Skip to content

Commit 28d2b14

Browse files
committed
changes to whats new and prereqs
1 parent 640c3a8 commit 28d2b14

File tree

2 files changed

+5
-2
lines changed

2 files changed

+5
-2
lines changed

defender-for-identity/deploy/prerequisites-sensor-version-3.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,8 +101,7 @@ Learn more about Asset Management Rule [here](/defender-xdr/configure-asset-rule
101101

102102
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
103103

104-
The Defender for Identity sensor v3.x can offer preview feature that allows automatically configure Windows event auditing on your domain controllers, applying the required Windows event auditing settings to new sensors, and fixing misconfigurations on existing ones. See [Configure auditing with the Defender for Identity sensor v3.x](configure-windows-event-collection.md#configure-windows-event-auditing-with-the-defender-for-identity-sensor-v3x).
105-
If you do not select automatic Windows auditing configuration, you must [manually configure Windows event auditing](configure-windows-event-collection.md) in the Defender portal or using PowerShell.
104+
For more information about configuring windows event auditing in the Defender portal or using PowerShell, see [Configure Windows event auditing](configure-windows-event-collection.md).
106105

107106
## Test your prerequisites
108107

defender-for-identity/whats-new.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,10 @@ For updates about versions and features released six months ago or earlier, see
2929
|---------|---------|
3030
|2.251|The enhanced ADWS LDAP and legacy password-based LDAP query methods now capture a broader range of unique events at scale. As a result, you may notice an increase in recorded activity.|
3131

32+
### Automatic Windows event auditing configuration for Defender for Identity sensors v3.x (Preview)
33+
34+
Defender for Identity is slowly rolling out automatic Windows event-auditing configuration for sensors v3.x, streamlining deployment by applying required auditing settings to new sensors and fixing misconfigurations on existing ones. As it rolls out, you will be able to enable automatic Windows event-auditing in the Defender portal or via the Graph API.
35+
3236
### Identity Inventory enhancements: Accounts tab, manual account linking and unlinking, and expanded remediation actions
3337

3438
The following new features are now available in Microsoft Defender for Identity:

0 commit comments

Comments
 (0)