You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/deploy-defender-identity.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,10 +23,10 @@ Identify your architecture and your requirements, and then use the table below t
23
23
|Server configuration |Server Operating System |Recommended deployment |
24
24
|---------|---------|---------|---------|
25
25
|Domain controller | Windows Server 2019 or later with the [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) or later.<br> * **See Note**.|[Defender for Identity sensor v3.x (Preview)](prerequisites-sensor-version-3.md)<br> * **See Note**. |
26
-
|Domain controller |Windows Server 2016 or earlier|[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
27
-
|[Active Directory Federation Services (AD FS)](active-directory-federation-services.md)|NA|[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
28
-
|[Active Directory Certificate Services (AD CS)](active-directory-federation-services.md)|NA|[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
29
-
|[Entra Connect](active-directory-federation-services.md)|NA|[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
26
+
|Domain controller |Windows Server 2016 or later|[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
27
+
|[Active Directory Federation Services (AD FS)](active-directory-federation-services.md)|Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
28
+
|[Active Directory Certificate Services (AD CS)](active-directory-federation-services.md)|Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
29
+
|[Entra Connect](active-directory-federation-services.md)|Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
30
30
31
31
> [!NOTE]
32
32
> The Defender for Identity sensor version 3.x is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ For updates about versions and features released six months ago or earlier, see
25
25
26
26
## August 2025
27
27
28
-
**Suspected Brute Force attack (Kerberos, NTLM):** Improved detection logic now includes scenarios where accounts were locked during the attacks - note that the number of triggered alerts may increase.
28
+
**Suspected Brute Force attack (Kerberos, NTLM):** Improved detection logic now includes scenarios where accounts were locked during the attacks. As a result, the number of triggered alerts might increase.
29
29
30
30
## July 2025
31
31
@@ -37,17 +37,17 @@ For more information, see [Configure scoped access for Microsoft Defender for Id
37
37
38
38
### New security posture assessments for unmonitored identity servers
39
39
40
-
Microsoft Defender for Identity now includes three security posture assessments that detect when Microsoft Entra Connect, Active Directory Federation Services (ADFS), or Active Directory Certificate Services (ADCS) servers are present in your environment but aren't monitored.
40
+
Microsoft Defender for Identity three new security posture assessments detect when Microsoft Entra Connect, Active Directory Federation Services (ADFS), or Active Directory Certificate Services (ADCS) servers are present in your environment but aren't monitored.
41
41
42
42
Use these assessments to improve monitoring coverage and strengthen your hybrid identity security posture.
[Security Assessment: Unmonitored Microsoft Entra Connect servers](unmonitored-entra-connect-servers.md)
51
51
52
52
53
53
@@ -65,7 +65,7 @@ Scoping by Active Directory domains helps:
65
65
66
66
- Support operational boundaries: Align access for SOC analysts, identity administrators, and regional teams.
67
67
68
-
For more information see: [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
68
+
For more information, see: [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
69
69
70
70
71
71
### Okta integration is now available in Microsoft Defender for Identity
@@ -106,7 +106,7 @@ Defender for Identity now supports deploying its new sensor on Domain Controller
106
106
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify noneligible servers and take action to update and onboard them for enhanced identity protection.
107
107
108
108
109
-
### Local administrators collection (using SAM-R queries) feature will be disabled
109
+
### Local administrators collection (using SAM-R queries) feature is disabled
110
110
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change occurs automatically by the specified date, and no administrative action is required.
111
111
112
112
### New Health Issue
@@ -152,7 +152,7 @@ For more information, see: [Investigate and protect Service Accounts | Microsoft
152
152
153
153
### Enhanced Identity Inventory
154
154
155
-
The Identities page under *Assets*has been updated to provide better visibility and management of identities across your environment.
155
+
The Identities page under *Assets*was updated to provide better visibility and management of identities across your environment.
156
156
The updated Identities Inventory page now includes the following tabs:
157
157
158
158
- Identities: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -406,8 +406,8 @@ This rule blocks executable files, such as .exe, .dll, or .scr, from launching.
406
406
407
407
> [!IMPORTANT]
408
408
> You must [enable cloud-delivered protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) to use this rule.
409
-
> The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID `01443614-cd74-433a-b99e-2ecdc07bfc25` is owned by Microsoft and isn't specified by admins. This rule uses cloud-delivered protection to update its trusted list regularly.
410
-
> You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to.
409
+
> This rule uses cloud-delivered protection to update its trusted list regularly.
410
+
> You can specify individual files or folders by using folder paths or fully qualified resource names. It also supports the **ASROnlyPerRuleExclusions** setting.
411
411
412
412
Intune name: `Executables that don't meet a prevalence, age, or trusted list criteria`
Copy file name to clipboardExpand all lines: defender-endpoint/mac-whatsnew.md
+24-12Lines changed: 24 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,12 +70,24 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
70
70
71
71
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md) and [Behavior Monitoring GA announcement blog](https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/behavior-monitoring-is-now-generally-available-for-microsoft-defender-for-endpoi/4415697)
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-core-service-overview.md
+21-7Lines changed: 21 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,37 +33,50 @@ To enhance your endpoint security experience, Microsoft is releasing the Microso
33
33
- Mid April 2024 to Enterprise customers running Windows clients.
34
34
- Beginning of July 2024 to U.S. Government customers running Windows clients.
35
35
36
-
- Mid January 2025 to Enterprise customers running Windows Server.
36
+
The Microsoft Defender Core service for Windows Server is releasing with [Microsoft Defender Antivirus platform version 4.18.25050.5.](/defender-endpoint/microsoft-defender-antivirus-updates)
37
37
38
-
3. If you're using the Microsoft Defender for Endpoint **streamlined** device connectivity experience, you don't need to add any other URLs.
38
+
- Mid July 2025 to Enterprise customers running Windows Server 2019 or later.
39
+
40
+
- Mid September 2025 to Enterprise customers running the [unified Microsoft Defender for Endpoint client](/defender-endpoint/update-agent-mma-windows) for Windows Server 2012 R2 or Windows Server 2016.
41
+
42
+
1. If you're using the Microsoft Defender for Endpoint **streamlined** device connectivity experience, you don't need to add any other URLs.
39
43
40
-
4. If you're using the Microsoft Defender for Endpoint **standard** device connectivity experience:
44
+
1. If you're using the Microsoft Defender for Endpoint **standard** device connectivity experience:
41
45
42
46
Enterprise customers should allow the following URLs:
Enterprise U.S. Government customers should allow the following URLs:
57
66
58
67
-`*.events.data.microsoft.com`
68
+
59
69
-`*.endpoint.security.microsoft.us (GCC-H & DoD)`
70
+
60
71
-`*.gccmod.ecs.office.com (GCC-M)`
72
+
61
73
-`*.config.ecs.gov.teams.microsoft.us (GCC-H)`
74
+
62
75
-`*.config.ecs.dod.teams.microsoft.us (DoD)`
63
76
64
-
5. If you're using [Application Control for Windows](/windows/security/application-security/application-control/windows-defender-application-control/wdac), or you're running non-Microsoft antivirus or endpoint detection and response software, make sure to add the processes mentioned earlier to your allowlist.
77
+
1. If you're using [Application Control for Windows](/windows/security/application-security/application-control/windows-defender-application-control/wdac), or you're running non-Microsoft antivirus or endpoint detection and response software, make sure to add the processes mentioned earlier to your allowlist.
65
78
66
-
6. Consumers don't need to take any actions to prepare.
79
+
1. Consumers don't need to take any actions to prepare.
67
80
68
81
## Microsoft Defender Antivirus processes and services
69
82
@@ -191,7 +204,8 @@ On the script page of the Run Script wizard, choose your script from the list (M
191
204
#### Use the Registry to update the policies for Microsoft Defender Core service.
192
205
193
206
1. Select **Start**, and then open Regedit.exe as an administrator.
194
-
2. Go to `HKLM\Software\Policies\Microsoft\Windows Defender\Features`
207
+
1. Go to `HKLM\Software\Policies\Microsoft\Windows Defender\Features`
0 commit comments