Skip to content

Commit 3408ee6

Browse files
committed
Merge branch 'main' into pr/3925
2 parents 8c6ee9d + a431a29 commit 3408ee6

File tree

278 files changed

+960
-480
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

278 files changed

+960
-480
lines changed

.github/workflows/AutoPublish.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,21 +3,23 @@ name: (Scheduled) Publish to live
33
permissions:
44
contents: write
55
pull-requests: write
6+
checks: read
67

78
on:
89
schedule:
9-
- cron: "25 5,11,17,22 * * *" # Times are UTC based on Daylight Saving Time. Need to be adjusted for Standard Time. Scheduling at :25 to account for queuing lag.
10+
- cron: "25 2,5,8,11,14,17,20,22 * * *" # Times are UTC based on Daylight Saving Time. Need to be adjusted for Standard Time. Scheduling at :25 to account for queuing lag.
1011

1112
workflow_dispatch:
1213

1314
jobs:
1415

1516
auto-publish:
1617
if: github.repository_owner == 'MicrosoftDocs' && contains(github.event.repository.topics, 'build')
17-
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-AutoPublish.yml@workflows-prod
18+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-AutoPublishV2.yml@workflows-prod
1819
with:
1920
PayloadJson: ${{ toJSON(github) }}
2021
EnableAutoPublish: true
22+
EnableAutoMerge: true
2123

2224
secrets:
2325
AccessToken: ${{ secrets.GITHUB_TOKEN }}

ATPDocs/accounts-with-non-default-pgid.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ ms.author: liorshapira
1010
ms.service: microsoft-defender-for-identity
1111
ms.topic: article
1212
ms.date: 10/05/2024
13+
ms.reviewer: LiorShapiraa
1314
---
1415

1516
# Security Assessment: Accounts with non-default Primary Group ID

ATPDocs/advanced-settings.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ description: Learn how to configure the number of Microsoft Defender for Identit
44
ms.date: 02/11/2024
55
ms.topic: how-to
66
#CustomerIntent: As a Microsoft Defender for Identity customer, I want to reduce the number of false positives by adjusting thresholds for specific alerts.
7+
ms.reviewer: rlitinsky
78
---
89

910
# Adjust alert thresholds

ATPDocs/alerts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Security alerts
33
description: This article provides a list of the security alerts issued by Microsoft Defender for Identity.
44
ms.date: 03/23/2023
55
ms.topic: conceptual
6+
ms.reviewer: morRubin
67
---
78

89
# Security alerts in Microsoft Defender for Identity
@@ -97,7 +98,6 @@ The following table lists the mapping between alert names, their corresponding u
9798
| [Suspicious modifications to the AD CS security permissions/settings](persistence-privilege-escalation-alerts.md#suspicious-modifications-to-the-ad-cs-security-permissionssettings--external-id-2435) | 2435 | Medium | Privilege escalation |
9899
| [Account Enumeration reconnaissance (LDAP)](reconnaissance-discovery-alerts.md#account-enumeration-reconnaissance-ldap-external-id-2437-preview) (Preview) | 2437 | Medium | Account Discovery, Domain Account |
99100
| [Directory Services Restore Mode Password Change](other-alerts.md#directory-services-restore-mode-password-change-external-id-2438) | 2438 | Medium | Persistence, Account Manipulation |
100-
| [Honeytoken was queried via SAM-R](reconnaissance-discovery-alerts.md#honeytoken-was-queried-via-sam-r-external-id-2439) | 2439 | Low | Discovery |
101101
|[Group Policy Tampering ](/defender-for-identity/other-alerts)|2440|Medium|Defense evasion|
102102

103103
> [!NOTE]

ATPDocs/architecture.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ description: Learn about the Microsoft Defender for Identity system architecture
44
ms.date: 09/14/2023
55
ms.topic: overview
66
#CustomerIntent: As a Defender for Identity user, I want to understand the relevant components and how they interact with the rest of my environment so that I can best use Defender for Identity features.
7+
ms.reviewer: morRubin
78
---
89

910
# Microsoft Defender for Identity architecture

ATPDocs/automated-response-exclusions.md

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -18,27 +18,30 @@ For example, an incident involving Attack Disruption, where response actions are
1818

1919
## How to add automated response exclusions
2020

21-
1. In [Microsoft Defender XDR](https://security.microsoft.com/), go to **Settings** and then **Identities**.
2221

23-
![Go to Settings, then Identities.](media/settings-identities.png)
22+
1. In the [Microsoft Defender XDR](https://security.microsoft.com/) portal, go to **Settings** and then **Microsoft Defender XDR**.
2423

25-
1. You'll then see **Automated response exclusions** in the left-hand menu.
24+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-settings1.png" alt-text="Go to Settings, then Microsoft Defender XDR.":::
2625

27-
![Automated response exclusions.](media/automated-response-exclusions.png)
26+
27+
2. You'll see **Automated response > Identities** in the left-side menu.
2828

29-
1. To exclude specific users, select **Exclude Users**.
29+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-automated-response.png" alt-text="Go to Automated response then Identities.":::
30+
31+
3. To exclude specific users, select **Add User Exclusion**.
3032

31-
:::image type="content" source="media/exclude-users.png" alt-text="Exclude specific users.":::
32-
33-
1. Search for the users to exclude and select the **Exclude Users** button.
33+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-add-exclusion.png" alt-text="Exclude specific users.":::
34+
35+
4. Search for the users to exclude and select the **Exclude Users** button.
3436

3537
:::image type="content" source="media/exclude-specific-users.png" alt-text="Choose which users to exclude.":::
38+
39+
5. To remove excluded users, select the relevant users from the list and select the **Remove** button.
3640

37-
1. To remove excluded users, select the relevant users from the list and select the **Remove** button.
38-
39-
:::image type="content" source="media/remove-excluded-users.png" alt-text="Remove excluded users.":::
40-
41+
:::image type="content" source="media/remove-excluded-users.png" alt-text="Remove excluded users.":::
42+
4143
## See also
4244

4345
- [Configure event collection](deploy/configure-event-collection.md)
44-
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)
46+
- [Check out the Defender for Identity forum!](https://aka.ms/MDIcommunity)
47+

ATPDocs/built-in-active-directory-guest-account-is-enabled.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ ms.author: liorshapira
1010
ms.service: microsoft-defender-for-identity
1111
ms.topic: article
1212
ms.date: 10/05/2024
13+
ms.reviewer: LiorShapiraa
1314
---
1415

1516
# Security Assessment: Built-in Active Directory Guest account is enabled
@@ -27,11 +28,11 @@ The on-premises Guest account is a built-in, non-nominative account that allows
2728

2829
1. Take appropriate action on those accounts by **disabling** the account.
2930

30-
For example:
31+
For example:
3132

32-
![Screenshot showing guest account in AD.](media/built-in-active-directory-guest-account-is-enabled/guest-account.png)
33+
![Screenshot showing guest account in AD.](media/built-in-active-directory-guest-account-is-enabled/guest-account.png)
3334

34-
![Screenshot showing security report.](media/built-in-active-directory-guest-account-is-enabled/security-report.png)
35+
![Screenshot showing security report.](media/built-in-active-directory-guest-account-is-enabled/security-report.png)
3536

3637
## Next steps
3738

ATPDocs/cef-format-sa.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: SIEM log reference
33
description: Provides samples of logs sent from Microsoft Defender for Identity to your SIEM.
44
ms.date: 09/22/2024
55
ms.topic: conceptual
6+
ms.reviewer: rlitinsky
67
---
78

89
# Microsoft Defender for Identity SIEM log reference

ATPDocs/change-password-domain-administrator-account.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ ms.author: liorshapira
1010
ms.service: microsoft-defender-for-identity
1111
ms.topic: article
1212
ms.date: 10/05/2024
13+
ms.reviewer: LiorShapiraa
1314
---
1415

1516
# Security assessment: Change password of built-in domain Administrator account
@@ -28,9 +29,9 @@ Regularly updating the built-in Administrator account's password is essential du
2829

2930
1. Take appropriate action on those accounts by resetting their password.  
3031

31-
For example:
32+
For example:
3233

33-
![Screenshot showing the report on the portal.](media/change-password-domain-administrator-account/screenshot-of-report.png)
34+
![Screenshot showing the report on the portal.](media/change-password-domain-administrator-account/screenshot-of-report.png)
3435

3536
## Next steps
3637

ATPDocs/change-password-krbtgt-account.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ ms.author: liorshapira
1010
ms.service: microsoft-defender-for-identity
1111
ms.topic: article
1212
ms.date: 10/06/2024
13+
ms.reviewer: LiorShapiraa
1314
---
1415

1516
# Security Assessment: Change password for krbtgt account

0 commit comments

Comments
 (0)