Summary
This chapter has been all about introducing MDI and understanding what it is, how we can deploy it in different ways, and lastly, why it is a feature of utmost importance currently, with cybercrime being an industry on the rise and threat actors actively using the blind spots in our identity infrastructure to gain persistence within our environments.
Following the steps outlined in this chapter helps us to deploy MDI in our environment. MDI, when correctly deployed, will, without a doubt, help us identify identity-based threats in our on-premises AD.
In the next chapter, we will look at how to manage MDI, how to interpret some of the alerts, and how to respond to MDI alerts.