Microsoft Defender for Identity signals are now integrated into Microsoft Entra Recommendations, offering 12 new Identity Secure Score insights. This integration enhances identity threat detection and response, helping organizations strengthen security posture, prevent cyberattacks, and align identity and security teams on a unified platform. Unique :

Microsoft Defender for Identity Signals Now Power Entra Recommendations
Microsoft just took a big step in identity security by integrating Defender for Identity signals into Entra Recommendations. This move aims to boost your organization’s security posture with actionable insights, all in one place.
What’s New?
Entra Recommendations now include 12 new Identity Secure Score suggestions from Microsoft Defender for Identity, currently in public preview. These additions focus on preventing, detecting, and responding to identity-based cyberattacks. They also enhance collaboration between identity and security teams.
“We aim to combine best practices and industry standards across Microsoft Security offerings to secure your organization on a singular platform.” – Shobhit Sahay
Major Updates to Watch
- Misconfigured Enrollment Agent Certificates: Attackers can exploit permissive templates to issue certificates for privileged accounts. Fixing this stops lateral movement.
- Unsafe Permissions on Entra Connect Accounts: Hybrid identity systems with unsafe permissions are prime targets. Removing these risks is critical.
- Reversible Passwords in GPOs: Old Group Policy Preferences may still store decryptable passwords. Removing these files closes an easy attack vector.
- Clear Text Credential Exposure: Unencrypted credentials in network traffic invite interception. Defender for Identity flags these vulnerabilities.
- Dormant Accounts in Sensitive Groups: Inactive accounts can quietly provide attackers access. Removing or disabling them strengthens security.
- Weak Cipher Usage: Weak encryption ciphers are vulnerable to cracking. Defender detects and recommends disabling them.
Additional Key Recommendations
Other important updates include securing Kerberos delegations, managing local admin passwords with Microsoft LAPS, rotating Entra Connect passwords regularly, and replacing overly privileged connector accounts. Plus, VPN integration with Defender for Identity now enriches attack investigations by linking user activity with VPN connections.
“With Microsoft, you can move from reactive response to proactive defense, giving your security and identity admins deeper visibility.” – Shobhit Sahay
Why This Matters
Identity threat detection and response (ITDR) starts with a strong security posture. These new recommendations create a continuous feedback loop to harden defenses against evolving AI-driven cyber threats. By unifying signals from Defender and Entra, Microsoft helps organizations adopt a Zero Trust approach without sacrificing productivity.
How to Access These Recommendations
Simply visit the Microsoft Entra Admin Center, navigate to Overview > Recommendations, and explore the new Identity Secure Score controls.
Looking Ahead
Microsoft plans to expand these integrations, bringing even more Defender for Identity insights into Entra. This growing ecosystem will enhance visibility, speed up threat remediation, and empower security teams with unified identity protection.
Stay tuned for continuous updates that help you secure access for employees, customers, and non-human identities across cloud and on-premises environments.
From the New blog articles in Microsoft Community Hub