You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+11Lines changed: 11 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,6 +24,17 @@ For updates about versions and features released six months ago or earlier, see
24
24
25
25
## March 2025
26
26
27
+
### Enhanced Identity Inventory (Preview)
28
+
29
+
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment.
30
+
The updated Identities Inventory page now includes the following tabs:
31
+
32
+
- Identities: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.
33
+
34
+
- Cloud application accounts: Displays a list of cloud application accounts, including those from application connectors and third-party sources (original available in the previous version based on Microsoft Defender for Cloud Apps).
35
+
36
+
For more information, see [Identity inventory details](/defender-for-identity/identity-inventory).
37
+
27
38
### New LDAP query events added to the IdentityQueryEvents table in Advanced Hunting
28
39
New LDAP query events were added to the `IdentityQueryEvents` table in Advanced Hunting to provide more visibility into additional LDAP search queries running in the customer environment.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-notes.md
+10Lines changed: 10 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,16 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
21
21
22
22
## March 2025
23
23
24
+
### Enhanced Identity Inventory (Preview)
25
+
26
+
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment. The updated Identities Inventory page now includes the following tabs:
27
+
28
+
- Identities: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.
29
+
30
+
- Cloud application accounts: Provides insights into accounts from connected applications via Defender for Cloud Apps, allowing investigation of account permissions, group memberships, aliases, and the applications in use.
31
+
32
+
For more information, see [Identity inventory details](/defender-for-identity/identity-inventory), [Cloud application accounts](/defender-cloud-apps/accounts).
33
+
24
34
### Role-Based Access Control scoping for "Behaviors" (Preview)
25
35
26
36
Defender for Cloud Apps customers can now configure Role-Based Access Control (RBAC) scoping for 'Behaviors.' This new capability allows administrators to define and manage access permissions more precisely. Administrators can ensure that users have the appropriate level of access to specific application data based on their roles and responsibilities. By using RBAC scoping, organizations can enhance their security posture, streamline operations, and reduce the risk of unauthorized access.
Copy file name to clipboardExpand all lines: defender-endpoint/application-deployment-via-mecm.md
+51-35Lines changed: 51 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,104 +13,120 @@ ms.collection:
13
13
- m365-security
14
14
- tier1
15
15
ms.topic: conceptual
16
-
ms.date: 06/27/2022
16
+
ms.date: 03/14/2025
17
17
---
18
18
19
19
# Migrating servers from Microsoft Monitoring Agent to the unified solution
20
20
21
21
**Applies to:**
22
22
23
-
-Windows Server 2012 R2
24
-
-Windows Server 2016
23
+
-Microsoft Defender for Endpoint for servers
24
+
-Microsoft Defender for Servers Plan 1 or Plan 2
25
25
26
-
This article guides you in migrating down-level servers from Microsoft Monitoring Agent (MMA) to the unified solution.
26
+
This article guides you in migrating servers running Windows Server 2016 or Windows Server 2012 R2 from Microsoft Monitoring Agent (MMA) to the modern, unified solution. In this article, the phrase *down-level servers* refers to older versions of Windows Server, such as Windows Server 2016 and Windows Server 2012 R2.
27
27
28
28
## Prerequisites
29
29
30
-
- Microsoft Endpoint Configuration Manager (MECM) higher than 2207.
30
+
- Microsoft Configuration Manager higher than 2207.
31
31
- Down-level OS devices in your environment onboarded with Microsoft Monitoring Agent. To confirm, verify that `MsSenseS.exe` is running in Task Manager.
32
32
- Presence of the MMA agent. You can verify it by checking if the correct Workspace ID is present in the Control Panel> Microsoft Monitoring Agent.
33
33
- Active Microsoft Defender portal with devices onboarded.
34
-
- A **Device Collection** containing down-level servers such as Windows Server 2012 R2 or Windows Server 2016 using MMA agent is set up in your MECM instance.
34
+
- A **Device Collection** containing down-level servers such as Windows Server 2012 R2 or Windows Server 2016 using MMA agent is set up in your Configuration Manager instance.
35
35
36
-
For more information on installing the listed prerequisites, see [related topics](#related-topics) section.
36
+
For more information on installing the listed prerequisites, see [related articles](#related-articles) section.
37
37
38
38
## Gather required files
39
39
40
-
Copy the unified solution package, onboarding script and migration script to the same content source you deploy other apps with MECM.
40
+
Copy the unified solution package, onboarding script, and migration script to the same content source you deploy other apps with Configuration Manager.
41
+
42
+
1. Download Onboarding Script and the unified solution from [Microsoft Defender portal settings page](https://sip.security.microsoft.com/preferences2/onboarding).
41
43
42
-
1. Download Onboarding Script and the unified solution from [Microsoft Defender XDR settings page](https://sip.security.microsoft.com/preferences2/onboarding).
43
44
:::image type="content" source="media/onboarding-script.png" alt-text="Screenshot of onboarding script and unified solution download" lightbox="media/onboarding-script.png":::
45
+
44
46
> [!Note]
45
47
> You must select the Group Policy from the Deployment method dropdown to obtain the .cmd file.
48
+
46
49
2. Download the migration script from the document: [Server migration scenarios from the previous, MMA-based Microsoft Defender for Endpoint solution](server-migration.md). This script can also be found on GitHub: [GitHub - microsoft/mdefordownlevelserver](https://github.com/microsoft/mdefordownlevelserver).
47
-
3. Save all three files in a shared folder used by MECM as a Software Source.
48
50
49
-
:::image type="content" source="media/ua-migration.png" alt-text="Screenshot of saving the shared folder by MECM.":::
51
+
3. Save all three files in a shared folder used by Configuration Manager as a Software Source.
52
+
53
+
:::image type="content" source="media/ua-migration.png" alt-text="Screenshot of saving the shared folder by Configuration Manager.":::
50
54
51
55
## Create the package as an application
52
56
53
-
1. In the MECM console, follow these steps: **Software Library>Applications>Create Application**.
57
+
1. In the Configuration Manager console, go to **Software Library** > **Applications** > **Create Application**.
58
+
54
59
2. Select **Manually specify the application information**.
55
60
:::image type="content" source="media/manual-application-information.png" alt-text="Screenshot of manually specifying the application information selection." lightbox="media/manual-application-information.png":::
61
+
56
62
3. Select **Next** on the Software Center screen of the wizard.
57
-
4. On the Deployment Types, click **Add**.
63
+
64
+
4. On the Deployment Types, select **Add**.
65
+
58
66
5. Select **Manually to specify the deployment type information** and select **Next**.
67
+
59
68
6. Give a name to your script deployment and select **Next**.
60
69
61
70
:::image type="content" source="media/manual-deployment-information.png" alt-text="Screenshot specifying the script deployment information.":::
62
-
7. On this step, copy the UNC path that your content is located. Example: `\\ServerName\h$\SOFTWARE_SOURCE\path`.
71
+
72
+
7. Copy the UNC path that your content is located. Example: `\\ServerName\h$\SOFTWARE_SOURCE\path`.
63
73
64
74
:::image type="content" source="media/deployment-type-wizard.png" alt-text="Screenshot that shows UNC path copy.":::
65
75
66
-
8.Additionally, set the following as the installation program:
76
+
8.Set the installation program by using the following command:
Check the option: **This registry setting must exit on the target system to indicate presence of this application.**
82
+
Select **Next**, and make sure to add your own Workspace ID in this section.
78
83
79
-
:::image type="content" source="media/detection-wizard.png" alt-text="Screenshot that shows detection type wizard":::
84
+
9. Select **Next**, and then select **add a clause**.
80
85
81
-
> [!TIP]
82
-
> The registry key value was obtained by running the Powershell command shown below on a device that has the unified solution installed. Other creative methods of detection can also be used. The goal is to identify whether the unified solution has already been installed on a specific device. You can leave the Value and Data Type fields as blank.
86
+
10. The detection method is based on this registry key: `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sense`.
83
87
88
+
Select the option: **This registry setting must exit on the target system to indicate presence of this application.**
89
+
90
+
:::image type="content" source="media/detection-wizard.png" alt-text="Screenshot that shows detection type wizard":::
91
+
92
+
> [!TIP]
93
+
> The registry key value was obtained by running the following PowerShell command on a device that has the unified solution installed. Other creative methods of detection can also be used. The goal is to identify whether the unified solution has already been installed on a specific device. You can leave the Value and Data Type fields as blank.
11. In the **User Experience** section, check the recommended settings shown in the screenshot. You can choose what suits your environment and click **Next**. For **Installation program visibility**, it's advisable to install with **Normal** during phase testing then change it to **Minimized** for general deployment.
99
+
11. In the **User Experience** section, check the recommended settings shown in the screenshot. You can choose what suits your environment, and then select **Next**.
89
100
101
+
For **Installation program visibility**, it's advisable to install with **Normal** during phase testing then change it to **Minimized** for general deployment.
102
+
90
103
> [!TIP]
91
104
> The maximum allowed runtime can be lowered from (default) 120 minutes to 60 minutes.
105
+
106
+
:::image type="content" source="media/user-experience-in-deployment-type-wizard.png" alt-text="Screenshot that shows user experience in deployment-type wizard." lightbox="media/user-experience-in-deployment-type-wizard.png":::
92
107
93
-
:::image type="content" source="media/user-experience-in-deployment-type-wizard.png" alt-text="Screenshot that shows user experience in deployment-type wizard.":::
108
+
12. Add any additional requirements, and then select **Next**.
94
109
95
-
12. Add any additional requirements then select **Next**.
96
110
13. Under the Dependencies section, select **Next**.
97
-
14. Select **Next** until completion screen comes up, then **Close**.
98
-
15. Keep select **Next** until the completion of Application Wizard. Verify all have been green checked.
111
+
112
+
14. Select **Next** until completion screen comes up, and then select **Close**.
113
+
114
+
15. Keep selecting **Next** until the completion of Application Wizard. Verify all have been green checked.
115
+
99
116
16. Close the wizard, right-click on the recently created application and deploy it to your down-level-server collection. Locally, the installation can be confirmed at Software Center. For details, check the CM logs at `C:\Windows\CCM\Logs\AppEnforce.log`.
100
117
101
118
:::image type="content" source="media/deploy-application.png" alt-text="Screenshot that shows deployment of created application." lightbox="media/deploy-application.png":::
102
119
103
-
17. Verify the status of the migration at MECM > Monitoring > Deployments.
120
+
17. Verify the status of the migration in Configuration Manager by going to **Monitoring** > **Deployments**.
104
121
105
-
:::image type="content" source="media/deployment-status.png" alt-text="Screenshot that shows deployment status check." lightbox="media/deployment-status.png":::
122
+
18. Troubleshooting .ETL files are created and automatically saved locally in each server at this location `C:\Windows\ccmcache\#\`. These files can be leveraged by support to troubleshoot onboarding issues.
106
123
107
-
18. Troubleshooting .ETL files will be created and automatically saved locally in each server at this location `C:\Windows\ccmcache\#\`. These files can be leveraged by support to troubleshoot onboarding issues.
- [Microsoft Defender for Endpoint - Configuration Manager](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection)
114
129
- [Onboard Windows servers to the Microsoft Defender for Endpoint service](configure-server-endpoints.md)
115
130
- [Microsoft Defender for Endpoint: Defending Windows Server 2012 R2 and 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/ba-p/2783292)
131
+
116
132
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments