Skip to content

Commit 0897dbb

Browse files
Merge branch 'main' into batamig-patch-3
2 parents 21c28b2 + a2f1a83 commit 0897dbb

File tree

64 files changed

+687
-419
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

64 files changed

+687
-419
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{:changed-files-limit 60
22
:allowed-branchname-matches ["main" "release-.*"]
3-
:allowed-filename-matches ["ATADocs/" "CloudAppSecurityDocs/" "defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/" "unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
3+
:allowed-filename-matches ["ATADocs/" "ATPDocs/" "CloudAppSecurityDocs/" "defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/" "unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
44

55
:use-gh-statuses true
66

ATPDocs/investigate-assets.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,9 @@ Find identity information in the following Microsoft Defender XDR areas:
4545

4646
For example, the following image shows the details on an identity details page:
4747

48-
:::image type="content" source="media/investigate-assets/identity-details.png" alt-text="Screenshot of an identity details page." lightbox="media/investigate-assets/identity-details.png":::
48+
![Screenshot of a specific user's page in the Microsoft Defender portal.](media/investigate-assets/image.png)
49+
50+
4951

5052
### Identity details
5153

@@ -60,6 +62,10 @@ When you investigate a specific identity, you'll see the following details on an
6062
|[Identity timeline](/microsoft-365/security/defender/investigate-users#timeline) | The timeline represents activities and alerts observed from a user's identity from the last 180 days, unifying identity entries across Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. <br><br>Use the timeline to focus on activities a user performed or were performed on them in specific timeframes. Select the default **30 days** to change the time range to another built-in value, or to a custom range. |
6163
|[Remediation actions](/microsoft-365/security/defender/investigate-users#remediation-actions) | Respond to compromised users by disabling their accounts or resetting their password. After taking action on users, you can check on the activity details in the Microsoft Defender XDR **Action center.|
6264

65+
> [!NOTE]
66+
> **Investigation Priority Score** has been deprecated on December 3, 2025. As a result, both the Investigation Priority Score breakdown and the scored activity timeline cards have been removed from the UI.
67+
68+
6369
For more information, see [Investigate users](/microsoft-365/security/defender/investigate-users) in the Microsoft Defender XDR documentation.
6470

6571
## Investigation steps for suspicious groups
150 KB
Loading

ATPDocs/security-assessment-edit-misconfigured-acl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/20/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit misconfigured certificate templates ACL (ESC4) (Preview)
8+
# Security assessment: Edit misconfigured certificate templates ACL (ESC4)
99

1010
This article describes Microsoft Defender for Identity's **Misconfigured certificate template ACL** security posture assessment report.
1111

ATPDocs/security-assessment-edit-misconfigured-ca-acl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/14/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit misconfigured Certificate Authority ACL (ESC7) (Preview)
8+
# Security assessment: Edit misconfigured Certificate Authority ACL (ESC7)
99

1010
This article describes Microsoft Defender for Identity's **Misconfigured certificate authority ACL** security posture assessment report.
1111

ATPDocs/security-assessment-edit-misconfigured-enrollment-agent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/20/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit misconfigured enrollment agent certificate template (ESC3) (Preview)
8+
# Security assessment: Edit misconfigured enrollment agent certificate template (ESC3)
99

1010
This article describes Microsoft Defender for Identity's **Misconfigured enrollment agent certificate template** security posture assessment report.
1111

ATPDocs/security-assessment-edit-misconfigured-owner.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/14/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit misconfigured certificate templates owner (ESC4) (Preview)
8+
# Security assessment: Edit misconfigured certificate templates owner (ESC4)
99

1010
This article provides an overview of Microsoft Defender for Identity's **Misconfigured certificate templates owner (ESC4)** security posture assessment report.
1111

ATPDocs/security-assessment-edit-overly-permissive-template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/20/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit overly permissive certificate template with privileged EKU (Any purpose EKU or No EKU) (ESC2) (Preview)
8+
# Security assessment: Edit overly permissive certificate template with privileged EKU (Any purpose EKU or No EKU) (ESC2)
99

1010
This article describes Microsoft Defender for Identity's **Overly permissive certificate template with privileged EKU** security posture assessment report.
1111

ATPDocs/security-assessment-enforce-encryption-rpc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/20/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Enforce encryption for RPC certificate enrollment interface (ESC11) (Preview)
8+
# Security assessment: Enforce encryption for RPC certificate enrollment interface (ESC11)
99

1010
This article describes Microsoft Defender for Identity's **Enforce encryption for RPC certificate enrollment** security posture assessment report.
1111

ATPDocs/technical-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ sections:
7070
7171
- **[UEBA capabilities](/cloud-app-security/tutorial-ueba)**: Insights into individual user risk through user investigation priority scoring. The score can assist SecOps in their investigations and help analysts understand unusual activities for the user and the organization.
7272
73-
- **Native integrations**: Integrates with Microsoft Defender for Cloud Apps and Azure AD Identity Protection to provide a hybrid view of what's taking place in both on-premises and hybrid environments.
73+
- **Native integrations**: Integrates with Microsoft Defender for Cloud Apps and Microsoft Entra ID Protection to provide a hybrid view of what's taking place in both on-premises and hybrid environments.
7474
7575
- **Contributes to Microsoft Defender XDR**: Contributes alert and threat data to Microsoft Defender XDR. Microsoft Defender XDR uses the Microsoft 365 security portfolio (identities, endpoints, data, and applications) to automatically analyze cross-domain threat data, building a complete picture of each attack in a single dashboard.
7676

0 commit comments

Comments
 (0)