You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/monitored-activities.md
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,18 +14,20 @@ In the case of a valid threat, or **true positive**, Defender for Identity enabl
14
14
The information monitored by Defender for Identity is presented in the form of activities. Defender for Identity currently supports monitoring of the following activity types:
15
15
16
16
> [!NOTE]
17
-
>
18
17
> - This article is relevant for all Defender for Identity sensor types.
19
18
> - Defender for Identity monitored activities appear on both the user and machine profile page.
20
-
> - Defender for Identity monitored activities are also available in Microsoft Defender XDR's [Advanced Hunting](https://security.microsoft.com/advanced-hunting) page.
19
+
> - Defender for Identity monitored activities are also available in [Microsoft Defender XDR's Advanced Hunting](/defender-xdr/advanced-hunting-overview) page.
20
+
21
+
> [!TIP]
22
+
> For detailed information on all supported event types (`ActionType` values) in Advanced Hunting Identity-related tables, use the built-in schema reference available in Microsoft Defender XDR.
21
23
22
24
## Monitored user activities: User account AD attribute changes
23
25
24
26
|Monitored activity|Description|
25
27
|---------------------|------------------|
26
28
|Account Constrained Delegation State Changed|The account state is now enabled or disabled for delegation.|
27
29
|Account Constrained Delegation SPNs Changed|Constrained delegation restricts the services to which the specified server can act on behalf of the user.|
28
-
|Account Delegation Changed | Changes to the account delegation settings |
30
+
|Account Delegation Changed | Changes to the account delegation settings.|
29
31
|Account Disabled Changed|Indicates whether an account is disabled or enabled.|
30
32
|Account Expired|Date when the account expires.|
31
33
|Account Expiry Time Changed|Change to the date when the account expires.|
@@ -35,9 +37,9 @@ The information monitored by Defender for Identity is presented in the form of a
35
37
|Account Password Never Expires Changed|User's password changed to never expire.|
36
38
|Account Password Not Required Changed|User account was changed to allow logging in with a blank password.|
37
39
|Account Smartcard Required Changed|Account changes to require users to log on to a device using a smart card.|
description: This article provides an overview of Microsoft Defender for Identity's Microsoft LAPS usage identity security posture assessment report.
5
4
ms.date: 01/29/2023
@@ -12,9 +11,9 @@ ms.topic: how-to
12
11
13
12
Microsoft's "Local Administrator Password Solution" (LAPS) provides management of local administrator account passwords for domain-joined computers. Passwords are randomized and stored in Active Directory (AD), protected by ACLs, so only eligible users can read it or request its reset.
14
13
15
-
This security assessment supports [legacy Microsoft LAPS](https://www.microsoft.com/en-us/download/details.aspx?id=46899)only.
14
+
This security assessment supports [legacy Microsoft LAPS](https://www.microsoft.com/en-us/download/details.aspx?id=46899)and [Windows LAPS](/windows-server/identity/laps/laps-overview).
16
15
17
-
## What risk does not implementing LAPS pose to an organization?
16
+
## What risk does not implement LAPS pose to an organization?
18
17
19
18
LAPS provides a solution to the issue of using a common local account with an identical password on every computer in a domain. LAPS resolves this issue by setting a different, rotated random password for the common local administrator account on every computer in the domain.
20
19
@@ -24,24 +23,20 @@ LAPS simplifies password management while helping customers implement more recom
24
23
25
24
1. Review the recommended action at <https://security.microsoft.com/securescore?viewid=actions> to discover which of your domains have some (or all) compatible Windows devices that aren't protected by LAPS, or that haven't had their LAPS managed password changed in the last 60 days.
26
25
27
-

28
-
26
+
[](media/cas-isp-laps-1.png#lightbox)
27
+
29
28
1. For domains that are partially protected, select the relevant row to view the list of devices not protected by LAPS in that domain.
30
29
31
30

32
-
33
-
> [!NOTE]
34
-
> If the entire domain is not protected with LAPS, you won't see the list of all the unprotected devices.
35
-
36
-
1. Take appropriate action on those devices by downloading, installing and configuring or troubleshooting [Microsoft LAPS](https://go.microsoft.com/fwlink/?linkid=2104282) using the documentation provided in the download.
31
+
32
+
1. Take appropriate action on those devices by downloading, installing, and configuring or troubleshooting [Microsoft LAPS](https://go.microsoft.com/fwlink/?linkid=2104282) or [Windows LAPS](/windows-server/identity/laps/laps-overview).
37
33
38
34

39
35
40
36
> [!NOTE]
41
-
> While assessments are updated in near real time, scores and statuses are updated every 24 hours. While the list of impacted entities is updated within a few minutes of your implementing the recommendations, the status may still take time until it's marked as **Completed**.
42
-
>
37
+
> While assessments are updated in near real time, scores and statuses are updated every 24 hours. While the list of impacted entities is updated within a few minutes of your implementing the recommendations, the status may still take time until it will be marked as **Completed**.
43
38
44
39
## See also
45
40
46
41
-[Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
47
-
-[Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+33-1Lines changed: 33 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,38 @@ For more information, see also:
22
22
23
23
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
24
24
25
+
## February 2025
26
+
27
+
### New attack paths tab on the Identity profile page
28
+
29
+
This tab provides visibility into potential attack paths leading to a critical identity or involving it within the path, helping assess security risks. For more information, see [Overview of attack path within Exposure Management.](/security-exposure-management/work-attack-paths-overview)
30
+
31
+
Additional identity page enhancements:
32
+
33
+
- New side panel with more information for each entry on the user timeline.
34
+
35
+
- Filtering capabilities on the Devices tab under Observed in organization.
36
+
37
+
### Updating 'Protect and manage local admin passwords with Microsoft LAPS' posture recommendation
38
+
39
+
This update aligns the security posture assessment within Secure Score with the latest version of [Windows LAPS](/windows-server/identity/laps/laps-overview), ensuring it reflects current security best practices for managing local administrator passwords.
40
+
41
+
### New and updated events in the Advanced hunting IdentityDirectoryEvents table
42
+
43
+
We have added and updated the following events in the `IdentityDirectoryEvents` table in Advanced Hunting:
44
+
45
+
- User Account control flag has been changed
46
+
47
+
- Security group creation in Active directory
48
+
49
+
- Failed attempt to change an account password
50
+
51
+
- Successful account password change
52
+
53
+
- Account primary group ID has been changed
54
+
55
+
Additionally, the **built-in schema reference** for Advanced Hunting in Microsoft Defender XDR has been updated to include detailed information on all supported event types (**`ActionType`** values) in identity-related tables, ensuring complete visibility into available events. For more information, see [Advanced hunting schema details](/defender-xdr/advanced-hunting-schema-tables).
56
+
25
57
## December 2024
26
58
27
59
### New security posture assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
@@ -443,7 +475,7 @@ This version includes the following improvements:
443
475
444
476
For more information, see [Download and schedule Defender for Identity reports in Microsoft Defender XDR (Preview)](reports.md).
445
477
446
-
-**Health issues**: Added the *The 'Remove learning period' toggle was automatically switched off for this tenant* health issue
478
+
-**Health issues**: The 'Remove learning period' toggle was automatically switched off for this tenant* health issue.
447
479
448
480
This version also includes bug fixes for cloud services and the Defender for Identity sensor.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/get-started.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -160,7 +160,7 @@ Now the risk scores given to discovered apps are configured precisely according
160
160
Some features work best when they're customized to your needs.
161
161
Provide a better experience for your users with your own email templates. Decide what notifications you receive and customize your risk score metric to fit your organization's preferences.
162
162
163
-
## Step 7: Organize the data according to your needs
163
+
## Step 6: Organize the data according to your needs
164
164
165
165
**How to page**: [Working with IP ranges and tags](ip-tags.md)
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/includes/entra-conditional-access-policy.md
+9-3Lines changed: 9 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,13 @@ Microsoft Entra ID supports both browser-based and non browser-based policies. W
30
30
31
31
Repeat this procedure to create a nonbrowser based Conditional Access policy. In the **Client apps** area, toggle the **Configure** option to **Yes**. Then, under **Modern authentication clients**, clear the **Browser** option. Leave all other default selections selected.
32
32
33
-
Note: The Enterprise application “Microsoft Defender for Cloud Apps – Session Controls” is used internally by the Conditional Access App Control service.
34
-
Please ensure the CA policy does not restrict access to this application in the **Target resources**.
35
-
36
33
For more information, see [Conditional Access policies](/azure/active-directory/conditional-access/overview) and [Building a Conditional Access policy](/entra/identity/conditional-access/concept-conditional-access-policies).
34
+
35
+
> [!NOTE]
36
+
> Microsoft Defender for Cloud Apps utilizes the application **Microsoft Defender for Cloud Apps - Session Controls** as part of the Conditional Access App Control service for user sign-in. This application is located within the 'Enterprise Applications' section of Entra ID.
37
+
To protect your SaaS applications with Session Controls, you must allow access to this application.
38
+
If you block access to this application through an Entra ID Conditional Access policy, end users won't be able to access the protected applications under session controls. <br>
39
+
>
40
+
>It's important to ensure that this application isn't unintentionally restricted by any Conditional Access policies. For policies that restrict all or certain applications, please ensure this application is listed as an exception in the **Target resources** or confirm that the blocking policy is deliberate.<br>
41
+
>
42
+
>To ensure your location-based conditional access policies function correctly, include the **Microsoft Defender for Cloud Apps – Session Controls** application in those policies.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/ip-tags.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps*
40
40
41
41
-**Corporate**: These IPs should be all the public IP addresses of your internal network, your branch offices, and your Wi-Fi roaming addresses.
42
42
43
-
-**Risky**: These IPs should be any IP addresses that you consider risky. They can include suspicious IP addresses you've seen in the past, IP addresses in your competitors' networks, and so on.
43
+
-**Risky**: These IPs should be any IP addresses that you consider risky. They can include suspicious IP addresses you've seen in the past, IP addresses in your competitors' networks, and so on. It is suggested to be cautious with applying automatic governance actions only based on risky IP, since there are some cases when IPs that serve malicious actors are also being in use by legitimate employees, hence our recommendation is to examine each case by itself.
44
44
45
45
-**VPN**: These IPs should be any IP addresses you use for remote workers. By using this category, you can avoid raising [impossible travel](anomaly-detection-policy.md#impossible-travel) alerts when employees connect from their home locations via the corporate VPN.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/policies-threat-protection.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,7 +88,7 @@ You must have at least one app connected using [app connectors](enable-instant-v
88
88
89
89
## Detect and alert when Admin activity is detected on risky IP addresses
90
90
91
-
Detect admin activities performed from and IP address that is considered a risky IP address, and notify the system admin for further investigation or set a governance action on the admin's account.
91
+
Detect admin activities performed from and IP address that is considered a risky IP address, and notify the system admin for further investigation or set a governance action on the admin's account. Learn more [how to work with IP ranges and Risky IP](/defender-cloud-apps/ip-tags).
0 commit comments