You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/remediation-actions.md
+18-22Lines changed: 18 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,34 +35,30 @@ To perform any of the [supported actions](#supported-actions), you need to:
35
35
36
36
The following Defender for Identity actions can be performed on Identities:
37
37
38
-
-**Disable user in Active Directory** - This temporarily prevents a user from signing in to the on-premises network. This can help prevent compromised users from moving laterally and attempting to exfiltrate data or further compromise the network.
|Disable user | This temporarily prevents a user from signing in. This can help prevent compromised users from moving laterally and attempting to exfiltrate data or further compromise the network. | Active Directory, Entra ID and Okta
41
+
|Enable user | Enable a user to sign in. | Active Directory, Entra ID and Okta
42
+
|Revoke all Users' sessions | Revoke a user's active sessions. | Entra ID and Okta
43
+
|Confirm user compromised | The user's risk level is set to High | Entra ID
44
+
| Reset user password| This prompts the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts| Active Directory
45
+
|Deactivate user in Okta | This action can be used when a non-legit malicious account was detected, to deactivate the account permanently | Okta
46
+
| Set user risk to High/Medium/Low |Set one user risk scoring to one of the defined levels. This action will only be available if [Risk Scoring](https://help.okta.com/en-us/Content/Topics/Security/Security_Risk_Scoring.htm) feature is enabled | Okta
39
47
40
-
-**Reset user password** - This prompts the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts.
41
-
42
-
-**Mark User Compromised** - The user's risk level is set to High.
43
-
44
-
-**Suspend User in Entra ID** - Block new sign-ins and access to cloud resources.
45
-
46
-
-**Require User to Sign In Again** - Revoke a user's active sessions.
47
-
48
-
-**Suspend User in Okta** - Temporarily disables a user account. This action can be used when a legit user account was found to be compromised and needed to be disabled.
49
-
50
-
-**Deactivate User in Okta** - This action can be used when a non-legit malicious account was detected, to deactivate the account permanently.
51
48
52
49
Depending on your Microsoft Entra ID roles, you might see additional Microsoft Entra ID actions, such as requiring users to sign in again and confirming a user as compromised. For more information, see [Remediate risks and unblock users](/entra/id-protection/howto-identity-protection-remediate-unblock).
|Mark User Compromised | - Global Administrator <br> - Security Administrator|
59
-
|Suspend User in Entra ID | - Global Administrator |
60
-
|Require User to Sign In Again | - Global Administrator <br>|
61
-
| Disable/Enable User in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
62
-
| Force Password Reset in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
63
-
| Suspend User in Okta | A custom role defined with permissions for Response (manage) Or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator|
64
-
| Deactivate User in Okta | A custom role defined with permissions for Response (manage) Or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator|
65
-
53
+
| Remediation Action | Active Directory |Entra ID | Okta |
54
+
|--|--|--|--|
55
+
| Disable user | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)| - Global Administrator <br> - Security Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
56
+
| Enable user | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)| Global Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
57
+
| Revoke all Users' sessions |N\A | Global Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
58
+
| Confirm user compromised |N\A | - Global Administrator <br> -Security Administrator | N/A|
59
+
| Reset user password | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr) | N\A | N\A
60
+
| Deactivate user in Okta | N\A | N\A | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator
61
+
| Set User risk to High/Medium/Low | N\A | N\A | A custom role defined with permissions for Response (manage) or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,14 @@ For updates about versions and features released six months ago or earlier, see
25
25
26
26
## August 2025
27
27
28
+
### Microsoft Entra ID risk level is now available in near real time in Microsoft Defender for Identity (Preview)
29
+
30
+
Entra ID risk level is now available on the Identity Inventory assets page, the identity details page, and in the IdentityInfo table in Advanced Hunting, and includes the Entra ID risk score. SOC analysts can use this data to correlate risky users with sensitive or highly privileged users, create custom detections based on current or historical user risk, and improve investigation context.
31
+
32
+
Previously, Defender for Identity tenants received Entra ID risk level in the IdentityInfo table through user and entity behavior analytics (UEBA). With this update, the Entra ID risk level is now updated in near real time through Microsoft Defender for Identity.
33
+
34
+
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Entra ID risk level to the IdentityInfo table remains unchanged.
35
+
28
36
29
37
### New security assessment: Remove inactive service accounts (Preview)
Copy file name to clipboardExpand all lines: defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,11 +36,11 @@ Learn more:
36
36
37
37
## August 2025
38
38
39
-
**Microsoft Defender for Endpoint on macOS**
40
-
41
-
- (Preview) **Configure offline security intelligence updates for Microsoft Defender for Endpoint on macOS**: This feature enables organizations to update security intelligence (antivirus definitions/signatures) on macOS endpoints offline from a local mirror server. For more information, see [Configure offline security intelligence updates for Microsoft Defender for Endpoint on macOS (preview)](./mac-support-offline-security-intelligence-update.md).
39
+
|Feature |Preview/GA |Description |
40
+
|---------|------------|-------------|
41
+
|[Configure offline security intelligence updates for Microsoft Defender for Endpoint on macOS](./mac-support-offline-security-intelligence-update.md)|Preview |Enables organizations to update security intelligence (antivirus definitions/signatures) on macOS endpoints offline from a local mirror server. |
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-identityinfo-table.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,10 +102,9 @@ If you're using the Microsoft Defender portal but haven't onboarded a Microsoft
102
102
-`DeletedDateTime`
103
103
-`EmployeeId`
104
104
-`OtherMailAddresses`
105
-
-`RiskLevel`
106
-
-`RiskLevelDetails`
107
-
-`State`
108
105
-`Tags`
106
+
-`State`
107
+
109
108
110
109
For more information about UEBA, read [Advanced threat detection with User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel](/azure/sentinel/identify-threats-with-entity-behavior-analytics). For more information about the different data sources in UEBA, read [Microsoft Sentinel UEBA reference](/azure/sentinel/ueba-reference).
0 commit comments