Skip to content

Commit 14d5c92

Browse files
authored
Merge branch 'main' into WI408602-reshuffle-connector-articles-in-mda-toc
2 parents 7b42bb2 + 6a80a0d commit 14d5c92

File tree

232 files changed

+2835
-2504
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

232 files changed

+2835
-2504
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
name: (Scheduled) Stale branch removal
2+
3+
permissions:
4+
contents: write
5+
6+
on:
7+
schedule:
8+
- cron: "0 */12 * * *"
9+
10+
workflow_dispatch:
11+
12+
13+
jobs:
14+
15+
stale-branch:
16+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-StaleBranch.yml@workflows-prod
17+
with:
18+
PayloadJson: ${{ toJSON(github) }}
19+
RepoBranchSkipList: '[
20+
"ExampleBranch1",
21+
"ExampleBranch2"
22+
]'
23+
ReportOnly: true
24+
secrets:
25+
AccessToken: ${{ secrets.GITHUB_TOKEN }}

.openpublishing.redirection.defender-endpoint.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,21 @@
9494
"source_path": "defender-endpoint/monthly-security-summary-report.md",
9595
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
9696
"redirect_document_id": true
97+
},
98+
{
99+
"source_path": "defender-endpoint/run-analyzer-macos-linux.md",
100+
"redirect_url": "/defender-endpoint/overview-client-analyzer",
101+
"redirect_document_id": true
102+
},
103+
{
104+
"source_path": "defender-endpoint/download-client-analyzer.md",
105+
"redirect_url": "/defender-endpoint/overview-client-analyzer",
106+
"redirect_document_id": false
107+
},
108+
{
109+
"source_path": "defender-endpoint/comprehensive-guidance-on-linux-deployment.md",
110+
"redirect_url": "/defender-endpoint/linux-installer-script",
111+
"redirect_document_id": true
97112
}
98113
]
99114
}

.openpublishing.redirection.defender-xdr.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -309,6 +309,11 @@
309309
"source_path": "defender-xdr/microsoft-365-defender-integration-with-azure-sentinel.md",
310310
"redirect_url": "/azure/sentinel/microsoft-365-defender-sentinel-integration",
311311
"redirect_document_id": false
312-
}
312+
},
313+
{
314+
"source_path": "defender-xdr/microsoft-365-security-center-defender-cloud.md",
315+
"redirect_url": "/azure/defender-for-cloud/concept-integration-365",
316+
"redirect_document_id": false
317+
}
313318
]
314319
}

ATPDocs/identity-inventory.md

Lines changed: 133 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,133 @@
1+
---
2+
# Required metadata
3+
# For more information, see https://review.learn.microsoft.com/en-us/help/platform/learn-editor-add-metadata?branch=main
4+
# For valid values of ms.service, ms.prod, and ms.topic, see https://review.learn.microsoft.com/en-us/help/platform/metadata-taxonomies?branch=main
5+
6+
title: Identity inventory
7+
description: The Identity Inventory provides a centralized location for customers to view and manage identity information across their environment, ensuring optimal visibility and a comprehensive experience. The updated Identities Inventory page, located under Assets in Defender XDR portal
8+
author: LiorShapiraa # GitHub alias
9+
ms.author: liorshapira
10+
ms.service: microsoft-defender-for-identity
11+
ms.topic: article
12+
ms.date: 03/13/2025
13+
---
14+
15+
# Identity inventory
16+
17+
__Applies to:__
18+
19+
- [Microsoft Defender for Identity](https://aka.ms/aatp/docs)
20+
21+
- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/)
22+
23+
- [Microsoft Defender XDR](/defender-xdr)
24+
25+
The __Identity inventory__ provides a centralized view of all identities in your organization, enabling you to monitor and manage them efficiently. At a glance, you can see key details such as Domain, Tags, Type, and other attributes, helping you quickly identify and manage identities that require attention.
26+
27+
The Identities inventory page includes the following tabs:
28+
29+
- **Identities**: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.
30+
31+
- **Cloud application accounts:** Displays a list of cloud application accounts, including those from application connectors and third-party sources (original available in the previous version based on Microsoft Defender for Cloud Apps). Learn more about [Cloud application accounts from connected apps.](/defender-cloud-apps/accounts)
32+
33+
There are several options you can choose from to customize the identities list view. On the top navigation you can:
34+
35+
- Add or remove columns.
36+
37+
- Apply filters.
38+
39+
- Search for an identity by name or full UPN, Sid and Object ID.
40+
41+
- Export the list to a CSV file.
42+
43+
- Copy list link with the included filters configured.
44+
45+
## ![A screenshot of identity inventory page.](media/identity-inventory/inventory11.png)
46+
47+
### Identity details
48+
49+
The **Identities** list offers a consolidated view of identities across Active Directory and Entra ID. It highlights key details, including the following columns by default:
50+
51+
- __Display name__ – The full name of the identity as shown in the directory.
52+
53+
- __SID__ – The Security Identifier, a unique value used to identify the identity in Active Directory.
54+
55+
- __Domain__ – The Active Directory domain to which the identity belongs.
56+
57+
- __Object ID__ – A unique identifier for the identity in Entra ID.
58+
59+
- __Source__ – Indicates whether the identity is on-premises (originate from Active Directory), Cloud only (Entra ID) or Hybrid (synced from AD to Entra ID).
60+
61+
- __Type__ – Specifies if the identity is a user account or service account.
62+
63+
- __UPN (User Principal Name)__ – The unique login name of the identity in an email-like format.
64+
65+
- __Tags__ – Custom labels that help categorize or classify identities: Sensitive and Honeytoken.
66+
67+
- __Created time__ – The timestamp when the identity was first created.
68+
69+
- __Criticality level__ – Indicates the critical level of the identity.
70+
71+
- __Account status__ – Shows whether the identity is enabled or disabled.
72+
73+
- __Last updated__ – The timestamp of the most recent update to the identity's attributes in Active Directory.
74+
75+
Non-default columns: Email and Entra ID risk level.  
76+
77+
> [!TIP]
78+
> To see all columns, you likely need to do one or more of the following steps:
79+
> - Horizontally scroll in your web browser.
80+
> - Narrow the width of appropriate columns.
81+
> - Zoom out in your web browser.
82+
83+
### Sort and filter the Identities list
84+
85+
You can apply the following filters to limit the list of identities and get a more focused view:
86+
87+
- Domain
88+
89+
- Type
90+
91+
- Source
92+
93+
- Tags
94+
95+
- Criticality level
96+
97+
- Account status
98+
99+
Sort option applies to Display name, Domain and Created time columns.
100+
101+
### Identity inventory insights
102+
103+
- The __Classify critical assets__ card allows you to define identity groups as business critical. For more information, see [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management).
104+
105+
- **Highly privileged identities** card helps you investigate in Advanced hunting all sensitive accounts in your organization, including Entra ID security administrators and Global admin users.
106+
107+
- **Critical Active Directory service accounts** card helps you quickly identify all Active Directory accounts designated as critical, making it easier to focus on identities most at risk.
108+
109+
At the top of each device inventory tab, the following device counts are available:
110+
111+
- __Total__: The total number of identities.
112+
113+
- __Critical:__ The number of your critical assets.
114+
115+
- **Disabled:** The number of all disabled identities in your organization.
116+
117+
- **Services:** The number of all service accounts both on-premises and cloud.
118+
119+
You can use this information to help you prioritize devices for security posture improvements.
120+
121+
### Navigate to the Identity inventory page
122+
123+
Use relative links instead of absolute links.
124+
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to Assets > Identities. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
125+
126+
### Related Articles
127+
128+
- [Investigate cloud application accounts](/defender-cloud-apps/accounts)
129+
130+
- [Investigate users in Microsoft Defender XDR](/defender-xdr/investigate-users)
131+
132+
- [Investigate assets in Microsoft Defender for Identity](/defender-for-identity/investigate-assets)
133+

ATPDocs/manage-security-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88
# Investigate Defender for Identity security alerts in Microsoft Defender XDR
99

1010
> [!NOTE]
11-
> Defender for Identity is not designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
11+
> Defender for Identity isn't designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
1212
1313
This article explains the basics of how to work with Microsoft Defender for Identity security alerts in [Microsoft Defender XDR](/microsoft-365/security/defender/overview-security-center).
1414

@@ -87,7 +87,7 @@ On the right pane, you'll see the **Alert details**. Here you can see more detai
8787
You can also export the alert to an Excel file. To do this, select **Export.**
8888

8989
> [!NOTE]
90-
> In the Excel file, you now have two links available: **View in Microsoft Defender for Identity** and **View in Microsoft Defender XDR**. Each link will bring you to the relevant portal, and provide information about the alert there.
90+
> Alert export option is limited to Microsoft Defender for Identity Alerts with the "aa" prefix, for more information refer to [XDR Alert Sources](https://learn.microsoft.com/defender-xdr/investigate-alerts?tabs=settings#alert-sources).
9191
9292
## Tuning alerts
9393

127 KB
Loading
1.14 MB
Loading
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: 'Security assessment: Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account'
3+
description: 'This report lists any Entra Connect AD DS Connector account that is an Enterprise Administrator or Domain Administrator.'
4+
author: LiorShapiraa # GitHub alias
5+
ms.author: Liorshapira # Microsoft alias
6+
# ms.prod: microsoft-defender-for-identity
7+
ms.topic: article
8+
ms.date: 03/16/2025
9+
---
10+
11+
# Security assessment: Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account
12+
13+
This article describes Microsoft Defender for Identity's Microsoft Entra Connect AD DS Connector account default admin security posture assessment report.
14+
15+
> [!NOTE]
16+
> This security assessment will be available only if Microsoft Defender for Identity sensor is installed on servers running Microsoft Entra Connect services.
17+
18+
## Why might using an Enterprise or Domain Admin account for the Microsoft Entra Connect AD DS Connector be a risk?
19+
20+
Smart attackers often target Microsoft Entra Connect in on-premises environments due to the elevated privileges associated with its AD DS Connector account (typically created in Active Directory with the MSOL_ prefix). Using an **Enterprise Admin** or **Domain Admin** account for this purpose significantly increases the attack surface, as these accounts have broad control over the directory.
21+
22+
Starting with [Entra Connect build 1.4.###.#](/entra/identity/hybrid/connect/reference-connect-accounts-permissions), Enterprise Admin and Domain Admin accounts can no longer be used as the AD DS Connector account. This best practice prevents over-privileging the connector account, reducing the risk of domain-wide compromise if the account is targeted by attackers. Organizations must now create or assign a lower-privileged account specifically for directory synchronization, ensuring better adherence to the principle of least privilege and protecting critical admin accounts.
23+
24+
## How do I use this security assessment to improve my hybrid organizational security posture?
25+
26+
1. Review the recommended action at[ https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account.
27+
28+
1. Review the exposed accounts and their group memberships. The list contains members of Domain/Enterprise Admins through direct and recursive membership.
29+
30+
1. Perform one of the following actions:
31+
32+
- Remove MSOL_ user account user from privileged groups, ensuring it retains the necessary permissions to function as the Entra Connect Connector account.
33+
34+
- Change the Entra Connect AD DS Connector account (MSOL_) to a lower-privileged account.
35+
36+
> [!NOTE]
37+
> While assessments are updated in near real time, scores and statuses are updated every 24 hours. While the list of impacted entities is updated within a few minutes of your implementing the recommendations, the status may still take time until it's marked as **Completed**.
38+
39+
## Next steps
40+
41+
- Learn more about [Microsoft Secure score]().
42+
43+
- Learn more about [Defender for Identity Sensor for Microsoft Entra Connect](https://aka.ms/MdiSensorForMicrosoftEntraConnectInstallation)
44+

ATPDocs/security-assessment.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,24 +38,30 @@ Defender for Identity security posture assessments have five key categories. Eac
3838
## Access Defender for Identity security posture assessments
3939

4040
> [!NOTE]
41-
You must have a Defender for Identity license to view Defender for Identity security posture assessments in Microsoft Secure Score.
42-
While *certificate template* assessments are available to all customers with AD CS installed in their environment, *certificate authority* assessments are available only to customers who have installed a sensor on an AD CS server. For more information, see [Configuring sensors for AD FS and AD CS](deploy/active-directory-federation-services.md).
41+
> You must have a Defender for Identity license to view Defender for Identity security posture assessments in Microsoft Secure Score.
42+
>
43+
> Additionally, while *certificate template* assessments are available to all customers with AD CS installed in their environment, *certificate authority* assessments are available only to customers who have installed a sensor on an AD CS server.
44+
>
45+
> Hybrid security recommendations will be available only if Microsoft Defender for Identity sensor is installed on servers running Microsoft Entra Connect services.
46+
>
47+
> For more information, see [Configuring sensors for AD FS, AD CS and Entra Connect.](https://aka.ms/DeployMdiSensorOnYourIdentityInfrastructure)
4348
4449
**To access identity security posture assessments**:
4550

4651
1. Open the [Microsoft Secure Score dashboard](https://security.microsoft.com/securescore).
4752
1. Select the **Recommended actions** tab. You can search for a particular recommended action, or filter the results (for example, by the category **Identity**).
4853

4954
[![Recommended actions.](media/recommended-actions.png)](media/recommended-actions.png#lightbox)
50-
55+
5156
1. For more details, select the assessment.
5257

5358
[![Select the assessment.](media/select-assessment.png)](media/select-assessment.png#lightbox)
54-
59+
5560
[!INCLUDE [secure-score-note](../includes/secure-score-note.md)]
5661

5762

5863
## Next steps
5964

6065
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
61-
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)
66+
- [Check out the Defender for Identity forum!](https://aka.ms/MDIcommunity)
67+

ATPDocs/toc.yml

Lines changed: 24 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,8 @@ items:
124124
items:
125125
- name: Assets
126126
items:
127+
- name: Identity inventory
128+
href: identity-inventory.md
127129
- name: Investigate assets
128130
href: investigate-assets.md
129131
- name: Lateral movement paths
@@ -170,6 +172,8 @@ items:
170172
displayName: Microsoft Entra Connect
171173
- name: Remove unnecessary replication permissions for Microsoft Entra Connect connector account
172174
href: remove-replication-permissions-microsoft-entra-connect.md
175+
- name: Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account
176+
href: replace-entra-connect-default-admin.md
173177
- name: Identity infrastructure
174178
items:
175179
- name: Built-in Active Directory Guest account is enabled
@@ -186,26 +190,26 @@ items:
186190
href: security-assessment-unsecure-domain-configurations.md
187191
- name: Certificates
188192
items:
189-
- name: Enforce encryption for RPC certificate enrollment interface (ESC8)
190-
href: security-assessment-enforce-encryption-rpc.md
191-
- name: Insecure ADCS certificate enrollment IIS endpoints (ESC8)
192-
href: security-assessment-insecure-adcs-certificate-enrollment.md
193-
- name: Misconfigured certificate templates owner (ESC4)
194-
href: security-assessment-edit-misconfigured-owner.md
195-
- name: Misconfigured Certificate Authority ACL (ESC7)
196-
href: security-assessment-edit-misconfigured-ca-acl.md
197-
- name: Misconfigured certificate templates ACL (ESC4)
198-
href: security-assessment-edit-misconfigured-acl.md
199-
- name: Misconfigured enrollment agent certificate template (ESC3)
200-
href: security-assessment-edit-misconfigured-enrollment-agent.md
201-
- name: Overly permissive certificate template with privileged EKU (ESC2)
202-
href: security-assessment-edit-overly-permissive-template.md
203-
- name: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
204-
href: prevent-certificate-enrollment-esc15.md
205-
- name: Prevent requests for certificates valid for arbitrary users (ESC1)
206-
href: security-assessment-prevent-users-request-certificate.md
207-
- name: Vulnerable Certificate Authority setting (ESC6)
208-
href: security-assessment-edit-vulnerable-ca-setting.md
193+
- name: Enforce encryption for RPC certificate enrollment interface (ESC8)
194+
href: security-assessment-enforce-encryption-rpc.md
195+
- name: Insecure ADCS certificate enrollment IIS endpoints (ESC8)
196+
href: security-assessment-insecure-adcs-certificate-enrollment.md
197+
- name: Misconfigured certificate templates owner (ESC4)
198+
href: security-assessment-edit-misconfigured-owner.md
199+
- name: Misconfigured Certificate Authority ACL (ESC7)
200+
href: security-assessment-edit-misconfigured-ca-acl.md
201+
- name: Misconfigured certificate templates ACL (ESC4)
202+
href: security-assessment-edit-misconfigured-acl.md
203+
- name: Misconfigured enrollment agent certificate template (ESC3)
204+
href: security-assessment-edit-misconfigured-enrollment-agent.md
205+
- name: Overly permissive certificate template with privileged EKU (ESC2)
206+
href: security-assessment-edit-overly-permissive-template.md
207+
- name: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
208+
href: prevent-certificate-enrollment-esc15.md
209+
- name: Prevent requests for certificates valid for arbitrary users (ESC1)
210+
href: security-assessment-prevent-users-request-certificate.md
211+
- name: Vulnerable Certificate Authority setting (ESC6)
212+
href: security-assessment-edit-vulnerable-ca-setting.md
209213
- name: Group policy
210214
items:
211215
- name: GPO assigns unprivileged identities to local groups with elevated privileges

0 commit comments

Comments
 (0)