What is Identity Threat Detection and Response (ITDR)
Sophos Identity Threat Detection and Response (ITDR) identifies and responds to threats that bypass traditional identity security controls. Fully integrated with Sophos XDR and Sophos MDR, it continuously monitors for identity misconfigurations and risks, provides dark web intelligence on compromised credentials, and enables efficient, analyst-led response actions.
Does ITDR integrate with XDR and MDR tools?
Sophos ITDR is fully integrated with Sophos Extended Detection and Response (XDR) and Sophos Managed Detection and Response (MDR), the world’s largest Agentic SOC. Identity threat detections are automatically escalated to Sophos security analysts, who investigate and execute response actions on your behalf — locking accounts, forcing password resets, and revoking active sessions.
What is identity threat detection and response (ITDR)?
Identity Threat Detection and Response (ITDR) protects organizations from attacks that target user identities instead of specific hardware or software. Today’s attackers don’t need to break in — they log in using stolen credentials, misused privileges, or compromised sessions. ITDR also covers non-human identities such as service accounts and AI agents, which increasingly operate with user-level privileges and can be exploited as attack vectors. It helps organizations reduce their identity attack surface and respond to threats with speed and precision, with full coverage of MITRE ATT&CK Credential Access techniques.
Why is ITDR critical in modern cybersecurity?
Identity has become the primary attack vector in cloud-first environments. Sophos Incident Response found that 95% of Entra ID environments contain critical misconfigurations, creating opportunities for privilege escalation and account compromise. Traditional controls such as identity access management (IAM), multi-factor authentication (MFA), and periodic audits aren’t enough. ITDR delivers continuous visibility into identity posture and risk, closing gaps before attackers can exploit them.
How is ITDR different from IAM, MFA, or traditional audits?
IAM and MFA control who can access systems, but they don’t detect misuse after someone has already authenticated. Traditional audits only provide point‑in‑time snapshots that quickly become outdated. Sophos ITDR continuously monitors identity posture, detects subtle misconfigurations, exposed credentials, and session abuse, and enables immediate containment through built-in actions or MDR intervention. It closes gaps that static tools leave behind.
How does Sophos ITDR work?
Sophos ITDR uses AI-driven risk scoring to continuously evaluate every identity — human and non-human — and surfaces the highest-risk findings with contextual reasoning that explains why each finding matters, based on that user’s history, role, and behavior. Sophos ITDR is an add-on for Sophos Extended Detection and Response (XDR) for higher fidelity detection and enables rapid containment or Sophos Managed Detection and Response (MDR) providing optional analyst led investigation and remediation, including actions such as disabling accounts, forcing password resets, and revoking active sessions.
It connects to identity sources such as Microsoft Entra ID to continuously monitor the environment. Sophos ITDR also analyzes the behavior of Microsoft AI agents in your environment, extending identity security to your agentic environment. In the background, it performs more than 100 posture checks and identifies issues like exposed credentials, misconfigurations, and risky authentication activity. Sophos ITDR then correlates this identity telemetry with the broader security signals already gathered in Sophos XDR. This improves detection accuracy and helps teams investigate threats faster.
Does Sophos ITDR use AI?
Yes. Sophos ITDR includes AI-driven Identity Risk Scoring, which continuously evaluates every identity and surfaces the highest-risk users and accounts. It also uses an embedded AI model to analyze posture findings in context — explaining why a finding represents a risk based on that user’s history, role, and behavior. Sophos ITDR also monitors the behavior of Microsoft AI agents, extending identity protection to your agentic environment.
What are non-human identities, and why do they matter?
Non-human identities include service accounts, automation scripts, and AI agents that operate with user-level or elevated privileges. They are increasingly targeted by attackers because they often have broad access, are less actively monitored than human user accounts, and may not be subject to the same access policies. Sophos ITDR provides visibility into non-human identities alongside human users, helping you identify misconfigurations and risky access patterns across your full identity estate.
What differentiates Sophos ITDR from other ITDR vendors?
Sophos ITDR combines continuous identity posture management, dark web credential intelligence, and behavioral detections in one AI-Native defense system. It provides detection coverage mapped to 100% of MITRE ATT&CK Credential Access techniques and integrates natively with Sophos XDR and the world’s most trusted MDR service. Most vendors detect. Sophos detects, correlates across your environment, and enables rapid response, with optional 24/7 analyst led containment through Sophos MDR.
What is the ROI of ITDR?
A significant portion of modern cyber incidents originate from identity compromise. Sophos Incident Response and Managed Detection and Response investigations consistently show attackers using stolen credentials, privilege escalation, and identity misuse to gain initial access and move laterally inside environments.
Sophos threat intelligence also reports that the number of stolen credentials offered on dark web marketplaces have increased sharply over the past year. This steady rise highlights how identity has become one of the most reliable and cost‑effective attack paths for adversaries.
Sophos ITDR delivers ROI by:
- Reducing ransomware entry points tied to credential abuse
- Lowering incident response and recovery costs
- Minimizing operational downtime
- Continuously reducing identity misconfigurations before they can be exploited
- Offloading investigation and response to 24/7 Sophos MDR experts when enabled
By detecting and containing identity threats early, organizations can prevent high‑impact breaches that often lead to multimillion‑dollar remediation costs, business disruption, and long‑term reputational damage.
What types of identity-based threats does ITDR protect against?
ITDR protects against the full spectrum of identity attacks, including:
- Compromised credentials and account takeover.
- Privilege escalation and lateral movement.
- MFA fatigue and token theft.
- Password spraying, brute-force, and kerberoasting attacks.
Sophos X-Ops Counter Threat Unit (CTU) observed a 106% increase in stolen credentials sold on the dark web (June 2024 – June 2025), underscoring the growing risk that Sophos ITDR directly addresses.
Elevate your identity defense
Identity-based attacks are among the top access vectors for ransomware, with 90% of organizations experiencing an identity breach in the past year (See: 2024 Trends in Securing Digital Identities).
Sophos ITDR helps you stay ahead of identity-based threats with continuous monitoring and dark web intelligence, all within the Sophos Central platform. It integrates with Sophos MDR and Sophos XDR to strengthen your organization’s defenses by detecting and responding to identity-related risks before they can be exploited.
Advanced identity attack patterns defined
Through the combination of Sophos XDR and Sophos ITDR, Sophos detections provide comprehensive coverage against the attack techniques listed in the MITRE ATT&CK Credential Access category. This includes continuous monitoring of identity systems, detection of suspicious authentication activity, and rapid response to stop unauthorized access or credential abuse. Some of the more common credential access techniques are listed below. For the complete list, visit the MITRE ATT&CK Credential Access page.
Brute Force: An attack that attempts numerous password combinations for a single account, by guessing a valid password through persistence or automation, until the correct one is discovered.
Golden Ticket Attack: Attackers forge a Kerberos Ticket Granting Ticket (TGT) using the compromised KRBTGT account in Active Directory, allowing them to gain unrestricted and persistent access to domain resources without needing valid credentials or repeated authentication.
Kerberoasting: Gain access to privileged service accounts, an attacker requests and extracts encrypted service tickets from Active Directory to crack service account passwords offline and gain elevated access.
Password Spray: A method where attackers try a few common passwords (e.g., “Password123!”) across many accounts to identify weak credentials without triggering lockouts from repeated failures.
Related security topic: What is active directory in cybersecurity?


