Skip to content

Commit 1c4682f

Browse files
authored
Merge branch 'main' into vivek-eod-update
2 parents 2920c0d + 72ccbdc commit 1c4682f

File tree

4 files changed

+31
-12
lines changed

4 files changed

+31
-12
lines changed

ATPDocs/deploy/capacity-planning.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This article describes how to use the Microsoft Defender for Identity sizing too
1111

1212
While domain controller performance may not be affected if the server doesn't have required resources, the Defender for Identity sensor may not operate as expected. For more information, see [Microsoft Defender for Identity prerequisites](prerequisites.md).
1313

14-
The sizing tool measures the capacity needed for domain controllers only. There is no need to run it against AD FS / AD CS servers, as the performance impact on AD FS / AD CS servers is extremely minimal to not existent.
14+
The sizing tool measures the capacity needed for domain controllers only. There is no need to run it against AD FS / AD CS / Entra Connect servers, as the performance impact on these servers is extremely minimal to not existent.
1515

1616
> [!TIP]
1717
> By default, Defender for Identity supports up to 350 sensors. To install more sensors, contact Defender for Identity support.
@@ -47,17 +47,17 @@ Common results include:
4747

4848
|Result |Description |
4949
|---------|---------|
50-
|**Yes** | The sensor is supported on your server |
50+
|**Yes** | The sensor is supported on your server. |
5151
|**Yes, but additional resources required** | The sensor is supported on your server as long you add any specified missing resources. |
52-
|**Maybe** | The current **Busy Packets/Second** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
53-
|**Maybe, but additional resources required** |The sensor may be supported on your server as long you add any specified missing resources, or the **Busy packets / Second** may be above 60K |
54-
|**No** | The sensor isn't supported on your server. <br><br>The current **Busy Packets/Second** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
55-
|**Missing OS Data** | There was an issue reading the operating system data. Make sure the connection to your server is able to query WMI remotely. |
56-
|**Missing Traffic Data** | There was an issue reading the traffic data. Make sure the connection to your server is able to query performance counters remotely. |
57-
|**Missing RAM data** | There was an issue reading the RAM data. Make sure the connection to your server is able to query WMI remotely. |
52+
|**Maybe** | The current **Busy Packets/sec** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
53+
|**Maybe, but additional resources required** |The sensor may be supported on your server as long you add any specified missing resources, or the **Busy packets/sec** may be above 60K. |
54+
|**No** | The sensor isn't supported on your server. <br><br>The current **Busy Packets/sec** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
55+
|**Missing OS Data** | There was an issue reading the operating system data. Make sure the connection to your server is able to query WMI remotely. |
56+
|**Missing Traffic Data** | There was an issue reading the traffic data. Make sure the connection to your server is able to query performance counters remotely. |
57+
|**Missing RAM data** | There was an issue reading the RAM data. Make sure the connection to your server is able to query WMI remotely. |
5858
|**Missing core data** | There was an issue reading the core data. Make sure the connection to your server is able to query WMI remotely. |
5959

60-
For example, the following image shows a set of results where the **Maybe** indicates that the **Busy Packets/Second** value is significantly higher at that point than average. Note that the **Display DC Times as UTC/Local** is set to *Local DC Time*. This setting helps highlight the fact that the values were taken at around 3:30 AM.
60+
For example, the following image shows a set of results where the **Maybe** indicates that the **Busy Packets/sec** value is significantly higher at that point than average. Note that the **Display DC Times as UTC/Local** is set to *Local DC Time*. This setting helps highlight the fact that the values were taken at around 3:30 AM.
6161

6262
:::image type="content" source="../media/capacity-tool-maybe.png" alt-text="Screenshot of a capacity tool results showing Maybe values." lightbox="../media/capacity-tool-maybe.png":::
6363

ATPDocs/troubleshooting-using-logs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
99

1010
The Defender for Identity logs provide insight into what each component of Microsoft Defender for Identity sensor is doing at any given point in time.
1111

12-
The Defender for Identity logs are located in a subfolder called **Logs** where Defender for Identity is installed; the default location is: **C:\Program Files\Azure Advanced Threat Protection Sensor\\**. In the default installation location, it can be found at: **C:\Program Files\Azure Advanced Threat Protection Sensor\version number\Logs**.
12+
The Defender for Identity logs are located in a subfolder called **Logs** where Defender for Identity is installed; the default location is: `C:\Program Files\Azure Advanced Threat Protection Sensor`. In the default installation location, it can be found at: `C:\Program Files\Azure Advanced Threat Protection Sensor\version number\Logs`.
1313

1414
## Defender for Identity sensor logs
1515

@@ -28,7 +28,7 @@ The Defender for Identity sensor has the following logs:
2828
2929
## Defender for Identity deployment logs
3030

31-
The Defender for Identity deployment logs are located in the temp directory of the user who installed the product. It will usually be found at **%USERPROFILE%\AppData\Local\Temp**. If it was deployed by a service, it might be found at **C:\Windows\Temp**.
31+
The Defender for Identity deployment logs are located in the temp directory of the user who installed the product. Typically, you can find these logs at `%USERPROFILE%\AppData\Local\Temp`. If the deployment was performed by a service, the logs might be located in `C:\Windows\Temp` or `C:\Windows\SystemTemp`, depending on your Windows version and patch level.
3232

3333
Defender for Identity sensor deployment logs:
3434

exposure-management/predefined-classification-rules-and-levels.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,4 +113,8 @@ Current asset types are:
113113
| Immutable Azure Storage | Cloud resource | Medium | This rule applies to Azure storage accounts that have immutability support enabled. Immutability stores business data in a write once read many (WORM) state, and usually indicates that the storage account holds critical or sensitive data that must be protected from modification. |
114114
| Immutable and Locked Azure Storage | Cloud resource | High | This rule applies to Azure storage accounts that have immutability support enabled with a locked policy. Immutability stores business data in a write once read many (WORM). Data protection is increased with a locked policy to ensure that data can’t be deleted or its retention time shortened. These settings usually indicate that the storage account holds critical or sensitive data that must be protected from modification or deletion. Data might also need to align with compliance policies for data protection. |
115115
| Azure Virtual Machine with a Critical User Signed In | Cloud resource | High | This rule applies to virtual machines protected by Defender for Endpoint, where a user with a high or very high criticality level is signed in. The signed-in user can be through a joined or registered device, an active browser session, or other means. |
116-
| Key Vaults with Many Connected Identities | Cloud resource | High | This rule identifies Key Vaults that can be accessed by a large number of identities, compared to other Key Vaults. This often indicates that the Key Vault is used by critical workloads, such as production services. |
116+
| Azure Key Vaults with Many Connected Identities | Cloud resource | High | This rule identifies Key Vaults that can be accessed by a large number of identities, compared to other Key Vaults. This often indicates that the Key Vault is used by critical workloads, such as production services. |
117+
| Locked Azure Kubernetes Service cluster | Cloud resource | Low | This is an Azure Kubernetes Service cluster that is safeguarded by a lock. Locks are used to protect assets from deletion and modifications. Usually, administrators use locks to safeguard critical cloud assets in their environment, and to protect them from accidental deletion and unauthorized modifications. |
118+
| Premium tier Azure Kubernetes Service cluster | Cloud resource | High | This rule applies to Azure Kubernetes Service clusters with premium tier cluster management. Premium tiers are recommended for running production or mission-critical workloads that need high availability and reliability. |
119+
| Azure Kubernetes Service cluster with multiple nodes | Cloud resource | High | This rule applies to Azure Kubernetes Service clusters with a large number of nodes. This often indicates that the cluster is used for critical workloads, such as production workloads. |
120+
| Azure Arc Kubernetes cluster with multiple nodes | Cloud Resource | High | This rule applies to Azure Arc Kubernetes clusters with a large number of nodes. This often indicates that the cluster is used for critical workloads, such as production workloads. |

exposure-management/whats-new.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,19 @@ Learn more about MSEM by reading the blogs, [here](https://techcommunity.microso
2626
2727
## December 2024
2828

29+
### New predefined classifications
30+
31+
The following predefined classification rules were added to the critical assets list:
32+
33+
| Classification | Description |
34+
| :--------------------------------------------------- | :----------------------------------------------------------- |
35+
| Locked Azure Kubernetes Service cluster | This rule applies to Azure Kubernetes Service clusters that are safeguarded by a lock. |
36+
| Premium tier Azure Kubernetes Service cluster | This rule applies to premium tier Azure Kubernetes Service clusters. |
37+
| Azure Kubernetes Service cluster with multiple nodes | This rule applies to Azure Kubernetes Service clusters with multiple nodes. |
38+
| Azure Arc Kubernetes cluster with multiple nodes | This rule applies to Azure Arc clusters with multiple nodes. |
39+
40+
For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md)
41+
2942
### New documentation library for Microsoft's unified security operations platform
3043

3144
Find centralized documentation about [Microsoft's unified SecOps platform in the Microsoft Defender portal](/unified-secops-platform/overview-unified-security). Microsoft's unified SecOps platform brings together the full capabilities of Microsoft Sentinel, Microsoft Defender XDR, Microsoft Security Exposure Management, and generative AI into the Defender portal. Learn about the features and functionality available with Microsoft's unified SecOps platform, then start to plan your deployment.
@@ -138,6 +151,8 @@ The following predefined classification rule was added to the critical assets li
138151
| ------------------------------------------------------------ | ------------------------------------------------------------ |
139152
| **Hyper-V Server** | This rule applies to devices identified as Hyper-V servers within a domain. These servers are essential for running and managing virtual machines within your infrastructure, serving as the core platform for their creation and management. |
140153

154+
For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md)
155+
141156
### Enhanced visibility for scoped users
142157

143158
This change now allows users who have been granted access to only some of the organization's devices to see the list of affected assets in metrics, recommendations, events, and initiative history within their specific scope.

0 commit comments

Comments
 (0)