Introduction to Microsoft Advanced Threat Analytics
Microsoft Advanced Threat Analytics (ATA) is an on-premises platform designed to detect advanced cyberattacks and insider threats targeting Active Directory environments. ATA analyzes network traffic from domain controllers, Windows event logs, and SIEM data to build a behavioral baseline for users, devices, and resources, then alerts when anomalous activity is detected. Although Microsoft has shifted its strategic focus toward the cloud-native Microsoft Defender for Identity (MDI), ATA remains deployed in many organizations that cannot yet move to cloud-connected solutions. This article covers ATA deployment on Windows Server 2022, its detection capabilities, health monitoring, and the migration path to Microsoft Defender for Identity.
ATA vs Microsoft Defender for Identity
Understanding the difference between ATA and MDI is important before committing to a deployment. ATA is fully on-premises: the ATA Center and ATA Gateways run on your own servers, data stays in your network, and there is no cloud dependency. MDI is a cloud-connected service where lightweight sensors are installed on domain controllers and data is sent to the Microsoft cloud for analysis. ATA reached end of support on January 12, 2021, meaning no new features are being developed and security patches are limited. MDI receives continuous updates including new detections for evolving attack techniques.
Key architectural differences:
Feature ATA MDI (Defender for Identity)
-----------------------------------------------------------------------------------
Deployment On-premises Cloud (Azure) + lightweight sensor
Database MongoDB (local) Microsoft cloud storage
Network analysis Port mirroring required Sensor reads directly on DC
Event log collection ATA Gateway/LWGW Sensor on DC
Lateral movement Detected Detected + enriched with cloud intel
Pass-the-Hash Detected Detected
Pass-the-Ticket Detected Detected
Golden Ticket Detected Detected
Cloud identity attacks Not supported Detected (Azure AD integration)
Active support End of life Current and actively developed
ATA Center System Requirements
Before installing ATA Center on Windows Server 2022, verify the following minimum requirements are met. Note that ATA was designed for Windows Server 2012 R2 through 2019, and Windows Server 2022 support is not officially documented by Microsoft — however, the installation typically succeeds and functions in practice for organizations maintaining existing deployments.
Component Minimum Recommended
---------------------------------------------------------------------
OS Windows Server 2012 R2 Windows Server 2016/2019
CPU 4 cores 8 cores
RAM 12 GB 96 GB (for large environments)
Storage (data) 100 GB Size based on ~1 KB/event/day
Storage (MongoDB) Fast SSD recommended NVMe SSD
.NET Framework 4.6.1 4.7.2
MongoDB Installed by ATA setup Version 3.6 (bundled)
NIC 1 Gbps 10 Gbps for high traffic
The ATA Center hosts the MongoDB database for storing learned behavior and alerts. For large environments (over 50,000 user objects), MongoDB performance becomes a limiting factor, which is one of the architectural reasons Microsoft moved to a cloud-hosted backend for MDI.
ATA Gateway vs ATA Lightweight Gateway
ATA provides two gateway types. The ATA Gateway is a dedicated server that receives domain controller traffic via port mirroring (SPAN or network TAP). The ATA Lightweight Gateway (LWGW) runs directly on the domain controller itself, eliminating the need for port mirroring but consuming resources on the DC. For Windows Server 2022 domain controllers, the Lightweight Gateway is strongly preferred.
ATA Gateway (dedicated server):
- Requires port mirroring configured on the switch or hypervisor
- Domain controller does not need to be modified
- Suitable when DCs cannot run additional software
- Traffic is copied to the gateway NIC via SPAN port
ATA Lightweight Gateway (on DC):
- Installed directly on the domain controller
- No port mirroring required
- Reads NDIS from the local NIC
- Resource overhead: ~5-10% CPU at peak, ~6 GB RAM reserved
- Supports automatic updates from ATA Center
Configuring Port Mirroring for ATA Gateway
If using the ATA Gateway (not Lightweight), port mirroring must be configured so that all DC traffic is copied to the ATA Gateway NIC. Configuration varies by infrastructure:
For a VMware environment, configure the dvSwitch port mirror policy on the distributed virtual switch:
# On VMware vCenter, configure port mirroring via dvSwitch:
# Networking > Distributed Switch > Settings > Port Mirroring
# Add session: Encapsulated Remote Mirroring Source (L3)
# Source ports: domain controller vNIC port IDs
# Destination: ATA Gateway NIC port ID
# Verify traffic is arriving on the ATA Gateway capture NIC:
# The capture NIC should have no IP address assigned
# On ATA Gateway, run in elevated PowerShell:
Get-NetAdapter | Format-Table Name, Status, LinkSpeed, MacAddress
For physical switches (e.g., Cisco), configure a SPAN session:
! Cisco IOS SPAN configuration
monitor session 1 source interface GigabitEthernet0/1 both
monitor session 1 destination interface GigabitEthernet0/24 encapsulation replicate
Installing ATA Center
Download the ATA Center installer (Microsoft Advanced Threat Analytics 1.9.x) from the Microsoft Download Center. Run the installer as a local administrator:
# Silent installation of ATA Center (example)
Microsoft ATA Center Setup.exe /quiet NetFrameworkCommandLineArguments="/q" /l*v ata_install.log
# The setup installs:
# - MongoDB 3.6 (local database)
# - ATA Center service (Microsoft.Tri.Center.exe)
# - IIS-based management console (HTTPS on port 443 by default)
# - Self-signed certificate (replace with CA cert post-install)
After installation, open the ATA management console at https://ATACenterServer/. During initial setup you will provide:
1. ATA Center URL (used by gateways to connect)
2. Certificate for the console (replace self-signed with CA cert)
3. Connect to Active Directory: provide a domain service account
- Account needs: Read access to all AD objects
- For event collection: local admin on DCs (for LWGW)
- Recommended: create a dedicated ATA service account
Configuring the ATA MongoDB Database
ATA uses a bundled MongoDB 3.6 instance. For environments with more than 10,000 users or high event volume, MongoDB requires tuning. The MongoDB data directory defaults to C:Program FilesMicrosoft Advanced Threat AnalyticsCenterMongoDBbin. Move the data directory to a fast SSD volume if the default drive is slow:
# Stop ATA Center service
Stop-Service -Name ATACenter
# Move MongoDB data to D:ATAData
$mongoConfig = "C:Program FilesMicrosoft Advanced Threat AnalyticsCenterMongoDBbinmongod.cfg"
# Edit the dbPath in mongod.cfg:
# storage:
# dbPath: D:ATADataMongoDB
# Create the new directory
New-Item -ItemType Directory -Path "D:ATADataMongoDB" -Force
# Copy existing data
Copy-Item -Path "C:Program FilesMicrosoft Advanced Threat AnalyticsCenterMongoDBdata*" -Destination "D:ATADataMongoDB" -Recurse
# Start ATA Center
Start-Service -Name ATACenter
To check MongoDB status and database size:
# Connect to MongoDB shell (from ATA Center server)
cd "C:Program FilesMicrosoft Advanced Threat AnalyticsCenterMongoDBbin"
.mongo.exe --port 27017
# In MongoDB shell:
use ATA
db.stats()
db.collection.stats()
ATA Detection Capabilities
ATA detects a wide range of attack techniques targeting Active Directory. Here is how each major detection works technically:
Pass-the-Hash (PtH): ATA detects NTLM authentication from a source where the hash was not obtained through an interactive logon on that device. It builds a map of legitimate NTLM usage patterns and alerts when an NTLM auth originates from an unusual source, particularly for privileged accounts.
Pass-the-Ticket (PtT): ATA analyzes Kerberos ticket traffic. When a Kerberos TGT or service ticket is used from a machine that did not originally receive it via a normal AS-REQ exchange, ATA flags this as a Pass-the-Ticket attempt. The detection relies on tracking ticket usage across the environment.
Golden Ticket: A Golden Ticket is a forged TGT signed with the krbtgt account hash. ATA detects these by identifying TGTs with abnormally long lifetimes (a Golden Ticket can be set to expire far in the future), TGTs with nonstandard encryption types, or TGTs used for services the account has never accessed before.
Reconnaissance: ATA detects DNS reconnaissance (bulk DNS queries), LDAP reconnaissance (unusual or bulk LDAP queries against AD), and network mapping (SMB session enumeration). The detection threshold is based on learned baselines for each entity.
ATA Detection Triggers (summary):
- Pass-the-Hash: Abnormal NTLM source detection
- Pass-the-Ticket: Kerberos ticket misuse
- Golden Ticket: Anomalous TGT attributes
- Overpass-the-Hash: NTLM > Kerberos upgrade from unusual source
- Skeleton Key: LSASS process injection detected via event logs
- Remote code execution: Suspicious remote WMI/PSExec/Scheduled Task
- Brute force: Multiple failed auth attempts
- Sensitive account exposure in clear-text auth (LDAP bind)
ATA Health Alerts and Monitoring
ATA generates health alerts when components are not functioning correctly. These appear in the ATA console under the Health Center. Common health alerts and their remediation steps:
Alert: Gateway disconnected
Cause: ATA Gateway or LWGW cannot reach ATA Center
Fix: Check firewall rules for TCP 443 outbound from Gateway to Center
Verify ATA Center certificate is trusted by the Gateway
Alert: Some network traffic is not being analyzed
Cause: Port mirroring misconfigured (Gateway) or NIC saturation
Fix: Verify SPAN/mirror configuration; check gateway NIC utilization
Alert: Domain controller is not being monitored
Cause: LWGW not installed or stopped on that DC
Fix: Install or restart the LWGW service on the DC
Alert: MongoDB low disk space
Cause: Database volume running low
Fix: Reduce retention period in ATA settings or add storage
Alert: Windows events not being collected
Cause: WEF subscription failed or WMI connectivity issue
Fix: Verify service account permissions; check WEF if configured
Check the ATA service logs on the Center server at:
C:Program FilesMicrosoft Advanced Threat AnalyticsCenterLogs
Migrating from ATA to Microsoft Defender for Identity
Microsoft provides a migration guide from ATA to MDI. The core steps are:
Step 1: License MDI
- Requires Microsoft 365 E5, EMS E5, or MDI standalone license
- Assign licenses in Microsoft 365 admin center
Step 2: Create MDI instance
- Navigate to https://security.microsoft.com
- Go to Settings > Identities > Sensors
- Create the MDI workspace (tied to your Azure AD tenant)
Step 3: Install MDI sensor on domain controllers
- Download sensor from MDI portal
- Sensor requires: .NET 4.7.2, 6 GB RAM reserved, outbound HTTPS to *.atp.azure.com
- Install on each DC:
Azure ATP Sensor Setup.exe /quiet NetFrameworkCommandLineArguments="/q" AccessKey="YOUR_ACCESS_KEY"
Step 4: Configure Directory Service account
- Create a gMSA or standard account for MDI to use
- Grant "Read all" on the domain
Step 5: Validate sensor communication
- In MDI portal, verify all sensors show "Running"
- Check for any health issues
Step 6: Decommission ATA
- Once MDI is fully operational and you are satisfied with coverage,
uninstall ATA Gateways from DCs and the ATA Center from its server
MDI prerequisites include outbound HTTPS connectivity on port 443 from each domain controller to the MDI cloud endpoint. If your DCs cannot reach the internet directly, configure a proxy server in the MDI sensor settings. This is the primary blocker for organizations that maintain air-gapped or heavily firewalled DC environments.
ATA Reports and Forensic Investigation
ATA generates several built-in reports accessible from the Reports menu in the ATA console. These reports include summaries of sensitive groups modifications, plain-text password exposure events, lateral movement paths, and a full timeline of suspicious activities. For active incident investigation, the ATA Attack Timeline provides a chronological view of all detections, each with entity profiles showing the involved users, computers, and resources. Export investigation data from the ATA console for integration with a SIEM or ticketing system using the ATA SIEM integration (syslog or CEF format) configured under Configuration > Notifications and Reports.