Identity threat detection and response: Linking accounts
Intro
This blog post covers a Defender for Identity feature that hasn’t received much attention. Despite flying under the radar, it’s a valuable setting for security teams who want to see all user identities across the organization in one unified view.
Scattered Identities
In corporate settings, user identities tend to be scattered across multiple platforms. One person may hold several different accounts personal, admin-level, outdated, cloud-hosted, or abandoned spread across systems like on-premises Active Directory, Microsoft Entra ID, or third-party identity providers such as Okta.
This scattered landscape makes it hard to get a complete picture of who’s who across the organization. By manually connecting or disconnecting related accounts in Microsoft Defender for Identity, you can:
- Bring together identity data from different systems.
- Strengthen security by building a fuller understanding of each user’s identity.
- Streamline investigations and incident response through a consolidated view of user identities.
For example:
- Personal and privileged accounts: A user might have two accounts, one for everyday work and another with elevated permissions for administrative tasks.
- For example:
thomas@meatsweater.be (regular account)
admin-thomas@meatsweater.be (privileged account)
- For example:
- Multiple domains: Large organizations often manage several domains. Linking accounts across these domains provides full visibility into a user’s activity.
- For example:
thomas@meatsweater.be
thomas@phishsweater.be
- For example:
- Personal and service accounts: A user might have both a personal account and a service account they own or manage. Linking those accounts helps connect ownership and responsibility to the same identity.
- For example:
thomas@meatsweater.be
backup.service@meatsweater.be
- For example:
- Accounts in multiple services: A user might have a Microsoft Entra ID account, an Okta account, and a Ping account. Manually linking these accounts to the user’s identity creates a consolidated view that supports identity-centric protection and investigation.
- Legacy accounts: A user might still have an active account in a legacy system. Linking accounts ensures the legacy account is monitored and tied back to the correct identity. For example:
thomas@meatsweater.be
thomas@meatsweater.local
Use the procedures in this article to manually link accounts to identities, and to manually unlink unused, legacy, or orphaned accounts from identities in Defender for Identity.
Manually link accounts to an identity in Defender for Identity
In the Microsoft Defender portal at https://security.microsoft.com, go to Assets > Identities. Or, to go directly to the Identity Inventory page, use https://security.microsoft.com/identity-inventory.

On the Identities tab of the Identity Inventory page, select an identity from the list by clicking on the Display name value.
On the identity details page that opens, select the Observed in organization tab, and verify the Accounts tab is selected.
On the Accounts tab, select
Link.

The Link accounts wizard opens. On the Select accounts page, use the search box to find an account. You can search by Display name, User principal name (UPN), Security identifier (SID), Source provider account
Select one account by selecting the check box next to the Display name column, and then select Next.

On the Enter justification page, enter a short explanation why you’re linking these accounts. A valid explanation includes:
- Up to 50 characters.Letters, numbers, spaces,
@, or_.
On the Review and finish page, review the information, and select Back to make changes. When you’re finished, select Submit.
After the account is successfully linked, select Done
Unlinking Accounts
If you are not happy with the result or you want to unlink accounts again , you can follow those steps:
On the Identities tab of the Identity Inventory page at https://security.microsoft.com/identity-inventory, select an Identity from the list by clicking on the Display name value.
On the identity details page that opens, select the Observed in organization tab, and verify the Accounts tab is selected.
On the Accounts tab, select the account you want to unlink from the identity by selecting the check box next to the Display name column, and then select
Unlink.

That’s it, you know now how to link all your entities together and you can create a unified view of your identities in a complete context!