Skip to content

Commit 53fa399

Browse files
authored
AADIP in M365D What's New
------- cc: @yelevin
1 parent 744c2b5 commit 53fa399

File tree

1 file changed

+19
-0
lines changed

1 file changed

+19
-0
lines changed

articles/sentinel/whats-new.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,29 @@ If you're looking for items older than six months, you'll find them in the [Arch
2727
2828
## August 2022
2929

30+
- [Heads up: Microsoft 365 Defender now integrates Azure Active Directory Identity Protection (AADIP)](#heads-up-microsoft-365-defender-now-integrates-azure-active-directory-identity-protection-aadip)
3031
- [Azure resource entity page (Preview)](#azure-resource-entity-page-preview)
3132
- [New data sources for User and entity behavior analytics (UEBA) (Preview)](#new-data-sources-for-user-and-entity-behavior-analytics-ueba-preview)
3233
- [Microsoft Sentinel Solution for SAP is now generally available](#microsoft-sentinel-solution-for-sap-is-now-generally-available)
3334

35+
### Heads up: Microsoft 365 Defender now integrates Azure Active Directory Identity Protection (AADIP)
36+
37+
[Microsoft 365 Defender](/microsoft-365/security/defender/) now includes the integration of [Azure Active Directory Identity Protection (AADIP)](../active-directory/identity-protection/index.yml) alerts and incidents.
38+
39+
Microsoft Sentinel customers with the [Microsoft 365 Defender connector](microsoft-365-defender-sentinel-integration.md) enabled will automatically start receiving AADIP alerts and incidents in their Microsoft Sentinel incidents queue. Depending on your configuration, this may affect you as follows:
40+
41+
- If you already have your AADIP connector enabled in Microsoft Sentinel, you may receive duplicate incidents. To avoid this, you have a few choices, listed here in descending order of preference:
42+
43+
- Disable incident creation in your AADIP data connector.
44+
45+
- Disable AADIP integration at the source, in your Microsoft 365 Defender portal.
46+
47+
- Create an automation rule in Microsoft Sentinel to automatically close incidents created by the [Microsoft Security analytics rule](create-incidents-from-alerts.md) that creates AADIP incidents.
48+
49+
- If you don't have your AADIP connector enabled, you may receive AADIP incidents, but without any data in them. To correct this, simply [enable your AADIP connector](data-connectors-reference.md#azure-active-directory-identity-protection). Be sure **not** to enable incident creation on the connector page.
50+
51+
- If you're first enabling your Microsoft 365 Defender connector now, the AADIP connection will be made automatically behind the scenes. You won't need to do anything else.
52+
3453
### Azure resource entity page (Preview)
3554

3655
Azure resources such as Azure Virtual Machines, Azure Storage Accounts, Azure Key Vault, Azure DNS, and more are essential parts of your network. Threat actors might attempt to obtain sensitive data from your storage account, gain access to your key vault and the secrets it contains, or infect your virtual machine with malware. The new [Azure resource entity page](entity-pages.md) is designed to help your SOC investigate incidents that involve Azure resources in your environment, hunt for potential attacks, and assess risk.

0 commit comments

Comments
 (0)