Skip to content

Commit 210acbd

Browse files
Merge pull request #5148 from rlitinsky/docs-editor/prerequisites-sensor-version-3-1759084519
Update prerequisites-sensor-version-3.md
2 parents 903f5a3 + 6c46bc2 commit 210acbd

File tree

1 file changed

+24
-1
lines changed

1 file changed

+24
-1
lines changed

defender-for-identity/deploy/prerequisites-sensor-version-3.md

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ This article describes the requirements for installing the Microsoft Defender fo
1414

1515
Before activating the Defender for Identity sensor v3.x, note that this version of the sensor is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
1616
The Defender for Identity sensor v3.x:
17-
- Requires that Defender for Endpoint is deployed
17+
- Requires that Defender for Endpoint is deployed
1818
- Can't be activated on a server that has a Defender for Identity sensor V2.x already deployed
1919
- Doesn't currently support VPN integration
2020
- Doesn't currently support ExpressRoute
@@ -62,6 +62,29 @@ The following table describes memory requirements on the server used for the Def
6262

6363
> [!IMPORTANT]
6464
> When running as a virtual machine, all memory must be allocated to the virtual machine at all times.
65+
## Configure Unified Sensor to support advanced identity detections
66+
67+
Applying the **Unified Sensor RPC Audit** tag enables a new, tested capability on the machine, improving security visibility and unlocking additional identity detections. Once applied, the configuration is enforced on **existing and future devices** that match the rule criteria. The tag itself is visible in the Device Inventory, providing admins with transparency and auditing capabilities.
68+
69+
**Steps to apply the configuration:**
70+
71+
1. In the **Microsoft Defender portal**, navigate to: **System > Settings > Microsoft Defender XDR > Asset Rule Management**.
72+
2. Create a new rule.
73+
3. In the side panel:
74+
75+
1. Select a **name** for the rule.
76+
77+
1. Set **rule conditions** using `Device name`, `Domain`, or `Device tag` to target the desired machines.
78+
79+
1. Ensure that the **Defender for Identity V3.x sensor** is already deployed on the selected devices.
80+
81+
1. Matching should primarily target **domain controllers** with the V3.x sensor installed.
82+
83+
1. **Add the tag** `Unified Sensor RPC Audit` to the selected devices.
84+
85+
1. Click **Submit** to save the rule.
86+
87+
Offboarding a device from this configuration can be done by **deleting the asset rule** or **modifying the rule conditions** so the device no longer matches.
6588

6689
## Configure Windows auditing
6790

0 commit comments

Comments
 (0)