Skip to content

Commit 2cd54a1

Browse files
authored
Merge branch 'main' into user/zakhter/mde_netfilter_doc_update
2 parents 9ef9670 + d2e359d commit 2cd54a1

File tree

342 files changed

+3698
-2145
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

342 files changed

+3698
-2145
lines changed

.acrolinx-config.edn

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,10 @@ Select the total score link to review all feedback on clarity, consistency, tone
5151
"
5252
**More information about Acrolinx**
5353
54-
- [Install Acrolinx locally for VSCode for Magic](https://review.docs.microsoft.com/office-authoring-guide/acrolinx-vscode?branch=main)
54+
- [Install Acrolinx locally for VSCode for Magic](https://review.learn.microsoft.com/office-authoring-guide/acrolinx-vscode?branch=main)
5555
- [False positives or issues](https://aka.ms/acrolinxbug)
5656
- [Request a new Acrolinx term](https://microsoft.sharepoint.com/teams/M365Dev2/SitePages/M365-terminology.aspx)
57-
- [Troubleshooting issues with Acrolinx](https://review.docs.microsoft.com/help/contribute/acrolinx-error-messages)
57+
- [Troubleshooting issues with Acrolinx](https://review.learn.microsoft.com/help/platform/acrolinx-troubleshoot?branch)
5858
5959
"
6060
}

.github/workflows/StaleBranch.yml

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,18 @@ name: (Scheduled) Stale branch removal
22

33
permissions:
44
contents: write
5-
5+
pull-requests: read
6+
7+
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
8+
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.
9+
# The workflow should not be configured to run after "deletion day" so that users can review the branches were deleted.
10+
# Recommendation: configure cron to run on days 1,15-31 where 1 is what's configured in 'DeleteOnDayOfMonth'. If 'DeleteOnDayOfMonth' is set to something else, update cron to run the two weeks leading up to it.
11+
612
on:
713
schedule:
8-
- cron: "0 9 1 * *"
14+
- cron: "0 9 1,15-31 * *"
915

10-
# workflow_dispatch:
16+
workflow_dispatch:
1117

1218

1319
jobs:

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1009,6 +1009,11 @@
10091009
"source_path": "CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md",
10101010
"redirect_url": "/defender-cloud-apps/troubleshooting-api-connectors-errors",
10111011
"redirect_document_id": true
1012-
}
1012+
},
1013+
{
1014+
"source_path": "CloudAppSecurityDocs/connector-platform.md",
1015+
"redirect_url": "/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps",
1016+
"redirect_document_id": true
1017+
},
10131018
]
10141019
}

.openpublishing.redirection.defender-endpoint.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -149,6 +149,11 @@
149149
"source_path": "defender-endpoint/onboard-windows-server-2012r2-2016.md",
150150
"redirect_url": "/defender-endpoint/onboard-server",
151151
"redirect_document_id": false
152+
},
153+
{
154+
"source_path": "defender-endpoint/mde-linux-arm.md",
155+
"redirect_url": "/defender-endpoint/microsoft-defender-endpoint-linux",
156+
"redirect_document_id": false
152157
}
153158
]
154159
}

ATPDocs/deploy/activate-capabilities.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -117,8 +117,8 @@ The first time you activate Defender for Identity capabilities on your domain co
117117
Defender for Identity capabilities on domain controllers currently support the following Defender for Identity functionality:
118118

119119
- Investigation features on the [ITDR dashboard](#check-the-itdr-dashboard), [identity inventory](#confirm-entity-page-details), and [identity advanced hunting data](#test-advanced-hunting-tables)
120-
- [Specified security posture recommendations](#test-identity-security-posture-management-ispm-recommendations)
121-
- [Specified alert detections](#test-alert-functionality)
120+
- [Security posture recommendations](#test-identity-security-posture-management-ispm-recommendations)
121+
- [Alert detections](#test-alert-functionality)
122122
- [Remediation actions](#test-remediation-actions)
123123
- [Automatic attack disruption](/microsoft-365/security/defender/automatic-attack-disruption)
124124

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,14 @@ ms.topic: how-to
77

88
# Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity
99

10+
> [!IMPORTANT]
11+
> Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025.
12+
>
13+
1014
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
1115

1216
> [!NOTE]
13-
> This feature can potentially be exploited by an adversary to obtain the Net-NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
17+
> This feature can potentially be exploited by an adversary to obtain the NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
1418
> The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods.
1519
>
1620
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.

ATPDocs/health-alerts.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,15 @@ The Microsoft Defender for Identity **Health issues** page lets you know when th
3232

3333
:::image type="content" source="media/health-issues/close-suppress.png" alt-text="Screenshot of a health issue details pane." lightbox="media/health-issues/close-suppress.png":::
3434

35+
## Health issue status
36+
37+
Health issues in Microsoft Defender for Identity can have different statuses depending on their state and how they're handled.
38+
39+
- **Open:**: The health issue is marked as open.
40+
- **Closed:** A health issue is automatically marked as **Closed** when Microsoft Defender for Identity detects that the underlying issue is resolved. If you have [Azure ATP (workspace name) Administrator](/defender-for-identity/role-groups#defender-for-identity-security-groups) you can also manually close a health issue.
41+
- **Suppressed:** If you have Azure ATP (workspace name) Administrators permissions, you can suppress the health alert for seven days. Suppress a health alert if you're aware of an expected temporary known issue, for example, taking down a machine for maintenance.
42+
43+
For example, if a domain controller is taken offline for maintenance, a "Sensor stopped communicating" alert might be triggered. You can use the API to change the alert status from Open to Suppressed. Once the domain controller is back online, revert the status to Open and let Microsoft Defender for Identity close the alert automatically when the issue is resolved.
3544

3645
## Health issues
3746

@@ -43,7 +52,7 @@ Sensor-specific health issues are displayed in the **Sensor health issues** tab
4352

4453
|Alert|Description|Resolution|Severity|Displayed in|
4554
|----|----|----|----|----|
46-
|The virtual machines that the listed Defender for Identity sensors are installed on has a network configuration mismatch. This issue may affect the performance and reliability of the sensors.|Review the network interface settings, including disabling the Large Send Offload (LSO), and follow the instructions in [here](https://aka.ms/mdi/vmware-sensor-issue).|High|Sensors health issues tab|
55+
|The virtual machines that the listed Defender for Identity sensors is installed on has a network configuration mismatch. This issue might affect the performance and reliability of the sensors.|Review the network interface settings, including disabling the Large Send Offload (LSO), and follow the instructions in [here](https://aka.ms/mdi/vmware-sensor-issue).|High|Sensors health issues tab|
4756

4857
### A domain controller is unreachable by a sensor
4958

ATPDocs/identity-inventory.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -28,15 +28,15 @@ The Identities inventory page includes the following tabs:
2828

2929
- **Identities**: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.
3030

31-
- **Cloud application accounts:** Displays a list of cloud application accounts, including those from application connectors and third-party sources (original available in the previous version based on Microsoft Defender for Cloud Apps). Learn more about [Cloud application accounts from connected apps.](/defender-cloud-apps/accounts)
31+
- **Cloud application accounts:** Displays a list of cloud application accounts, including those from application connectors and third-party sources (original available in the previous version based on Microsoft Defender for Cloud Apps). Learn more about [Cloud application accounts from connected apps.](/defender-cloud-apps/accounts)
3232

3333
There are several options you can choose from to customize the identities list view. On the top navigation you can:
3434

3535
- Add or remove columns.
3636

3737
- Apply filters.
3838

39-
- Search for an identity by name or full UPN, SID and Object ID.
39+
- Search for an identity by name or full UPN, SID, and Object ID.
4040

4141
- Export the list to a CSV file.
4242

@@ -49,23 +49,23 @@ There are several options you can choose from to customize the identities list v
4949

5050
### Identity details
5151

52-
The **Identities** list offers a consolidated view of identities across Active Directory and Entra ID. It highlights key details, including the following columns by default:
52+
The **Identities** list offers a consolidated view of identities across Active Directory and Microsoft Entra IDs. It highlights key details, including the following columns by default:
5353

5454
- __Display name__ – The full name of the identity as shown in the directory.
5555

5656
- __SID__ – The Security Identifier, a unique value used to identify the identity in Active Directory.
5757

5858
- __Domain__ – The Active Directory domain to which the identity belongs.
5959

60-
- __Object ID__ – A unique identifier for the identity in Entra ID.
60+
- __Object ID__ – A unique identifier for the identity in Microsoft Entra ID.
6161

62-
- __Source__ – Indicates whether the identity is on-premises (originate from Active Directory), Cloud only (Entra ID) or Hybrid (synced from AD to Entra ID).
62+
- __Source__ – Indicates whether the identity is on-premises (originate from Active Directory), Cloud only (Entra ID) or Hybrid (synced from Azure Active Directory to Entra ID).
6363

6464
- __Type__ – Specifies if the identity is a user account or service account.
6565

6666
- __UPN (User Principal Name)__ – The unique login name of the identity in an email-like format.
6767

68-
- __Tags__ – Custom labels that help categorize or classify identities: Sensitive and Honeytoken.
68+
- __Tags__ – Custom labels that help categorize identities that are considered high value assets. For example, **Sensitive**, **Honeytoken** or **Privileged Accounts** managed by a [Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-configure) (PIM) service.
6969

7070
- __Created time__ – The timestamp when the identity was first created.
7171

@@ -75,7 +75,7 @@ The **Identities** list offers a consolidated view of identities across Active D
7575

7676
- __Last updated__ – The timestamp of the most recent update to the identity's attributes in Active Directory.
7777

78-
Non-default columns: Email and Entra ID risk level.  
78+
Nondefault columns: Email and Microsoft Entra ID risk level.  
7979

8080
> [!TIP]
8181
> To see all columns, you likely need to do one or more of the following steps:
@@ -99,13 +99,13 @@ You can apply the following filters to limit the list of identities and get a mo
9999

100100
- Account status
101101

102-
Sort option applies to Display name, Domain and Created time columns.
102+
Sort option applies to Display name, Domain, and Created time columns.
103103

104104
### Identity inventory insights
105105

106106
- The __Classify critical assets__ card allows you to define identity groups as business critical. For more information, see [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management).
107107

108-
- **Highly privileged identities** card helps you investigate in Advanced hunting all sensitive accounts in your organization, including Entra ID security administrators and Global admin users.
108+
- **Highly privileged identities** card helps you investigate in Advanced hunting all sensitive accounts in your organization, including Microsoft Entra ID security administrators and Global admin users.
109109

110110
- **Critical Active Directory service accounts** card helps you quickly identify all Active Directory accounts designated as critical, making it easier to focus on identities most at risk.
111111

Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,85 @@
1+
---
2+
title: Identity Security Initiative
3+
description: Learn how to enhance your organization's identity security using the Identity Security Initiative in Microsoft Defender XDR.
4+
ms.topic: overview
5+
ms.date: 04/05/2025
6+
---
7+
8+
# Identity Security Initiative (Preview)
9+
10+
Identity security is the practice of protecting the digital identities of individuals and organizations. This includes protecting passwords, usernames, and other credentials that can be used to access sensitive data or systems. Identity security is essential for protecting against a wide range of cyber threats, including phishing, malware, and data breaches.
11+
12+
## Prerequisites
13+
14+
- Your organization must have a Microsoft Defender for Identity license.
15+
- [Review prerequisites and permissions needed](/security-exposure-management/prerequisites) for working with Security Exposure Management.
16+
17+
## View Identity Security Initiatives
18+
1. Navigate to the [Microsoft Defender portal](https://security.microsoft.com/).
19+
1. From the Exposure management section on the navigation bar, select **Exposure insights** **>** **Initiatives** to open the Identity Security page.
20+
21+
:::image type="content" source="media/identity-security-initiative/screenshot-of-the-identity-security-initiative-page.png" alt-text="Screenshot showing the Identity security initiative page." lightbox="media/identity-security-initiative/screenshot-of-the-identity-security-initiative-page.png":::
22+
23+
## Review security metrics
24+
25+
Metrics in security initiatives help you to measure exposure risk for different areas within the initiative. Each metric gathers together one or more recommendations for similar assets.
26+
Metrics can be associated with one or more initiatives.
27+
28+
On the **Metrics** tab of an initiative, or in the Metrics section of Exposure Insights, you can see the metric state, its effect, and relative importance in an initiative, and recommendations to improve the metric.
29+
We recommend that you prioritize metrics with the highest impact on Initiative Score level. This composite measure considers both the weight value of each recommendation and the percentage of noncompliant recommendations.
30+
31+
:::image type="content" source="media/identity-security-initiative/screenshot-of-the-security-metrics-page.png" alt-text="Screenshot showing the security metrics page." lightbox="media/identity-security-initiative/screenshot-of-the-security-metrics-page.png":::
32+
33+
34+
|Metric property |Description |
35+
|---------|---------|
36+
|**Metric name** | The name of the metric. |
37+
|**Progress** |Shows the improvement of the exposure level for the metric from 0 (high exposure) to 100 (no exposure). |
38+
|**State** | Shows if the metric needs attention or if the target was met. |
39+
|**Total assets** | Total number of assets under the metric scope. |
40+
|**Recommendations** | Security recommendations associated with the metric. |
41+
|**Weight** | The relative weight (importance) of the metric within the initiative, and its effect on the initiative score. Shown as High, Medium, and Low. It can also be defined as Risk accepted. |
42+
|**14-day trend** | Shows the metric value changes over the last 14 days. |
43+
|**Last updated** | Shows a timestamp of when the metric was last updated.
44+
45+
> [!NOTE]
46+
> The Affected assets experience isn't fully supported during the Preview phase.
47+
48+
## View Identity security recommendations
49+
50+
The Security recommendations tab displays a list of prioritized remediation actions related to your identity security posture. Each recommendation is evaluated for compliance and mapped to its corresponding risk impact, workload, and domain. This view helps you triage and take action based on urgency and business relevance.
51+
52+
:::image type="content" source="media/identity-security-initiative/screenshot-showing-the-security-recommendations-page.png" alt-text="Showing showing the security recommendations page." lightbox="media/identity-security-initiative/screenshot-showing-the-security-recommendations-page.png":::
53+
54+
Sort the recommendations by any of the headings or filter them based on your task needs.
55+
56+
| **Column** | **Description** |
57+
|------------------------|---------------------------------------------------------------------------------|
58+
| **Name** | The name of the recommended action (for example, *Configure VPN integration*, *Enable MFA*). |
59+
| **State** | Indicates whether the recommendation is *Compliant* or *Not Compliant*. |
60+
| **Impact** | The security impact level (Low, Medium, or High) of implementing the recommendation. |
61+
| **Workload** | The Microsoft service area the recommendation applies to (for example, Defender for Identity, Microsoft Entra ID). |
62+
| **Domain** | The security domain (for example, identity, apps) associated with the recommendation. |
63+
| **Last calculated** | The most recent time the recommendation's status was evaluated. |
64+
| **Last state change** | When the recommendation’s compliance state last changed. |
65+
| **Related initiatives**| Number of security initiatives impacted by this recommendation. |
66+
| **Related metrics** | Number of security metrics that this recommendation contributes to. |
67+
68+
Security Exposure Management categorizes recommendations by compliance status, as follows:
69+
70+
- **Compliant**: Indicates that the recommendation was implemented successfully.
71+
- **Not complaint**: Indicates that the recommendation wasn't fixed.
72+
73+
## Set target score
74+
75+
You can set a customized target score for the initiative, taking your organization’s unique set of circumstances, priorities, and risk appetite into account.
76+
77+
To set a target store, select the initiative, and then select **Set target score** from the top of the initiative pane.
78+
79+
:::image type="content" source="media/identity-security-initiative/set-target-score.png" alt-text="Screenshot showing the set target score button." lightbox="media/identity-security-initiative/set-target-score.png":::
80+
81+
## Related content
82+
83+
- [Review security initiatives](/security-exposure-management/initiatives)
84+
85+
- [Investigate security initiative metrics](/security-exposure-management/security-metrics)
138 KB
Loading

0 commit comments

Comments
 (0)