Skip to content

Commit 371e8bc

Browse files
Merge pull request #4352 from MicrosoftDocs/main
[AutoPublish] main to live - 06/27 07:32 PDT | 06/27 20:02 IST
2 parents f638ab6 + ca73fcf commit 371e8bc

File tree

1 file changed

+13
-7
lines changed

1 file changed

+13
-7
lines changed

ATPDocs/remediation-actions.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,23 +27,27 @@ Watch the following video to learn more about remediation actions in Defender fo
2727

2828
To perform any of the [supported actions](#supported-actions), you need to:
2929

30-
- Configure the account that Microsoft Defender for Identity will use to perform them. By default, the Microsoft Defender for Identity sensor installed on a domain controller will impersonate the *LocalSystem* account of the domain controller and perform the above actions. However, you can change this default behavior by [setting up a gMSA account](manage-action-accounts.md) and scope the permissions as you need.
30+
- Configure the account that Microsoft Defender for Identity will use to perform them. By default, the Microsoft Defender for Identity sensor installed on a domain controller will impersonate the *LocalSystem* account of the domain controller and perform the above actions. However, you can change this default behavior by [setting up a gMSA account](manage-action-accounts.md) and scope the permissions as you need.
3131

3232
- Be signed into Microsoft Defender XDR to with relevant permissions. For Defender for Identity actions, you'll need a custom role with **Response (manage)** permissions. For more information, see [Create custom roles with Microsoft Defender XDR Unified RBAC](/microsoft-365/security/defender/create-custom-rbac-roles).
3333

3434
## Supported actions
3535

36-
The following Defender for Identity actions can be performed directly on your on-premises identities:
36+
The following Defender for Identity actions can be performed on Identities:
3737

38-
- **Disable user in Active Directory**: This will temporarily prevent a user from signing in to the on-premises network. This can help prevent compromised users from moving laterally and attempting to exfiltrate data or further compromise the network.
38+
- **Disable user in Active Directory** - This temporarily prevents a user from signing in to the on-premises network. This can help prevent compromised users from moving laterally and attempting to exfiltrate data or further compromise the network.
3939

40-
- **Reset user password** This will prompt the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts.
40+
- **Reset user password** - This prompts the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts.
4141

42-
- **Mark User Compromised** - The users risk level is set to High
42+
- **Mark User Compromised** - The user's risk level is set to High.
4343

44-
- **Suspend User in Entra ID** - Block new sign-ins and access to cloud resources
44+
- **Suspend User in Entra ID** - Block new sign-ins and access to cloud resources.
4545

46-
- **Require User to Sign In Again** - Revoke a user’s active sessions
46+
- **Require User to Sign In Again** - Revoke a user's active sessions.
47+
48+
- **Suspend User in Okta** - Temporarily disables a user account. This action can be used when a legit user account was found to be compromised and needed to be disabled.
49+
50+
- **Deactivate User in Okta** - This action can be used when a non-legit malicious account was detected, to deactivate the account permanently.
4751

4852
Depending on your Microsoft Entra ID roles, you might see additional Microsoft Entra ID actions, such as requiring users to sign in again and confirming a user as compromised. For more information, see [Remediate risks and unblock users](/entra/id-protection/howto-identity-protection-remediate-unblock).
4953

@@ -56,6 +60,8 @@ Depending on your Microsoft Entra ID roles, you might see additional Microsoft E
5660
|Require User to Sign In Again | - Global Administrator <br>|
5761
| Disable/Enable User in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
5862
| Force Password Reset in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
63+
| Suspend User in Okta | A custom role defined with permissions for Response (manage) Or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator|
64+
| Deactivate User in Okta | A custom role defined with permissions for Response (manage) Or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator|
5965

6066

6167
## Related videos

0 commit comments

Comments
 (0)