Skip to content

Commit 0c4b762

Browse files
Merge branch 'main' into patch-18
2 parents b4960f7 + e4b4c0e commit 0c4b762

16 files changed

+211
-221
lines changed

ATPDocs/deploy/event-collection-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The following event is required for Microsoft Entra Connect servers:
5050

5151
- 4624: An account was successfully logged on
5252

53-
For more information, see [Configure auditing on Microsoft Entra Connect](../configure-windows-event-collection.md#configure-auditing-for-entra-connect).
53+
For more information, see [Configure auditing on Microsoft Entra Connect](../configure-windows-event-collection.md#configure-auditing-on-microsoft-entra-connect).
5454

5555
### Other required Windows events
5656

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,12 +34,16 @@ To ensure that Windows clients and servers allow your Defender for Identity Dire
3434
3535
**To configure required permissions**:
3636

37-
1. Locate the policy. In your **Computer configuration > Windows settings > Security settings > Local policies > Security options**, select the **Network access - Restrict clients allowed to make remote calls to SAM** policy. For example:
37+
1. Create a new group policy or use an existing one.
38+
1. In your **Computer configuration > Windows settings > Security settings > Local policies > Security options**, select the **Network access - Restrict clients allowed to make remote calls to SAM** policy. For example:
3839

3940
:::image type="content" source="../media/samr-policy-location.png" alt-text="Screenshot of the Network access policy selected." lightbox="../media/samr-policy-location.png":::
4041

4142
1. Add the DSA to the list of approved accounts able to perform this action, together with any other account that you've discovered during audit mode.
4243

44+
:::image type="content" source="../media/restrict-clients-allowed-to-make-remote-calls-to-sam.png" alt-text="Screenshot of the Network access policy settings." lightbox="../media/restrict-clients-allowed-to-make-remote-calls-to-sam.png":::
45+
46+
4347
For more information, see [Network access: Restrict clients allowed to make remote calls to SAM](/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls).
4448

4549
## Make sure the DSA is allowed to access computers from the network (optional)
@@ -60,6 +64,8 @@ To ensure that Windows clients and servers allow your Defender for Identity Dire
6064
>
6165
> The [Microsoft Security Compliance Toolkit](https://www.microsoft.com/download/details.aspx?id=55319) recommends replacing the default *Everyone* with *Authenticated Users* to prevent anonymous connections from performing network sign-ins. Review your local policy settings before managing the [Access this computer from the network](/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network) setting from a GPO, and consider including *Authenticated Users* in the GPO if needed.
6266
67+
:::image type="content" source="../media/define-security-policy-setting.png" alt-text="Screenshot of Security Policy Settings." lightbox="../media/define-security-policy-setting.png":::
68+
6369
## Configure a Device profile for Microsoft Entra hybrid joined devices only
6470

6571
This procedure describes how to use the [Microsoft Intune admin center](https://intune.microsoft.com/) to configure the policies in a Device profile if you're working with Microsoft Entra hybrid joined devices.
75.3 KB
Loading
68.3 KB
Loading

ATPDocs/whats-new.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,19 @@ For updates about versions and features released six months ago or earlier, see
2424

2525
## February 2025
2626

27+
### DefenderForIdentity PowerShell module updates (version 1.0.0.3)
28+
29+
New Features and Improvements:
30+
- Support for getting, testing, and setting the Active Directory Recycle Bin in Get/Set/Test MDIConfiguration.
31+
- Support for getting, testing, and setting the proxy configuration on new MDI sensor.
32+
- The Active Directory Certificate Services registry value for audit filtering now properly sets the type.
33+
- New-MDIConfigurationReport now shows the name of the tested GPO and supports Server and Identity arguments.
34+
35+
Bug Fixes:
36+
- Improved reliability for DeletedObjects container permissions on non-English operating systems.
37+
- Fixed extraneous output for KDS root key creation.
38+
- Other reliability fixes.
39+
2740
### New attack paths tab on the Identity profile page
2841

2942
This tab provides visibility into potential attack paths leading to a critical identity or involving it within the path, helping assess security risks. For more information, see [Overview of attack path within Exposure Management.](/security-exposure-management/work-attack-paths-overview)

defender-vulnerability-management/defender-vulnerability-management-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ Windows authenticated scan will officially be deprecated on November 30, 2025. A
138138

139139
### What happens to my data after the product is deprecated?
140140

141-
All user data is handled according to our [data storage and privacy policy](tvm-prerequisites.md#data-storage-and-privacy). We recommend that you export any important data before the deprecation date.
141+
All user data is handled according to our [Data storage and privacy](defender-vulnerability-management.md#data-storage-and-privacy). We recommend that you export any important data before the deprecation date.
142142

143143
### Will the product be replaced?
144144

defender-vulnerability-management/defender-vulnerability-management.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- essentials-overview
1414
search.appverid: met150
1515
audience: ITPro
16-
ms.date: 04/03/2024
16+
ms.date: 02/23/2025
1717
---
1818

1919
# What is Microsoft Defender Vulnerability Management
@@ -94,6 +94,10 @@ See the following articles for related Defender for Endpoint APIs:
9494
- [Vulnerability APIs](/defender-endpoint/api/vulnerability)
9595
- [List vulnerabilities by machine and software](/defender-endpoint/api/get-all-vulnerabilities-by-machines)
9696

97+
## Data storage and privacy
98+
99+
The same data security and privacy practices for Microsoft Defender for Endpoint apply to Microsoft Defender Vulnerability Management, for more information, see [Microsoft Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy).
100+
97101
## Next steps
98102

99103
- [Compare security features in Microsoft Defender Vulnerability Management](defender-vulnerability-management-capabilities.md)

defender-vulnerability-management/get-defender-vulnerability-management.md

Lines changed: 19 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -14,36 +14,34 @@ ms.collection:
1414
- m365-security
1515
- tier1
1616
- essentials-get-started
17-
ms.date: 08/14/2023
17+
ms.date: 02/23/2025
1818
---
1919

2020
# Sign up for Microsoft Defender Vulnerability Management
2121

2222
> [!NOTE]
23-
> Microsoft Defender Vulnerability Management isn't currently available to Microsoft Defender for Business customers.
24-
25-
## Starting a trial
26-
27-
> [!NOTE]
23+
> Microsoft Defender Vulnerability Management isn't currently available in [Microsoft Defender for Business](/defender-business/mdb-overview).
2824
> The Microsoft Defender Vulnerability Management trial isn't currently available to US Government customers using GCC High, and DoD.
29-
>
3025
> For more information on purchase options available, see [Microsoft Defender Vulnerability Management](https://www.microsoft.com/security/business/threat-protection/microsoft-defender-vulnerability-management-pricing?msockid=17c438e9b0b8628c22d52cd3b1c763eb).
3126
32-
Microsoft Defender Vulnerability Management is available as a standalone and as an add-on for Microsoft Defender for Endpoint Plan 2 customers.
27+
28+
## Starting a trial
29+
30+
Microsoft Defender Vulnerability Management is available as a standalone subscription or as an add-on for [Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint) customers.
3331

3432
- If you're a new customer or an existing Defender for Endpoint P1 or Microsoft 365 E3 customer sign up to try the [Defender Vulnerability Management Standalone Trial](#try-defender-vulnerability-management-standalone)
3533
- If you already have Defender for Endpoint Plan 2, sign up to try the [Defender Vulnerability Management Add-on Trial](#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers)
3634

37-
> [!NOTE]
38-
> Trials will be available to customers using the New Commerce Experience (NCE) for a 30 day period. After the 30 day period customers will be able to purchase Microsoft Defender Vulnerability Management through NCE.
39-
35+
Trials are available to customers using the New Commerce Experience (NCE) for a 30 day period. After the 30 day period customers are able to purchase Microsoft Defender Vulnerability Management through NCE.
4036

4137
## Required roles for starting the trial
4238

4339
As a Global Administrator, you can start the trial or you can allow to users start the trial on behalf of your organization by enabling this option:
4440

4541
1. In the Microsoft 365 admin center, go to **Settings** > **Org settings** > **Services** > **User owned apps and services**
42+
4643
2. Check **Let users start trials on behalf of your organization**
44+
4745
3. Select **Save**
4846

4947
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-user-starttrial.png" alt-text="Screenshot of Microsoft Defender Vulnerability Management user trial setting.":::
@@ -57,17 +55,19 @@ It can take a few hours for the changes to take effect. Once it does, return to
5755

5856
## Try Defender Vulnerability Management Standalone
5957

60-
If you're a new customer or an existing Defender for Endpoint P1 or Microsoft 365 E3 customer, you will sign up to trial the **Defender Vulnerability Management Standalone trial**.
58+
If you're a new customer or an existing Defender for Endpoint P1 or Microsoft 365 E3 customer, you can sign up for the **Defender Vulnerability Management Standalone trial**.
6159

6260
> [!IMPORTANT]
6361
> You must be logged into the tenant as a global administrator to perform this task.
6462
6563
To sign up:
6664

67-
1. Log in as a global admin to the tenant where the Defender Vulnerability Management Standalone trial service will be added.
68-
2. Visit [Microsoft Defender Vulnerability Management Trial](https://aka.ms/MdvmStandaloneStartTrial).
69-
3. Follow the prompts to sign in. This will differ depending on whether you already have a Microsoft 365 subscription or not.
70-
4. Once you have signed in, select the **Try now** button to confirm your order of the 90 day subscription of the Defender Vulnerability Management Standalone trial.
65+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) for the tenant where the Defender Vulnerability Management Standalone trial service will be added.
66+
67+
2. Go to [Microsoft Defender Vulnerability Management Trial](https://aka.ms/MdvmStandaloneStartTrial), and follow the prompts.
68+
69+
3. Select the **Try now** button to confirm your order of the 90 day subscription of the Defender Vulnerability Management Standalone trial.
70+
7171
5. Select **Continue**. You'll now be directed to the Microsoft Defender portal.
7272

7373
> [!NOTE]
@@ -78,8 +78,11 @@ To sign up:
7878
If you already have Defender for Endpoint Plan 2, sign up to the **Defender Vulnerability Management Add-on trial** to get access to the additional capabilities. To sign up:
7979

8080
1. Visit [Microsoft Defender Vulnerability Management Add-on Trial](https://aka.ms/MdvmAddonStartTrial).
81+
8182
2. Follow the prompts to sign in. This will differ depending on whether you already have a Microsoft 365 subscription or not.
83+
8284
3. Once you have signed in, select the **Try now** button to confirm your order of the 90 day subscription of the Microsoft Defender Vulnerability Add-on trial.
85+
8386
4. Select **Continue**. You'll now be directed to the Microsoft Defender portal.
8487

8588
> [!NOTE]

0 commit comments

Comments
 (0)