Skip to content

Commit 10c3aac

Browse files
authored
Merge pull request #5154 from DeCohen/update-investigate-users-doc
Update investigate users doc
2 parents f58549a + b6dac86 commit 10c3aac

File tree

2 files changed

+19
-9
lines changed

2 files changed

+19
-9
lines changed

defender-xdr/investigate-users.md

Lines changed: 19 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ When you investigate a specific user entity, you see the following tabs on its e
4848
- [Incidents and alerts](#incidents-and-alerts) tab
4949
- [Observed in organization](#observed-in-organization) tab
5050
- [Timeline](#timeline) tab
51-
- [Sentinel events](#sentinel-events) tab
51+
- [Microsoft Sentinel events](#microsoft-sentinel-events) tab
5252

5353
The user page shows the Microsoft Entra organization as well as groups, helping you understand the groups and permissions associated with a user.
5454

@@ -86,12 +86,12 @@ Microsoft Defender for Identity pulls tags out of Active Directory to give you a
8686
|-----|-------------|
8787
| **New** | Indicates that the entity was created less than 30 days ago. |
8888
| **Deleted** | Indicates that the entity was permanently deleted from Active Directory. |
89-
| **Disabled** | Indicates that the entity is currently disabled in Active Directory. The *disabled* attribute is an Active Directory flag that's available for user accounts, computer accounts, and other objects to indicate that the object is not currently in use. <br><br>When an object is disabled, it can't be used to sign in or perform actions in the domain.|
89+
| **Disabled** | Indicates that the entity is currently disabled in Active Directory. The *disabled* attribute is an Active Directory flag that's available for user accounts, computer accounts, and other objects to indicate that the object isn't currently in use. <br><br>When an object is disabled, it can't be used to sign in or perform actions in the domain.|
9090
| **Enabled** | Indicates that the entity is currently enabled in Active Directory, indicating that the entity is currently in use, and can be used to sign in or perform actions in the domain. |
91-
| **Expired** | Indicates that the entity is expired in Active Directory. When a user account is expired, the user is no longer able to log in to the domain or access any network resources. The expired account is essentially treated as if it were disabled, but with an explicit expiration date set. <br><br>Any services or applications that the user was authorized to access may also be affected, depending on how they are configured. |
91+
| **Expired** | Indicates that the entity is expired in Active Directory. When a user account is expired, the user is no longer able to log in to the domain or access any network resources. The expired account is treated as if it were disabled, but with an explicit expiration date set. <br><br>Any services or applications that the user was authorized to access might also be affected, depending on how they're configured. |
9292
| **Honeytoken** | Indicates that the entity is manually tagged as a honeytoken. |
9393
| **Locked** | Indicates that the entity supplied the wrong password too many times, and is now locked. |
94-
| **Partial** | Indicates that the user, device, or group is not in synch with the domain, and is partially resolved via a global catalog. In this case, some attributes aren't available. |
94+
| **Partial** | Indicates that the user, device, or group isn't in synch with the domain, and is partially resolved via a global catalog. In this case, some attributes aren't available. |
9595
| **Unresolved** | Indicates that the device doesn't resolve to a valid identity in the Active Directory forest. No directory information is available. |
9696
| **Sensitive** | Indicates that the entity is considered as sensitive. |
9797

@@ -141,16 +141,16 @@ The lateral movement path report, which can be viewed by date, is always availab
141141

142142
The timeline displays user activities and alerts observed from a user's identity in the last 180 days. It unifies the user's identity entries across Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint workloads. By using the timeline, you can focus on activities a user performed or were performed on them in specific timeframes.
143143

144-
For users of the unified SOC platform to see alerts from Microsoft Sentinel based on data sources other than the ones in the previous paragraph, they can find these alerts and other information in the **Sentinel events** tab, [described below](#sentinel-events).
144+
For users of the unified SOC platform to see alerts from Microsoft Sentinel based on data sources other than the ones in the previous paragraph, they can find these alerts and other information in the **Microsoft Sentinel events** tab, [described below](#microsoft-sentinel-events).
145145

146146
- **Custom time range picker:** You can choose a timeframe to focus your investigation on the last 24 hours, the last 3 days and so on. Or you can choose a specific timeframe by clicking on **Custom range**. Filtered data older than 30 days is displayed in seven-day intervals.
147147
For example:
148148

149149
:::image type="content" source="/defender/media/image.png" alt-text="Screenshot that shows how to choose time frame." lightbox="/defender/media/image.png":::
150150

151-
- **Timeline filters:** In order to improve your investigation experience, you can use the timeline filters: Type (Alerts and/or user's related activities), Alert severity, Activity type, App, Location, Protocol. Each filter depends on the others, and the options in each filter (drop-down) only contains the data that is relevant for the specific user.
151+
- **Timeline filters:** In order to improve your investigation experience, you can use the timeline filters: Type (Alerts and/or user's related activities), Alert severity, Activity type, App, Location, Protocol. Each filter depends on the others, and the options in each filter (drop-down) only contains the data that's relevant for the specific user.
152152

153-
- **Export button:** You can export the timeline to a CSV file. Export is limited to the first 5000 records and contains the data as it displays in the UI (same filters and columns).
153+
- **Export button:** You can export the timeline to a CSV file. Export is limited to the first 5,000 records and contains the data as it displays in the UI (same filters and columns).
154154

155155
- **Customized columns:** You can choose which columns to expose in the timeline by selecting the **Customize columns** button. For example:
156156

@@ -186,11 +186,21 @@ For example:
186186
:::image type="content" source="/defender/media/investigate-users/user-incident-timeline.png" alt-text="Screenshot of the Timeline tab." lightbox="/defender/media/investigate-users/user-incident-timeline.png":::
187187

188188
> [!NOTE]
189-
> Microsoft Defender XDR can display date and time information using either your local time zone or UTC. The selected time zone will apply to all date and time information shown in the Identity timeline.
189+
> Microsoft Defender XDR can display date and time information using either your local time zone or UTC. The selected time zone applies to all date and time information shown in the Identity timeline.
190190
>
191191
> To set the time zone for these features, go to **Settings** \> **Security center** \> **Time zone**.
192192
193-
## Sentinel events
193+
## Security recommendations
194+
195+
This tab displays all active security posture assessments (ISPMs) associated with an identity account. It includes Defender for Identity recommendations across available identity providers such as Active Directory, Okta, and others. Selecting an ISPM pivots you to the recommendation page in Microsoft Secure Score for additional details.
196+
197+
:::image type="content" source="media/screenshot-of-posture-recommendations.png" alt-text="Screenshot that shows the security posture recommendation." lightbox="media/screenshot-of-posture-recommendations.png":::
198+
199+
## Attack paths
200+
201+
This tab provides visibility into potential attack paths leading to a critical identity or involving it within the path, helping assess security risks. For more information, see [Overview of attack path within Exposure Management.](/security-exposure-management/work-attack-paths-overview)
202+
203+
## Microsoft Sentinel events
194204

195205
If your organization onboarded Microsoft Sentinel to the Defender portal, this additional tab is on the user entity page. This tab imports the [Account entity page from Microsoft Sentinel](/azure/sentinel/entity-pages).
196206

246 KB
Loading

0 commit comments

Comments
 (0)