaving no window for manual ITDR response
65.7B
Identity records recaptured by threat actors in 2025, a 23% year-over-year increase, per SpyCloud annual report

Identity is the new perimeter, and the perimeter is under constant attack. Attackers in 2026 do not primarily exploit software vulnerabilities to gain enterprise access. They steal, purchase, or brute-force credentials and log in. Once inside with valid credentials, they blend with legitimate user behavior, escalate privileges using identity-layer techniques like Kerberoasting and Pass-the-Ticket, and move laterally across systems that trust the identity they have assumed.

Traditional security tools were not built for this threat model. SIEM rules fire on known indicators. EDR monitors endpoint behavior. IAM enforces policy at authentication time. None of these tools were designed to detect an attacker who has a valid credential and is using it in subtly abnormal ways.

Identity Threat Detection and Response (ITDR) is the discipline that fills this gap. It applies behavioral analytics, attack technique detection, and automated response to identity-layer threats specifically. This guide covers what ITDR is, what it detects that other tools miss, the leading platforms, and how to prioritize ITDR implementation in your security program.

What ITDR Detects That Other Tools Miss

The detection gap that ITDR addresses is precisely defined: identity-layer attack techniques that use legitimate credentials and protocols, making them invisible to tools that look for known malicious signatures or obvious anomalies.

Kerberoasting is the canonical example. An attacker with any valid domain account can request Kerberos service tickets for service principal names (SPNs) registered in Active Directory. The tickets are encrypted with the service account's password hash. The attacker takes the tickets offline and cracks them to recover the service account password, which often has elevated privileges. The Kerberos request itself is legitimate protocol traffic. Nothing about it triggers standard EDR or SIEM rules written for malware signatures. ITDR platforms that baseline normal Kerberoasting rates and alert on anomalous service ticket request volumes, particularly requests for high-value service accounts from unusual workstations, catch this technique.

Pass-the-Ticket and Pass-the-Hash allow attackers to use captured Kerberos tickets or NTLM hashes to authenticate as another user without knowing their password. The authentication event looks legitimate: a valid ticket or hash was presented. ITDR detects behavioral anomalies around these events, such as a ticket being used from a different IP address than where it was issued, or authentication events that do not match the user's historical patterns.

Lateral movement using legitimate remote access protocols (SMB, WMI, RDP, PsExec) is similarly invisible to signature-based detection. When an administrator account that normally accesses two systems suddenly accesses 40 systems in 30 minutes, ITDR's behavioral baselining surfaces this as anomalous. Standard SIEM rules without behavioral baselines see only authenticated administrator access, which matches the expected rule condition.

Kerberoasting detection

Anomalous service ticket request volumes for high-privilege SPNs from non-administrative workstations or at unusual times.

Pass-the-Ticket and Pass-the-Hash

Behavioral anomalies in ticket usage: different source IP than issuance, replay outside of normal usage patterns, or tickets presented from endpoints without corresponding logon events.

DCSync and domain replication abuse

Unauthorized use of domain replication protocols to extract password hashes for all domain accounts from a domain controller, a technique used by ransomware groups before lateral movement.

Golden Ticket and Silver Ticket attacks

Forged Kerberos tickets that grant persistent access. ITDR detects tickets with lifetimes inconsistent with domain policy or tickets for accounts that have no corresponding Active Directory record.

Account enumeration and credential spraying

Systematic probing of valid usernames and distributed low-rate password attempts designed to evade lockout policies.

ITDR vs. PAM vs. IAM: Understanding the Distinction

ITDR, PAM, and IAM address different phases of the identity security lifecycle, and understanding their boundaries clarifies why each is needed and where they overlap.

IAM (Identity and Access Management) governs the provisioning and policy enforcement layer: who gets access to what, under what conditions, and for how long. IAM tools manage the lifecycle of identities from creation to deprovisioning. They enforce access policy at the authentication and authorization checkpoint. They do not monitor what happens after access is granted or detect when granted access is being abused.

PAM (Privileged Access Management) extends IAM specifically for high-privilege accounts: vaulting credentials, recording sessions, enforcing just-in-time access, and monitoring privileged activity. PAM addresses the standing privilege problem. It does not provide broad identity threat detection across all user accounts, only the specific accounts enrolled in the PAM system.

ITDR monitors the entire identity layer continuously for threat behaviors. It watches all authentication events, all access patterns, all privilege usage, and all identity-related protocol traffic (Kerberos, NTLM, LDAP) for evidence of attack techniques. Where IAM and PAM enforce policy, ITDR detects deviations from expected identity behavior that may indicate compromise.

Gartner and KuppingerCole now recommend treating ITDR and PAM as complementary layers in a unified identity defense strategy. PAM reduces the attack surface by eliminating standing privileges. ITDR detects when the remaining identity attack surface is being exploited. Organizations that implement only one without the other have coverage gaps: PAM without ITDR cannot detect techniques that operate outside enrolled PAM accounts; ITDR without PAM cannot eliminate the over-privileged account conditions that make identity attacks so impactful.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Leading ITDR Platforms in 2026

The ITDR market formed rapidly following Gartner's 2022 identification of the category. Three categories of platform have emerged: purpose-built ITDR tools, identity security platforms with ITDR capabilities, and endpoint-centric security platforms extending into identity.

CrowdStrike Falcon Identity Protection is the most widely deployed enterprise ITDR solution. Built on CrowdStrike's threat graph, it provides behavioral analysis for Active Directory, Azure AD, and Okta identities, detection coverage for all major AD attack techniques, and integration with the Falcon XDR platform for unified identity and endpoint investigation. Its strength is deep AD attack coverage and tight integration with the broader CrowdStrike ecosystem. Organizations standardizing on CrowdStrike get ITDR as a natural extension.

Microsoft Defender for Identity (formerly Azure ATP) provides ITDR specifically for Active Directory and Azure AD environments within the Microsoft security stack. It integrates natively with Microsoft Sentinel and Defender XDR, making it the natural ITDR choice for organizations running the Microsoft security platform. Its coverage is deep for Microsoft identity protocols and shallower for non-Microsoft identity providers.

Vectra AI takes a network-based approach to identity threat detection, analyzing Kerberos, NTLM, LDAP, and SMB traffic from the network layer rather than requiring directory service integrations. This approach works in environments where agent deployment on domain controllers is restricted and provides visibility into identity attacks that never touch an instrumented endpoint.

SentinelOne Singularity Identity, Semperis, and Silverfort round out the leading platforms. Semperis is particularly strong in Active Directory disaster recovery and AD forest recovery following ransomware attacks, combining ITDR detection with the ability to restore a clean AD state after compromise.

Implementing ITDR: Prioritization and Integration

ITDR implementation requires deciding where to start, what to connect, and how to integrate findings into the broader SOC workflow.

Active Directory is the highest-priority ITDR target in most enterprises. AD is the identity backbone for Windows environments, holds the keys to the domain, and is the target of the most impactful identity attack techniques. ITDR coverage for AD attack techniques (Kerberoasting, DCSync, Golden Ticket, LDAP enumeration) should be the first deployment priority.

Data source integration determines detection quality. ITDR platforms require access to: Windows Security event logs from domain controllers (particularly logon events, Kerberos ticket events, and directory service changes); network traffic capturing Kerberos and NTLM authentication flows (PCAP or NetFlow from domain controller-adjacent network segments); and cloud identity provider logs (Azure AD sign-in logs, Okta system logs, AWS IAM events). Incomplete data source coverage creates blind spots in identity threat detection.

Response automation is the most impactful ITDR capability after detection. An attacker discovered performing Kerberoasting has a time advantage measured in minutes before they crack the offline ticket and begin using the compromised credential. ITDR response automation that can immediately disable the targeted service account, force a password reset, or apply an access restriction without waiting for analyst approval eliminates that time window. Define automated response playbooks for the highest-severity identity attack techniques before deploying ITDR in production.

SIEM integration routes ITDR alerts alongside other security events for unified investigation. ITDR findings frequently require correlation with endpoint data (what did the process tree on the system that made the suspicious Kerberos request look like?) and network data (what did the attacker do after obtaining the credential?). ITDR as a standalone tool produces alerts; ITDR integrated into a unified investigation platform produces complete incident context.

Active Directory Security Hardening as the ITDR Foundation

ITDR detects attacks against Active Directory. AD hardening reduces the attack surface that ITDR must monitor and reduces the impact of any successful attack. Both are required; neither is sufficient alone.

The highest-impact AD hardening controls are: enabling Protected Users security group membership for privileged accounts, which prevents NTLM authentication and short-lived Kerberos ticket caching for those accounts; implementing tiered administration (separate administrative accounts for Tier 0, domain controllers and AD management; Tier 1, server administration; Tier 2, workstation administration) to prevent credential lateral movement across tiers; deploying Managed Service Accounts or Group Managed Service Accounts (gMSA) to replace service accounts with manually managed passwords that are never changed; enabling AD Recycle Bin and Protected Deleted Objects to support forensic recovery after an attack; and auditing and removing unnecessary SPN registrations that are targets for Kerberoasting.

Microsoft's ESAE (Enhanced Security Admin Environment) architecture and its successor, the Enterprise Access Model, provide reference architectures for AD privilege tiering that significantly limit the blast radius of any individual identity compromise. Purple Knight (from Semperis) and PingCastle are free tools that assess AD security posture against hundreds of known misconfiguration and attack exposure indicators, providing a starting point for remediation prioritization.

The bottom line

Identity-based attacks now account for the majority of successful enterprise breaches, and they succeed because the tools organizations have invested in (SIEM, EDR, IAM) were not designed to detect credential abuse, Kerberos ticket manipulation, and Active Directory attack techniques. ITDR fills that gap specifically. Start with AD attack technique detection as the highest-priority deployment, integrate with your SIEM for unified investigation, and add automated response for the highest-severity identity attack patterns. Pair ITDR with AD hardening controls that reduce the attack surface being monitored.

Frequently asked questions

What does ITDR stand for and what does it do?

ITDR stands for Identity Threat Detection and Response. It is a security discipline and product category focused on detecting attacks that target digital identities, such as credential theft, Kerberos ticket abuse, Active Directory attacks, and lateral movement using legitimate credentials. ITDR applies behavioral analytics to identity-layer data (authentication events, directory service traffic, privilege usage) to identify attack patterns that traditional tools miss because they use valid credentials and legitimate protocols.

What is Kerberoasting and why is it hard to detect without ITDR?

Kerberoasting is an Active Directory attack where an attacker with any valid domain account requests Kerberos service tickets for registered service principal names. The tickets are encrypted with the service account's password hash. The attacker takes them offline and cracks them to recover the password. The attack uses entirely legitimate Kerberos protocol operations, so it generates no malware signatures and no obviously suspicious events. ITDR detects it through behavioral baselining: unusual request volumes, non-administrative accounts requesting tickets for high-privilege service accounts, or requests at atypical times.

How is ITDR different from a SIEM?

A SIEM aggregates logs and fires rules when specific conditions are met. It is effective for known-bad signatures and threshold-based detection. ITDR applies continuous behavioral baselining specifically to identity data: it learns what normal looks like for each identity and detects deviations that suggest attack activity. ITDR has deeper knowledge of identity attack techniques (Kerberoasting, DCSync, Golden Ticket) and their specific telemetry signatures than general-purpose SIEM rules. The two tools are complementary: ITDR detects identity-layer threats; SIEM correlates them with other security events for full incident context.

Do we need ITDR if we already have PAM?

Yes. PAM controls privileged access for enrolled accounts and records privileged sessions. It does not monitor the broader identity attack surface: non-PAM accounts being Kerberoasted, lateral movement using legitimate administrative tools, or domain controller replication abuse. PAM reduces the attack surface; ITDR monitors the attack surface that remains. Organizations with both get defense-in-depth: PAM eliminates standing privileges that reduce what attackers can do after credential theft; ITDR detects the credential theft and subsequent attack techniques before they succeed.

What data sources does ITDR require?

Core data sources for ITDR are: Windows Security event logs from domain controllers (logon events, Kerberos ticket events, directory service changes, LDAP queries); network traffic capturing authentication protocols (Kerberos on port 88, NTLM, LDAP on 389/636, SMB on 445); and cloud identity provider logs (Azure AD sign-in logs, Okta system logs). Some platforms also ingest endpoint telemetry for correlation with identity events. Missing any of these data sources creates detection blind spots for specific attack techniques.

Which ITDR platform is best for Microsoft-centric environments?

Microsoft Defender for Identity is the natural first choice for Microsoft-centric environments because of its deep native integration with Azure AD, Active Directory, Microsoft Sentinel, and Defender XDR. It requires no additional data connectors for Microsoft identity data sources and produces alerts that surface directly in the unified Defender portal. CrowdStrike Falcon Identity Protection is the preferred alternative for organizations running CrowdStrike as their primary security platform, as it integrates ITDR into the same threat graph and investigation interface as endpoint and cloud detections.

Sources & references

  1. CrowdStrike: Identity Threat Detection and Response
  2. Microsoft: Identity Threat Detection and Response
  3. Gartner: Identity Threat Detection and Response Market
  4. Vectra AI: ITDR Explained
  5. Nudge Security: ITDR 2026 Guide

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.