Skip to content

Commit 04a71ba

Browse files
authored
Merge pull request #2650 from MicrosoftDocs/main
Published main to live, Tuesday 10:30 AM PST, 02/04
2 parents 6f52693 + 6656b62 commit 04a71ba

19 files changed

+156
-71
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,11 @@
131131
"redirect_url": "/defender-xdr/entity-page-device",
132132
"redirect_document_id": true
133133
},
134+
{
135+
"source_path": "defender-xdr/unlink-alert-from-incident.md",
136+
"redirect_url": "/defender-xdr/move-alert-to-another-incident",
137+
"redirect_document_id": true
138+
},
134139
{
135140
"source_path": "defender-xdr/unified-secops-platform/defender-xdr-portal.md",
136141
"redirect_url": "/defender-xdr/",

ATPDocs/monitored-activities.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,18 +14,20 @@ In the case of a valid threat, or **true positive**, Defender for Identity enabl
1414
The information monitored by Defender for Identity is presented in the form of activities. Defender for Identity currently supports monitoring of the following activity types:
1515

1616
> [!NOTE]
17-
>
1817
> - This article is relevant for all Defender for Identity sensor types.
1918
> - Defender for Identity monitored activities appear on both the user and machine profile page.
20-
> - Defender for Identity monitored activities are also available in Microsoft Defender XDR's [Advanced Hunting](https://security.microsoft.com/advanced-hunting) page.
19+
> - Defender for Identity monitored activities are also available in [Microsoft Defender XDR's Advanced Hunting](/defender-xdr/advanced-hunting-overview) page.
20+
21+
> [!TIP]
22+
> For detailed information on all supported event types (`ActionType` values) in Advanced Hunting Identity-related tables, use the built-in schema reference available in Microsoft Defender XDR.
2123
2224
## Monitored user activities: User account AD attribute changes
2325

2426
|Monitored activity|Description|
2527
|---------------------|------------------|
2628
|Account Constrained Delegation State Changed|The account state is now enabled or disabled for delegation.|
2729
|Account Constrained Delegation SPNs Changed|Constrained delegation restricts the services to which the specified server can act on behalf of the user.|
28-
|Account Delegation Changed | Changes to the account delegation settings |
30+
|Account Delegation Changed | Changes to the account delegation settings. |
2931
|Account Disabled Changed|Indicates whether an account is disabled or enabled.|
3032
|Account Expired|Date when the account expires.|
3133
|Account Expiry Time Changed|Change to the date when the account expires.|
@@ -35,9 +37,9 @@ The information monitored by Defender for Identity is presented in the form of a
3537
|Account Password Never Expires Changed|User's password changed to never expire.|
3638
|Account Password Not Required Changed|User account was changed to allow logging in with a blank password.|
3739
|Account Smartcard Required Changed|Account changes to require users to log on to a device using a smart card.|
38-
|Account Supported Encryption Types Changed|Kerberos supported encryption types were changed (types: Des, AES 129, AES 256)|
39-
|Account Unlock changed | Changes to the account unlock settings |
40-
|Account UPN Name Changed|User's principle name was changed.|
40+
|Account Supported Encryption Types Changed|Kerberos supported encryption types were changed (types: Des, AES 129, AES 256).|
41+
|Account Unlock changed | Changes to the account unlock settings. |
42+
|Account UPN Name Changed|User's principal name was changed.|
4143
|Group Membership Changed|User was added/removed, to/from a group, by another user or by themselves.|
4244
|User Mail Changed|Users email attribute was changed.|
4345
|User Manager Changed|User's manager attribute was changed.|
@@ -48,8 +50,8 @@ The information monitored by Defender for Identity is presented in the form of a
4850

4951
|Monitored activity|Description|
5052
|---------------------|------------------|
51-
|User Account Created|User account was created|
52-
|Computer Account Created|Computer account was created|
53+
|User Account Created|User account was created.|
54+
|Computer Account Created|Computer account was created.|
5355
|Security Principal Deleted Changed|Account was deleted/restored (both user and computer).|
5456
|Security Principal Display Name Changed|Account display name was changed from X to Y.|
5557
|Security Principal Name Changed|Account name attribute was changed.|
@@ -69,7 +71,7 @@ The information monitored by Defender for Identity is presented in the form of a
6971
|Private Data Retrieval|User attempted/succeeded to query private data using LSARPC protocol.|
7072
|Service Creation|User attempted to remotely create a specific service to a remote machine.|
7173
|SMB Session Enumeration|User attempted to enumerate all users with open SMB sessions on the domain controllers.|
72-
|SMB file copy|User copied files using SMB|
74+
|SMB file copy|User copied files using SMB.|
7375
|SAMR Query|User performed a SAMR query.|
7476
|Task Scheduling|User tried to remotely schedule X task to a remote machine.|
7577
|Wmi Execution|User attempted to remotely execute a WMI method.|
@@ -83,7 +85,7 @@ For more information, see [Supported logon types](/microsoft-365/security/defend
8385
|Monitored activity|Description|
8486
|---------------------|------------------|
8587
|Computer Operating System Changed|Change to the computer OS.|
86-
|SID-History changed | Changes to the computer SID history |
88+
|SID-History changed | Changes to the computer SID history. |
8789

8890
## See Also
8991

ATPDocs/whats-new.md

Lines changed: 33 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,38 @@ For more information, see also:
2222

2323
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2424

25+
## February 2025
26+
27+
### New attack paths tab on the Identity profile page
28+
29+
This tab provides visibility into potential attack paths leading to a critical identity or involving it within the path, helping assess security risks. For more information, see [Overview of attack path within Exposure Management.](/security-exposure-management/work-attack-paths-overview)
30+
31+
Additional identity page enhancements:
32+
33+
- New side panel with more information for each entry on the user timeline.
34+
35+
- Filtering capabilities on the Devices tab under Observed in organization.
36+
37+
### Updating 'Protect and manage local admin passwords with Microsoft LAPS' posture recommendation
38+
39+
This update aligns the security posture assessment within Secure Score with the latest version of [Windows LAPS](/windows-server/identity/laps/laps-overview), ensuring it reflects current security best practices for managing local administrator passwords.
40+
41+
### New and updated events in the Advanced hunting IdentityDirectoryEvents table
42+
43+
We have added and updated the following events in the `IdentityDirectoryEvents` table in Advanced Hunting:
44+
45+
- User Account control flag has been changed
46+
47+
- Security group creation in Active directory
48+
49+
- Failed attempt to change an account password
50+
51+
- Successful account password change
52+
53+
- Account primary group ID has been changed
54+
55+
Additionally, the **built-in schema reference** for Advanced Hunting in Microsoft Defender XDR has been updated to include detailed information on all supported event types (**`ActionType`** values) in identity-related tables, ensuring complete visibility into available events. For more information, see [Advanced hunting schema details](/defender-xdr/advanced-hunting-schema-tables).
56+
2557
## December 2024
2658

2759
### New security posture assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
@@ -443,7 +475,7 @@ This version includes the following improvements:
443475

444476
For more information, see [Download and schedule Defender for Identity reports in Microsoft Defender XDR (Preview)](reports.md).
445477

446-
- **Health issues**: Added the *The 'Remove learning period' toggle was automatically switched off for this tenant* health issue
478+
- **Health issues**: The 'Remove learning period' toggle was automatically switched off for this tenant* health issue.
447479

448480
This version also includes bug fixes for cloud services and the Defender for Identity sensor.
449481

defender-endpoint/android-configure.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Defender for Endpoint on Android allows IT Administrators the ability to configu
4949
[Web protection](web-protection-overview.md) helps to secure devices against web threats and protect users from phishing attacks. Anti-phishing and custom indicators (URL and IP addresses) are supported as part of web protection. Web content filtering is currently not supported on mobile platforms.
5050

5151
> [!NOTE]
52-
> Defender for Endpoint on Android would use a VPN in order to provide the Web Protection feature. This VPN is not a regular VPN. Instead, it's a local/self-looping VPN that does not take traffic outside the device.
52+
> Defender for Endpoint on Android would use a VPN in order to provide the Web Protection feature. This VPN isn't a regular VPN. Instead, it's a local/self-looping VPN that doesn't take traffic outside the device.
5353
>
5454
> For more information, see [Configure web protection on devices that run Android](/mem/intune/protect/advanced-threat-protection-manage-android).
5555
@@ -92,7 +92,7 @@ In the Microsoft Intune admin center, navigate to Apps > App configuration polic
9292
|Manage Network Protection detection for Open Networks|2- Enable (default), 1- Audit mode, 0 - Disable. Security admins manage this setting to enable, audit, or disable open network detection, respectively. In 'Audit' mode, alerts are sent only to the ATP portal with no end user experience. For end user experience, the config should be set to 'Enable' mode.|
9393
|Manage Network protection Detection for Certificates|2- Enable, 1- Audit mode, 0 - Disable (default). In Audit mode, notification alerts are sent to SOC admins, but no end-user notifications are displayed to the user when Defender detects a bad certificate. Admins can, however, enable full feature functionality by setting 2 as the value. When the feature is enabled with the value of 2, end-user notifications are sent to the user when Defender detects a bad certificate, and alerts are also sent to the SOC Admin. |
9494

95-
5. Add the required groups to which the policy will have to be applied. Review and create the policy.
95+
5. Add the required groups to which the policy has to be applied. Review and create the policy.
9696

9797
| Configuration Key| Description|
9898
|---|---|
@@ -106,9 +106,9 @@ In the Microsoft Intune admin center, navigate to Apps > App configuration polic
106106
6. Add the required groups to which the policy has to be applied. Review and create the policy.
107107

108108
> [!NOTE]
109-
>
110109
> - The other config keys of Network Protection will only work if the parent key '**Enable Network Protection in Microsoft Defender'** is enabled.
111-
> - Users need to enable location permission (which is an optional permission) and need to grant "Allow All the Time" permission to ensure protection against Wi-Fi threat, even when the app is not actively in use. If the location permission is denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates.
110+
> - To ensure comprehensive protection against Wi-Fi threats, users should enable location permission and select the "Allow All the Time" option. This permission is optional but highly recommended, even when the app is not actively in use. If location permission is denied, Defender for Endpoint will only offer limited protection against network threats and will only safeguard users from rogue certificates.
111+
**An open wi-fi network alert** is generated whenever a user connects to an open Wi-Fi network. If the user reconnects to the same network within a seven-day period, no new alert will be generated. However, connecting to a different open Wi-Fi network will result in an immediate alert.
112112

113113
## Privacy Controls
114114

@@ -156,7 +156,7 @@ These controls help the end user to configure the information shared to their or
156156

157157
These toggles will only be visible if enabled by the admin. Users can decide if they want to send the information to their organization or not.
158158

159-
Enabling/disabling the above privacy controls won't impact the device compliance check or conditional access.
159+
Enabling/disabling the above privacy controls won't affect the device compliance check or conditional access.
160160

161161
## Configure vulnerability assessment of apps for BYOD devices
162162

@@ -207,7 +207,7 @@ Defender for Endpoint supports vulnerability assessment of apps in the work prof
207207

208208
5. Select **Next** and assign this profile to targeted devices/users.
209209

210-
Turning the above privacy controls on or off won't impact the device compliance check or conditional access.
210+
Turning the above privacy controls on or off won't affect the device compliance check or conditional access.
211211

212212
## Configure privacy for phishing alert report
213213

@@ -233,7 +233,7 @@ Use the following steps to turn it on for targeted users:
233233

234234
4. Select **Next** and assign this profile to targeted devices/users.
235235

236-
Using this privacy control won't impact the device compliance check or conditional access.
236+
Using this privacy control won't affect the device compliance check or conditional access.
237237

238238
### Configure privacy for phishing alert report on Android Enterprise work profile
239239

@@ -248,7 +248,7 @@ Use the following steps to turn on privacy for targeted users in the work profil
248248

249249
5. Select **Next** and assign this profile to targeted devices/users.
250250

251-
Turning the above privacy controls on or off won't impact the device compliance check or conditional access.
251+
Turning the above privacy controls on or off won't affect the device compliance check or conditional access.
252252

253253
## Configure privacy for malware threat report
254254

@@ -274,7 +274,7 @@ Use the following steps to turn it on for targeted users:
274274

275275
4. Select **Next** and assign this profile to targeted devices/users.
276276

277-
Using this privacy control won't impact the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
277+
Using this privacy control won't affect the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
278278

279279
### Configure privacy for malware alert report on Android Enterprise work profile
280280

@@ -289,20 +289,20 @@ Use the following steps to turn on privacy for targeted users in the work profil
289289

290290
5. Select **Next** and assign this profile to targeted devices/users.
291291

292-
Using this privacy control won't impact the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
292+
Using this privacy control won't affect the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
293293

294-
## Disable sign-out
294+
## Disable sign out
295295

296-
Defender for Endpoint supports deployment without the sign-out button in the app to prevent users from signing out of the Defender app. This is important to prevent users from tampering with the device.
297-
Use the following steps to configure Disable sign-out:
296+
Defender for Endpoint supports deployment without the sign out button in the app to prevent users from signing out of the Defender app. This is important to prevent users from tampering with the device.
297+
Use the following steps to configure Disable out sign:
298298

299299
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**.
300300
2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type.
301301
3. Select **Microsoft Defender for Endpoint** as the target app.
302302
4. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
303303

304304
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles and 0 for device administrator mode.
305-
- Admins need to make Disable Sign Out = 0 to enable the sign-out button in the app. Users will be able to see the sign-out button once the policy is pushed.
305+
- Admins need to make Disable Sign Out = 0 to enable the sign out button in the app. Users are able to see the sign out button once the policy is pushed.
306306

307307
5. Select **Next** and assign this profile to targeted devices and users.
308308

@@ -321,11 +321,11 @@ Use the following steps to configure the Device tags:
321321
- Admin can edit an existing tag by modifying the value of the key **DefenderDeviceTag**.
322322
- Admin can delete an existing tag by removing the key **DefenderDeviceTag**.
323323

324-
5. Click Next and assign this policy to targeted devices and users.
324+
5. Select Next and assign this policy to targeted devices and users.
325325

326326

327327
> [!NOTE]
328-
> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It may take up to 18 hours for tags to reflect in the portal.
328+
> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It might take up to 18 hours for tags to reflect in the portal.
329329
330330
## Related articles
331331

0 commit comments

Comments
 (0)