You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,6 +24,14 @@ For updates about versions and features released six months ago or earlier, see
24
24
25
25
## May 2025
26
26
27
+
### Expanded New Sensor Deployment Support for Domain Controllers (Preview)
28
+
Defender for Identity now supports deploying its new sensor on Domain Controllers without requiring Defender for Endpoint onboarding. This simplifies sensor activation and expands deployment flexibility. [Learn more](deploy/activate-capabilities.md).
29
+
30
+
31
+
### Improved Visibility into Defender for Identity New Sensor Eligibility in the Activation page
32
+
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify non-eligible servers and take action to update and onboard them for enhanced identity protection.
33
+
34
+
27
35
### Local administrators collection (using SAM-R queries) feature will be disabled
28
36
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change will occur automatically by the specified date, and no administrative action is required.
> Deep dives into discovered apps are supported only only in firewalls and proxies that contain target URL data. For more information, see [Supported firewalls and proxies](set-up-cloud-discovery.md#supported-firewalls-and-proxies).
69
+
> Deep dives into discovered apps are supported only in firewalls and proxies that contain target URL data. For more information, see [Supported firewalls and proxies](set-up-cloud-discovery.md#supported-firewalls-and-proxies).
70
70
>
71
-
> If Defender for Cloud Apps can't match the subdomain detected in the traffic logs with the data stored in the app catalogue, the subdomain is tagged as **Other**.
71
+
> If Defender for Cloud Apps can't match the subdomain detected in the traffic logs with the data stored in the app catalog, the subdomain is tagged as **Other**.
72
72
73
73
## Discover resources and custom apps
74
74
@@ -102,6 +102,9 @@ The best way to get an overview of Shadow IT use across your organization is by
102
102
1. From the **Cloud discovery** page, select **Actions** > **Generate Cloud Discovery executive report**.
103
103
104
104
1. Optionally, change the report name, and then select **Generate**.
105
+
106
+
> [!NOTE]
107
+
> The executive summary report is revamped to a 6-pager report with a goal to provide a clear, concise & actionable overview while preserving the depth and integrity of the original analysis.
105
108
106
109
## Exclude entities
107
110
@@ -154,7 +157,7 @@ We recommend deleting cloud discovery data in the following cases:
154
157
- If many users or IP addresses recently started working again after being offline for some time, their activity is identified as anomalous and might give you false positive violations.
155
158
156
159
> [!IMPORTANT]
157
-
> Make sure you want to delete data before doing so. This action is irreversbile and deletes **all** cloud discovery data in the system.
160
+
> Make sure you want to delete data before doing so. This action is irreversible and deletes **all** cloud discovery data in the system.
0 commit comments