80%
Of breaches involve compromised credentials (Verizon DBIR 2025)
214 days
Average dwell time before identity-based attack detected
2,500+
Service accounts in the average enterprise AD environment
32%
Projected ITDR market CAGR through 2028

Identity Threat Detection and Response (ITDR) is a security discipline focused on detecting and responding to attacks that abuse legitimate identity infrastructure rather than exploiting software vulnerabilities. Unlike IAM (which governs access), PAM (which manages privileged accounts), or UEBA (which analyzes individual user behavior patterns), ITDR monitors Active Directory and Entra ID for the attack techniques used after an attacker already has valid credentials: Kerberoasting, DCSync, pass-the-hash, pass-the-ticket, privilege escalation via group membership manipulation, and service account abuse. Gartner formalized ITDR as a distinct category in 2022, and it has become one of the fastest-growing segments in enterprise security tooling as identity-based attacks have overtaken malware as the primary post-breach lateral movement method.

Why ITDR Exists: The Identity Attack Surface IAM and PAM Cannot See

IAM and PAM tools are provisioning and access control systems. They answer the question: who should have access to what? They are not designed to detect when legitimate access is being abused or when the identity infrastructure itself is under attack.

The specific gap ITDR fills: an attacker who has compromised a standard domain user account and begins Kerberoasting — requesting Kerberos service tickets for service accounts and cracking them offline — generates no alerts in a correctly configured IAM or PAM system. The requests are legitimate. The credentials are valid. Active Directory processes them normally. Without a tool specifically watching for the behavioral patterns of Kerberoasting, the attack proceeds undetected until the attacker escalates to Domain Admin.

The techniques ITDR specifically monitors for:

  • Kerberoasting (T1558.003): Requesting service tickets for SPNs to crack offline
  • AS-REP Roasting (T1558.004): Targeting accounts without pre-authentication required
  • DCSync (T1003.006): Simulating domain controller replication to extract password hashes
  • Pass-the-Hash / Pass-the-Ticket (T1550.002/003): Lateral movement using captured hashes or Kerberos tickets
  • Golden / Silver Ticket attacks (T1558.001/002): Forged Kerberos tickets using krbtgt or service account hashes
  • LDAP reconnaissance (T1018): AD enumeration via BloodHound-style queries
  • Privilege escalation via group manipulation: Adding accounts to high-privilege groups outside normal provisioning workflows
  • Service account abuse: Interactive logins on accounts configured for non-interactive service use

ITDR vs PAM vs UEBA: What Each Category Actually Covers

CategoryPrimary FunctionWhat It DetectsWhat It Misses
IAMAccess provisioning and governanceUnauthorized provisioning, orphaned accountsAbuse of legitimate access, Kerberos attacks
PAMPrivileged account vaulting and session controlUnauthorized privileged account useKerberoasting, DCSync, attack paths via non-vaulted accounts
UEBABehavioral baseline and anomaly detectionDeviations from user behavioral baselineAttacks that stay within normal behavior patterns, AD-specific techniques
ITDRIdentity infrastructure attack detectionKerberos attacks, DCSync, lateral movement, privilege escalation, AD/Entra ID manipulationNon-identity attack vectors, network-layer threats

The practical implication: ITDR is most effective as a complement to PAM rather than a replacement. PAM vaults privileged credentials and sessions. ITDR detects when attackers bypass the PAM vault entirely by compromising credentials outside it, or when they abuse the Kerberos infrastructure that PAM does not control.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

ITDR Vendor Comparison

VendorAD/Entra DepthAgentlessAttack Path AnalysisBest For
CrowdStrike Falcon Identity ProtectionHigh (DC sensor, Entra ID)PartialStrongCrowdStrike shops, unified XDR
SilverfortVery high (authentication proxy)YesStrongMFA on legacy apps, service accounts
Vectra AI IdentityHigh (Entra ID focus)Yes (API-based)ModerateEntra ID / M365-heavy environments
Microsoft Entra ID ProtectionEntra ID only (no on-prem AD)Yes (built-in)LimitedPure Entra ID environments, M365 E5
Illusive (Akamai Guardicore)High (deception-based)PartialVery strongDeception-first, high-value targets

Key differentiator — Silverfort's authentication proxy model: Silverfort sits inline with authentication traffic (Kerberos, NTLM, LDAP, RADIUS) and can enforce MFA on any authentication request, including service accounts and legacy protocols that traditional MFA cannot reach. This makes it uniquely capable at the service account problem: the average enterprise has 2,500+ service accounts that PAM vaults do not cover and that Kerberoasting specifically targets.

Deployment Considerations: Agentless vs Agent-Based and AD Integration Depth

Agent-based approaches (CrowdStrike Falcon Identity): Require a lightweight sensor installed on domain controllers. This gives deep visibility into Kerberos ticket requests, LDAP queries, and replication traffic at the source. The tradeoff is deployment complexity: any agent on a domain controller requires careful change management and testing, as DC stability is critical. Agent-based approaches typically provide the highest detection fidelity for on-premises AD environments.

Agentless approaches (Silverfort, Vectra, Entra ID Protection): Connect via API to Active Directory Domain Services, Microsoft Graph, or act as an authentication proxy. Agentless deployment is faster and carries no agent stability risk on DCs. The tradeoff is that some attack techniques occurring entirely within the DC — like in-memory DCSync — may be harder to detect without a DC-level sensor. For Entra ID-heavy environments, agentless API-based approaches are fully sufficient since there are no DCs to instrument.

Hybrid environments: Most enterprises run both on-premises AD and Entra ID in hybrid sync configurations. The best ITDR tools cover both planes — monitoring on-premises Kerberos and LDAP activity alongside Entra ID sign-in risk signals and token anomalies. Gaps in hybrid coverage are a common evaluation failure point: a tool that only covers Entra ID misses the on-premises AD attack paths that attackers frequently use as a starting point.

The bottom line

ITDR addresses the identity-layer gap that PAM, IAM, and UEBA tools were not designed to fill: detecting Kerberos attacks, DCSync, lateral movement via credential abuse, and privilege escalation within Active Directory before an attacker reaches Domain Admin. For most enterprises, CrowdStrike Falcon Identity is the strongest choice if you are already in the CrowdStrike ecosystem. Silverfort is the most differentiated option if service account visibility and MFA enforcement on legacy protocols are priorities. Microsoft Entra ID Protection is sufficient for pure cloud environments but misses on-premises AD attack paths. Evaluate ITDR tools specifically on DC coverage depth, hybrid AD/Entra support, and attack path visualization quality.

Frequently asked questions

What is identity threat detection and response (ITDR)?

ITDR is a security discipline that monitors identity infrastructure — Active Directory, Entra ID, Kerberos, and service accounts — for attack patterns that use legitimate credentials to move laterally, escalate privileges, or establish persistence. It detects techniques like Kerberoasting, DCSync, pass-the-hash, and Golden Ticket attacks that IAM and PAM tools are not designed to catch.

How is ITDR different from PAM?

PAM manages and vaults privileged credentials, controls privileged sessions, and enforces least privilege for known privileged accounts. ITDR detects attacks against the identity infrastructure itself, including attacks that bypass the PAM vault entirely by compromising credentials that were never vaulted — service accounts, standard domain accounts used for Kerberoasting, and the AD replication mechanism used by DCSync. ITDR and PAM are complementary, not competing.

What is Kerberoasting and how does ITDR detect it?

Kerberoasting is an AD attack technique where an attacker with any valid domain account requests Kerberos service tickets (TGS) for accounts associated with Service Principal Names (SPNs), then cracks those tickets offline to recover the service account password. ITDR detects Kerberoasting by monitoring for anomalous TGS request patterns: high volume of requests from a single host, requests for accounts with RC4 encryption, or requests originating from hosts that do not normally interact with those services.

Does ITDR work for Entra ID environments?

Yes, all major ITDR vendors support Entra ID coverage. Microsoft Entra ID Protection is the native Microsoft offering. CrowdStrike Falcon Identity Protection, Vectra AI Identity, and Silverfort all provide Entra ID visibility via Microsoft Graph API integration. For hybrid environments, verify that your chosen ITDR tool covers both on-premises AD and Entra ID — some tools cover only cloud identity and miss the on-premises attack paths attackers frequently use as a starting point.

What should I look for when evaluating ITDR tools?

Evaluate on: (1) DC coverage depth — does it require an agent on domain controllers or operate agentless? (2) Hybrid AD and Entra ID coverage — does it cover both planes? (3) Attack path analysis — can it visualize privilege escalation paths to Domain Admin? (4) Service account visibility — does it track all service accounts, not just vaulted ones? (5) Alert fidelity — high-volume low-fidelity alerts on Kerberos events create analyst fatigue; ask for false positive rates in environments similar to yours.

Why are service accounts a priority ITDR concern?

Service accounts are AD accounts used by applications and automated processes rather than humans. They typically have long-lived passwords, elevated privileges, and are rarely monitored for anomalous behavior. Most PAM tools do not vault service accounts. Because service accounts have SPNs registered for them (making them Kerberoastable) and often have elevated permissions, they are a primary target for attackers conducting privilege escalation.

Sources & references

  1. Verizon Data Breach Investigations Report 2025
  2. Gartner Identity Threat Detection and Response Market Guide
  3. CISA Identity and Access Management Guidance
  4. MITRE ATT&CK Credential Access Techniques

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.