Skip to content

Commit 189c86c

Browse files
Merge pull request #4802 from MicrosoftDocs/main
[AutoPublish] main to live - 08/21 04:28 PDT | 08/21 16:58 IST
2 parents 6274358 + 92fe940 commit 189c86c

File tree

4 files changed

+32
-29
lines changed

4 files changed

+32
-29
lines changed

ATPDocs/remediation-actions.md

Lines changed: 18 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -35,34 +35,30 @@ To perform any of the [supported actions](#supported-actions), you need to:
3535

3636
The following Defender for Identity actions can be performed on Identities:
3737

38-
- **Disable user in Active Directory** - This temporarily prevents a user from signing in to the on-premises network. This can help prevent compromised users from moving laterally and attempting to exfiltrate data or further compromise the network.
38+
| Remediation Action | Description | Scope |
39+
| ------------------------------------- | ------------------------------------------------------------ | ------------------------------------------------------------ |
40+
|Disable user | This temporarily prevents a user from signing in. This can help prevent compromised users from moving laterally and attempting to exfiltrate data or further compromise the network. | Active Directory, Entra ID and Okta
41+
|Enable user | Enable a user to sign in. | Active Directory, Entra ID and Okta
42+
|Revoke all Users' sessions | Revoke a user's active sessions. | Entra ID and Okta
43+
|Confirm user compromised | The user's risk level is set to High | Entra ID
44+
| Reset user password| This prompts the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts| Active Directory
45+
|Deactivate user in Okta | This action can be used when a non-legit malicious account was detected, to deactivate the account permanently | Okta
46+
| Set user risk to High/Medium/Low |Set one user risk scoring to one of the defined levels. This action will only be available if [Risk Scoring](https://help.okta.com/en-us/Content/Topics/Security/Security_Risk_Scoring.htm) feature is enabled | Okta
3947

40-
- **Reset user password** - This prompts the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts.
41-
42-
- **Mark User Compromised** - The user's risk level is set to High.
43-
44-
- **Suspend User in Entra ID** - Block new sign-ins and access to cloud resources.
45-
46-
- **Require User to Sign In Again** - Revoke a user's active sessions.
47-
48-
- **Suspend User in Okta** - Temporarily disables a user account. This action can be used when a legit user account was found to be compromised and needed to be disabled.
49-
50-
- **Deactivate User in Okta** - This action can be used when a non-legit malicious account was detected, to deactivate the account permanently.
5148

5249
Depending on your Microsoft Entra ID roles, you might see additional Microsoft Entra ID actions, such as requiring users to sign in again and confirming a user as compromised. For more information, see [Remediate risks and unblock users](/entra/id-protection/howto-identity-protection-remediate-unblock).
5350

5451
## Roles and Permissions
5552

56-
| Action | XDR RBAC permissions |
57-
| ------------------------------------- | ------------------------------------------------------------ |
58-
|Mark User Compromised | - Global Administrator <br> - Security Administrator|
59-
|Suspend User in Entra ID | - Global Administrator |
60-
|Require User to Sign In Again | - Global Administrator <br>|
61-
| Disable/Enable User in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
62-
| Force Password Reset in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
63-
| Suspend User in Okta | A custom role defined with permissions for Response (manage) Or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator|
64-
| Deactivate User in Okta | A custom role defined with permissions for Response (manage) Or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator|
65-
53+
| Remediation Action | Active Directory |Entra ID | Okta |
54+
|--|--|--|--|
55+
| Disable user | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr) | - Global Administrator <br> - Security Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
56+
| Enable user | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr) | Global Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
57+
| Revoke all Users' sessions |N\A | Global Administrator | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator |
58+
| Confirm user compromised |N\A | - Global Administrator <br> -Security Administrator | N/A|
59+
| Reset user password | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr) | N\A | N\A
60+
| Deactivate user in Okta | N\A | N\A | A custom role defined with permissions for Response (manage) or one of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator
61+
| Set User risk to High/Medium/Low | N\A | N\A | A custom role defined with permissions for Response (manage) or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator
6662

6763
## Related videos
6864

ATPDocs/whats-new.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,14 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## August 2025
2727

28+
### Microsoft Entra ID risk level is now available in near real time in Microsoft Defender for Identity (Preview)
29+
30+
Entra ID risk level is now available on the Identity Inventory assets page, the identity details page, and in the IdentityInfo table in Advanced Hunting, and includes the Entra ID risk score. SOC analysts can use this data to correlate risky users with sensitive or highly privileged users, create custom detections based on current or historical user risk, and improve investigation context.
31+
32+
Previously, Defender for Identity tenants received Entra ID risk level in the IdentityInfo table through user and entity behavior analytics (UEBA). With this update, the Entra ID risk level is now updated in near real time through Microsoft Defender for Identity.
33+
34+
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Entra ID risk level to the IdentityInfo table remains unchanged.
35+
2836

2937
### New security assessment: Remove inactive service accounts (Preview)
3038

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -36,11 +36,11 @@ Learn more:
3636

3737
## August 2025
3838

39-
**Microsoft Defender for Endpoint on macOS**
40-
41-
- (Preview) **Configure offline security intelligence updates for Microsoft Defender for Endpoint on macOS**: This feature enables organizations to update security intelligence (antivirus definitions/signatures) on macOS endpoints offline from a local mirror server. For more information, see [Configure offline security intelligence updates for Microsoft Defender for Endpoint on macOS (preview)](./mac-support-offline-security-intelligence-update.md).
39+
|Feature |Preview/GA |Description |
40+
|---------|------------|-------------|
41+
|[Configure offline security intelligence updates for Microsoft Defender for Endpoint on macOS](./mac-support-offline-security-intelligence-update.md) |Preview |Enables organizations to update security intelligence (antivirus definitions/signatures) on macOS endpoints offline from a local mirror server. |
4242

43-
- ## July 2025
43+
## July 2025
4444

4545
|Feature |Preview/GA |Description |
4646
|---------|------------|-------------|

defender-xdr/advanced-hunting-identityinfo-table.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -102,10 +102,9 @@ If you're using the Microsoft Defender portal but haven't onboarded a Microsoft
102102
- `DeletedDateTime`
103103
- `EmployeeId`
104104
- `OtherMailAddresses`
105-
- `RiskLevel`
106-
- `RiskLevelDetails`
107-
- `State`
108105
- `Tags`
106+
- `State`
107+
109108

110109
For more information about UEBA, read [Advanced threat detection with User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel](/azure/sentinel/identify-threats-with-entity-behavior-analytics). For more information about the different data sources in UEBA, read [Microsoft Sentinel UEBA reference](/azure/sentinel/ueba-reference).
111110

0 commit comments

Comments
 (0)