Skip to content

Commit 0ba2330

Browse files
authored
Merge branch 'main' into patch-16
2 parents 31a16d2 + 6656b62 commit 0ba2330

35 files changed

+457
-348
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,11 @@
7979
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
8080
"redirect_url": "/defender-xdr/pilot-deploy-defender-endpoint",
8181
"redirect_document_id": false
82-
}
82+
},
83+
{
84+
"source_path": "defender-endpoint/monthly-security-summary-report.md",
85+
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
86+
"redirect_document_id": true
87+
}
8388
]
8489
}

.openpublishing.redirection.defender-xdr.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,11 @@
131131
"redirect_url": "/defender-xdr/entity-page-device",
132132
"redirect_document_id": true
133133
},
134+
{
135+
"source_path": "defender-xdr/unlink-alert-from-incident.md",
136+
"redirect_url": "/defender-xdr/move-alert-to-another-incident",
137+
"redirect_document_id": true
138+
},
134139
{
135140
"source_path": "defender-xdr/unified-secops-platform/defender-xdr-portal.md",
136141
"redirect_url": "/defender-xdr/",

ATPDocs/monitored-activities.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,18 +14,20 @@ In the case of a valid threat, or **true positive**, Defender for Identity enabl
1414
The information monitored by Defender for Identity is presented in the form of activities. Defender for Identity currently supports monitoring of the following activity types:
1515

1616
> [!NOTE]
17-
>
1817
> - This article is relevant for all Defender for Identity sensor types.
1918
> - Defender for Identity monitored activities appear on both the user and machine profile page.
20-
> - Defender for Identity monitored activities are also available in Microsoft Defender XDR's [Advanced Hunting](https://security.microsoft.com/advanced-hunting) page.
19+
> - Defender for Identity monitored activities are also available in [Microsoft Defender XDR's Advanced Hunting](/defender-xdr/advanced-hunting-overview) page.
20+
21+
> [!TIP]
22+
> For detailed information on all supported event types (`ActionType` values) in Advanced Hunting Identity-related tables, use the built-in schema reference available in Microsoft Defender XDR.
2123
2224
## Monitored user activities: User account AD attribute changes
2325

2426
|Monitored activity|Description|
2527
|---------------------|------------------|
2628
|Account Constrained Delegation State Changed|The account state is now enabled or disabled for delegation.|
2729
|Account Constrained Delegation SPNs Changed|Constrained delegation restricts the services to which the specified server can act on behalf of the user.|
28-
|Account Delegation Changed | Changes to the account delegation settings |
30+
|Account Delegation Changed | Changes to the account delegation settings. |
2931
|Account Disabled Changed|Indicates whether an account is disabled or enabled.|
3032
|Account Expired|Date when the account expires.|
3133
|Account Expiry Time Changed|Change to the date when the account expires.|
@@ -35,9 +37,9 @@ The information monitored by Defender for Identity is presented in the form of a
3537
|Account Password Never Expires Changed|User's password changed to never expire.|
3638
|Account Password Not Required Changed|User account was changed to allow logging in with a blank password.|
3739
|Account Smartcard Required Changed|Account changes to require users to log on to a device using a smart card.|
38-
|Account Supported Encryption Types Changed|Kerberos supported encryption types were changed (types: Des, AES 129, AES 256)|
39-
|Account Unlock changed | Changes to the account unlock settings |
40-
|Account UPN Name Changed|User's principle name was changed.|
40+
|Account Supported Encryption Types Changed|Kerberos supported encryption types were changed (types: Des, AES 129, AES 256).|
41+
|Account Unlock changed | Changes to the account unlock settings. |
42+
|Account UPN Name Changed|User's principal name was changed.|
4143
|Group Membership Changed|User was added/removed, to/from a group, by another user or by themselves.|
4244
|User Mail Changed|Users email attribute was changed.|
4345
|User Manager Changed|User's manager attribute was changed.|
@@ -48,8 +50,8 @@ The information monitored by Defender for Identity is presented in the form of a
4850

4951
|Monitored activity|Description|
5052
|---------------------|------------------|
51-
|User Account Created|User account was created|
52-
|Computer Account Created|Computer account was created|
53+
|User Account Created|User account was created.|
54+
|Computer Account Created|Computer account was created.|
5355
|Security Principal Deleted Changed|Account was deleted/restored (both user and computer).|
5456
|Security Principal Display Name Changed|Account display name was changed from X to Y.|
5557
|Security Principal Name Changed|Account name attribute was changed.|
@@ -69,7 +71,7 @@ The information monitored by Defender for Identity is presented in the form of a
6971
|Private Data Retrieval|User attempted/succeeded to query private data using LSARPC protocol.|
7072
|Service Creation|User attempted to remotely create a specific service to a remote machine.|
7173
|SMB Session Enumeration|User attempted to enumerate all users with open SMB sessions on the domain controllers.|
72-
|SMB file copy|User copied files using SMB|
74+
|SMB file copy|User copied files using SMB.|
7375
|SAMR Query|User performed a SAMR query.|
7476
|Task Scheduling|User tried to remotely schedule X task to a remote machine.|
7577
|Wmi Execution|User attempted to remotely execute a WMI method.|
@@ -83,7 +85,7 @@ For more information, see [Supported logon types](/microsoft-365/security/defend
8385
|Monitored activity|Description|
8486
|---------------------|------------------|
8587
|Computer Operating System Changed|Change to the computer OS.|
86-
|SID-History changed | Changes to the computer SID history |
88+
|SID-History changed | Changes to the computer SID history. |
8789

8890
## See Also
8991

ATPDocs/whats-new.md

Lines changed: 33 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,38 @@ For more information, see also:
2222

2323
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2424

25+
## February 2025
26+
27+
### New attack paths tab on the Identity profile page
28+
29+
This tab provides visibility into potential attack paths leading to a critical identity or involving it within the path, helping assess security risks. For more information, see [Overview of attack path within Exposure Management.](/security-exposure-management/work-attack-paths-overview)
30+
31+
Additional identity page enhancements:
32+
33+
- New side panel with more information for each entry on the user timeline.
34+
35+
- Filtering capabilities on the Devices tab under Observed in organization.
36+
37+
### Updating 'Protect and manage local admin passwords with Microsoft LAPS' posture recommendation
38+
39+
This update aligns the security posture assessment within Secure Score with the latest version of [Windows LAPS](/windows-server/identity/laps/laps-overview), ensuring it reflects current security best practices for managing local administrator passwords.
40+
41+
### New and updated events in the Advanced hunting IdentityDirectoryEvents table
42+
43+
We have added and updated the following events in the `IdentityDirectoryEvents` table in Advanced Hunting:
44+
45+
- User Account control flag has been changed
46+
47+
- Security group creation in Active directory
48+
49+
- Failed attempt to change an account password
50+
51+
- Successful account password change
52+
53+
- Account primary group ID has been changed
54+
55+
Additionally, the **built-in schema reference** for Advanced Hunting in Microsoft Defender XDR has been updated to include detailed information on all supported event types (**`ActionType`** values) in identity-related tables, ensuring complete visibility into available events. For more information, see [Advanced hunting schema details](/defender-xdr/advanced-hunting-schema-tables).
56+
2557
## December 2024
2658

2759
### New security posture assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
@@ -443,7 +475,7 @@ This version includes the following improvements:
443475

444476
For more information, see [Download and schedule Defender for Identity reports in Microsoft Defender XDR (Preview)](reports.md).
445477

446-
- **Health issues**: Added the *The 'Remove learning period' toggle was automatically switched off for this tenant* health issue
478+
- **Health issues**: The 'Remove learning period' toggle was automatically switched off for this tenant* health issue.
447479

448480
This version also includes bug fixes for cloud services and the Defender for Identity sensor.
449481

defender-endpoint/TOC.yml

Lines changed: 19 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -605,9 +605,6 @@
605605
- name: Manage device group and tags
606606
href: machine-tags.md
607607

608-
- name: Host firewall reporting in Microsoft Defender for Endpoint
609-
href: host-firewall-reporting.md
610-
611608
- name: Tamper resiliency
612609
href: tamper-resiliency.md
613610

@@ -633,8 +630,6 @@
633630
href: attack-surface-reduction-rules-deployment-operationalize.md
634631
- name: Attack surface reduction rules reference
635632
href: attack-surface-reduction-rules-reference.md
636-
- name: Attack surface reduction rules report
637-
href: attack-surface-reduction-rules-report.md
638633
- name: Troubleshoot attack surface reduction rules
639634
href: troubleshoot-asr-rules.md
640635
- name: Enable ASR rules alternate configuration methods
@@ -665,8 +660,6 @@
665660
href: device-control-deploy-manage-gpo.md
666661
- name: Device control frequently asked questions
667662
href: device-control-faq.md
668-
- name: Device control reports
669-
href: device-control-report.md
670663
- name: Exploit protection
671664
items:
672665
- name: Protect devices from exploits
@@ -703,8 +696,6 @@
703696
items:
704697
- name: Web threat protection overview
705698
href: web-threat-protection.md
706-
- name: Monitor web security
707-
href: web-protection-monitoring.md
708699
- name: Respond to web threats
709700
href: web-protection-response.md
710701
- name: Web content filtering
@@ -910,13 +901,6 @@
910901

911902
- name: Diagnostics for Microsoft Defender Antivirus
912903
items:
913-
- name: Device health reports
914-
href: device-health-reports.md
915-
items:
916-
- name: Microsoft Defender Antivirus health report
917-
href: device-health-microsoft-defender-antivirus-health.md
918-
- name: Sensor health and OS report
919-
href: device-health-sensor-health-os.md
920904
- name: Microsoft Defender Core service overview
921905
href: microsoft-defender-core-service-overview.md
922906
- name: Microsoft Defender Core service configurations and experimentation
@@ -1121,14 +1105,27 @@
11211105
items:
11221106
- name: Reports
11231107
items:
1124-
- name: Monthly security summary
1125-
href: monthly-security-summary-report.md
1126-
- name: Create custom reports using Power BI
1127-
href: api/api-power-bi.md
1128-
- name: Threat protection reports
1108+
- name: Microsoft Defender for Endpoint reports
11291109
href: threat-protection-reports.md
1110+
- name: Device health reports
1111+
href: device-health-reports.md
1112+
items:
1113+
- name: Microsoft Defender Antivirus health report
1114+
href: device-health-microsoft-defender-antivirus-health.md
1115+
- name: Sensor health and OS report
1116+
href: device-health-sensor-health-os.md
1117+
- name: Host firewall reporting
1118+
href: host-firewall-reporting.md
1119+
- name: Web protection and monitoring reports
1120+
href: web-protection-monitoring.md
1121+
- name: Device control reports
1122+
href: device-control-report.md
1123+
- name: Attack surface reduction rules report
1124+
href: attack-surface-reduction-rules-report.md
11301125
- name: Aggregated reports
1131-
href: aggregated-reporting.md
1126+
href: aggregated-reporting.md
1127+
- name: Create custom reports using Power BI
1128+
href: api/api-power-bi.md
11321129
- name: Configure integration with other Microsoft solutions
11331130
items:
11341131
- name: Configure conditional access

0 commit comments

Comments
 (0)