Skip to content

Commit 0bdc97d

Browse files
authored
Merge branch 'main' into docs-editor/device-health-microsoft-defend-1740463198
2 parents 53e92d7 + 7e2f366 commit 0bdc97d

File tree

57 files changed

+182
-327
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

57 files changed

+182
-327
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 25 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Microsoft Defender for Endpoint customers, who have already onboarded their doma
1212
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
1313

1414
> [!IMPORTANT]
15-
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](https://learn.microsoft.com/defender-for-identity/deploy/quick-installation-guide)
15+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](quick-installation-guide.md).
1616
1717
## Prerequisites
1818

@@ -43,7 +43,7 @@ Your domain controller must be onboarded to Microsoft Defender for Endpoint.
4343

4444
For more information, see [Onboard a Windows server](/microsoft-365/security/defender-endpoint/onboard-windows-server).
4545

46-
### Required permissions
46+
### Permissions requirements
4747

4848
To access the Defender for Identity **Activation** page, you must either be a [Security Administrator](/entra/identity/role-based-access-control/permissions-reference), or have the following Unified RBAC permissions:
4949

@@ -80,15 +80,31 @@ Set-MDIConfiguration -Mode Domain -Configuration All
8080

8181
## Activate Defender for Identity capabilities
8282

83-
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
83+
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
8484

85-
1. In the [Defender portal](https://security.microsoft.com), select **Settings > Identities > [Activation](https://security.microsoft.com/settings/identities?tabid=onboarding)**.
85+
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
8686

87-
The **Activation** page lists any detected and eligible domain controllers.
87+
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
8888

89-
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
89+
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
9090

91-
When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
91+
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
92+
93+
> [!NOTE]
94+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
95+
96+
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
97+
98+
## Onboarding Confirmation
99+
100+
To confirm the sensor has been onboarded:
101+
102+
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
103+
104+
2. Check that the onboarded domain controller is listed.
105+
106+
> [!NOTE]
107+
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
92108
93109
## Test activated capabilities
94110

@@ -106,9 +122,9 @@ Use the following procedures to test your environment for Defender for Identity
106122

107123
### Check the ITDR dashboard
108124

109-
In the Defender portal, select **Identities > Dashboard** and review the details shown, checking for expected results from your environment.
125+
In the Defender portal, select **Identities** > **Dashboard**, and review the details shown, checking for expected results from your environment.
110126

111-
For more information, see [Work with Defender for Identity's ITDR dashboard (Preview)](../dashboard.md).
127+
For more information, see [Work with Defender for Identity's ITDR dashboard](../dashboard.md).
112128

113129

114130
### Confirm entity page details
@@ -193,10 +209,6 @@ Test remediation actions on a test user. For example:
193209
194210
1. Check Active Directory for the expected activity.
195211
196-
> [!NOTE]
197-
> The current version doesn't collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
198-
199-
200212
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
201213
202214
## Deactivate Defender for Identity capabilities on your domain controller
55 KB
Loading
49.7 KB
Loading
37.7 KB
Loading

CloudAppSecurityDocs/get-started.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,10 +25,10 @@ Microsoft Defender for Cloud Apps is a security tool and therefore doesn't requi
2525

2626
Microsoft Defender for Cloud Apps depends on the following Microsoft Entra ID applications to function properly. Do not disable these applications in Microsoft Entra ID:
2727

28-
- Microsoft Defender for Cloud Apps - APIs
29-
- Microsoft Defender for Cloud Apps - Customer Experience
30-
- Microsoft Defender for Cloud Apps - Information Protection
31-
- Microsoft Defender for Cloud Apps - MIP Server
28+
- Microsoft Defender for Cloud Apps - APIs (ID: 972bb84a-1d27-4bd3-8306-6b8e57679e8c)
29+
- Microsoft Defender for Cloud Apps - Customer Experience (ID: 9ba4f733-be8f-4112-9c4a-e3b417c44e7d)
30+
- Microsoft Defender for Cloud Apps - Information Protection (ID: ac6dbf5e-1087-4434-beb2-0ebf7bd1b883)
31+
- Microsoft Defender for Cloud Apps - MIP Server (ID: 0858ddce-8fca-4479-929b-4504feeed95e)
3232

3333
## Access Defender for Cloud Apps
3434

CloudAppSecurityDocs/protect-zoom.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,6 @@ ms.topic: how-to
1111

1212
Zoom is an online video conferencing and collaboration tool. Zoom holds critical data of your organization, and this makes it a target for malicious actors.
1313

14-
Connecting Zoom to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection using machine learning based anomaly detections.
15-
1614
[!INCLUDE [security-posture-management-connector](includes/security-posture-management-connector.md)]
1715

1816
## SaaS security posture management

defender-endpoint/advanced-features.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 10/17/2024
17+
ms.date: 02/25/2025
1818
---
1919

2020
# Configure advanced features in Defender for Endpoint
@@ -96,7 +96,7 @@ This setting is turned on by default and is applied tenant wide. If you don't wa
9696

9797
Turning on this feature allows you to create indicators for IP addresses, domains, or URLs, which determine whether they'll be allowed or blocked based on your custom indicator list.
9898

99-
To use this feature, devices must be running Windows 10 version 1709 or later, or Windows 11. They should also have network protection in block mode and version 4.18.1906.3 or later of the antimalware platform [see KB 4052623](https://go.microsoft.com/fwlink/?linkid=2099834).
99+
To use this feature, devices must be running Windows 10 version 1709 or later, or Windows 11.
100100

101101
For more information, see [Overview of indicators](indicators-overview.md).
102102

defender-endpoint/aggregated-reporting.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,6 @@ appliesto:
2121

2222
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2323

24-
> [!IMPORTANT]
25-
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
26-
2724
Aggregated reporting addresses constraints on event reporting in Microsoft Defender for Endpoint. Aggregated reporting extends signal reporting intervals to significantly reduce the size of reported events while preserving essential event properties.
2825

2926
Defender for Endpoint reduces noise in collected data to improve the signal-to-noise ratio while balancing product performance and efficiency. It limits data collection to maintain this balance.

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 02/04/2025
18+
ms.date: 02/26/2025
1919
search.appverid: met150
2020
---
2121

@@ -436,7 +436,7 @@ Advanced hunting action type:
436436
- `AsrObfuscatedScriptAudited`
437437
- `AsrObfuscatedScriptBlocked`
438438

439-
Dependencies: Microsoft Defender Antivirus, AntiMalware Scan Interface (AMSI)
439+
Dependencies: Microsoft Defender Antivirus, AntiMalware Scan Interface (AMSI), Cloud Protection
440440

441441
### Block JavaScript or VBScript from launching downloaded executable content
442442

defender-endpoint/edr-in-block-mode.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,10 +44,12 @@ This article describes EDR in block mode, which helps protect devices that are r
4444

4545
> [!IMPORTANT]
4646
> EDR in block mode cannot provide all available protection when Microsoft Defender Antivirus real-time protection is in passive mode. Some capabilities that depend on Microsoft Defender Antivirus to be the active antivirus solution will not work, such as the following examples:
47-
> - Real-time protection, including on-access scanning, and scheduled scan is not available when Microsoft Defender Antivirus is in passive mode. To learn more about real-time protection policy settings, see **[Enable and configure Microsoft Defender Antivirus always-on protection](configure-real-time-protection-microsoft-defender-antivirus.md)**.
47+
> - Real-time protection, including on-access scanning, is not available when Microsoft Defender Antivirus is in passive mode. To learn more about real-time protection policy settings, see **[Enable and configure Microsoft Defender Antivirus always-on protection](configure-real-time-protection-microsoft-defender-antivirus.md)**.
4848
> - Features like **[network protection](network-protection.md)** and **[attack surface reduction rules](attack-surface-reduction.md)** and indicators (file hash, ip address, URL, and certificates) are only available when Microsoft Defender Antivirus is running in active mode.
4949
> It is expected that your non-Microsoft antivirus solution includes these capabilities.
5050
51+
52+
5153
EDR in block mode works behind the scenes to remediate malicious artifacts that were detected by EDR capabilities. Such artifacts might have been missed by the primary, non-Microsoft antivirus product. EDR in block mode allows Microsoft Defender Antivirus to take actions on post-breach, behavioral EDR detections.
5254

5355
EDR in block mode is integrated with [threat & vulnerability management](/defender-vulnerability-management/defender-vulnerability-management) capabilities. Your organization's security team gets a [security recommendation](api/ti-indicator.md) to turn EDR in block mode on if it isn't already enabled.

0 commit comments

Comments
 (0)