You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/monitored-activities.md
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,18 +14,20 @@ In the case of a valid threat, or **true positive**, Defender for Identity enabl
14
14
The information monitored by Defender for Identity is presented in the form of activities. Defender for Identity currently supports monitoring of the following activity types:
15
15
16
16
> [!NOTE]
17
-
>
18
17
> - This article is relevant for all Defender for Identity sensor types.
19
18
> - Defender for Identity monitored activities appear on both the user and machine profile page.
20
-
> - Defender for Identity monitored activities are also available in Microsoft Defender XDR's [Advanced Hunting](https://security.microsoft.com/advanced-hunting) page.
19
+
> - Defender for Identity monitored activities are also available in [Microsoft Defender XDR's Advanced Hunting](/defender-xdr/advanced-hunting-overview) page.
20
+
21
+
> [!TIP]
22
+
> For detailed information on all supported event types (`ActionType` values) in Advanced Hunting Identity-related tables, use the built-in schema reference available in Microsoft Defender XDR.
21
23
22
24
## Monitored user activities: User account AD attribute changes
23
25
24
26
|Monitored activity|Description|
25
27
|---------------------|------------------|
26
28
|Account Constrained Delegation State Changed|The account state is now enabled or disabled for delegation.|
27
29
|Account Constrained Delegation SPNs Changed|Constrained delegation restricts the services to which the specified server can act on behalf of the user.|
28
-
|Account Delegation Changed | Changes to the account delegation settings |
30
+
|Account Delegation Changed | Changes to the account delegation settings.|
29
31
|Account Disabled Changed|Indicates whether an account is disabled or enabled.|
30
32
|Account Expired|Date when the account expires.|
31
33
|Account Expiry Time Changed|Change to the date when the account expires.|
@@ -35,9 +37,9 @@ The information monitored by Defender for Identity is presented in the form of a
35
37
|Account Password Never Expires Changed|User's password changed to never expire.|
36
38
|Account Password Not Required Changed|User account was changed to allow logging in with a blank password.|
37
39
|Account Smartcard Required Changed|Account changes to require users to log on to a device using a smart card.|
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+33-1Lines changed: 33 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,38 @@ For more information, see also:
22
22
23
23
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
24
24
25
+
## February 2025
26
+
27
+
### New attack paths tab on the Identity profile page
28
+
29
+
This tab provides visibility into potential attack paths leading to a critical identity or involving it within the path, helping assess security risks. For more information, see [Overview of attack path within Exposure Management.](/security-exposure-management/work-attack-paths-overview)
30
+
31
+
Additional identity page enhancements:
32
+
33
+
- New side panel with more information for each entry on the user timeline.
34
+
35
+
- Filtering capabilities on the Devices tab under Observed in organization.
36
+
37
+
### Updating 'Protect and manage local admin passwords with Microsoft LAPS' posture recommendation
38
+
39
+
This update aligns the security posture assessment within Secure Score with the latest version of [Windows LAPS](/windows-server/identity/laps/laps-overview), ensuring it reflects current security best practices for managing local administrator passwords.
40
+
41
+
### New and updated events in the Advanced hunting IdentityDirectoryEvents table
42
+
43
+
We have added and updated the following events in the `IdentityDirectoryEvents` table in Advanced Hunting:
44
+
45
+
- User Account control flag has been changed
46
+
47
+
- Security group creation in Active directory
48
+
49
+
- Failed attempt to change an account password
50
+
51
+
- Successful account password change
52
+
53
+
- Account primary group ID has been changed
54
+
55
+
Additionally, the **built-in schema reference** for Advanced Hunting in Microsoft Defender XDR has been updated to include detailed information on all supported event types (**`ActionType`** values) in identity-related tables, ensuring complete visibility into available events. For more information, see [Advanced hunting schema details](/defender-xdr/advanced-hunting-schema-tables).
56
+
25
57
## December 2024
26
58
27
59
### New security posture assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
@@ -443,7 +475,7 @@ This version includes the following improvements:
443
475
444
476
For more information, see [Download and schedule Defender for Identity reports in Microsoft Defender XDR (Preview)](reports.md).
445
477
446
-
-**Health issues**: Added the *The 'Remove learning period' toggle was automatically switched off for this tenant* health issue
478
+
-**Health issues**: The 'Remove learning period' toggle was automatically switched off for this tenant* health issue.
447
479
448
480
This version also includes bug fixes for cloud services and the Defender for Identity sensor.
0 commit comments