Skip to content

Commit 3c6daa3

Browse files
Merge pull request #4969 from MicrosoftDocs/main
[AutoPublish] main to live - 09/08 10:29 PDT | 09/08 22:59 IST
2 parents 5ecd7ca + 5a4f667 commit 3c6daa3

9 files changed

+106
-41
lines changed

ATPDocs/change-password-krbtgt-account.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,9 @@ If the KRBTGT account's password is compromised, an attacker can use its hash to
2929
1. Take appropriate action on those accounts by resetting their password **twice** to invalidate the Golden Ticket attack. 
3030

3131
> [!NOTE]
32-
> The krbtgt Kerberos account in all Active Directory domains supports key storage in all Kerberos Key Distribution Centers (KDC). To renew the Kerberos keys for TGT encryption, periodically change the krbtgt account password. It is recommended to use the [Microsoft-provided script.](https://github.com/microsoft/New-KrbtgtKeys.ps1)
32+
> The krbtgt Kerberos account in all Active Directory domains supports key storage in all Kerberos Key Distribution Centers (KDC). To renew the Kerberos keys for TGT encryption, periodically change the krbtgt account password. It is recommended to use the [Microsoft-provided script.](https://github.com/microsoft/New-KrbtgtKeys.ps1)
33+
> When resetting the password twice, wait at least 10 hours between resets to avoid Kerberos authentication issues. This wait time is enforced by the script and aligns with best practices.
34+
3335
### Next steps
3436

3537
[Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)

ATPDocs/whats-new.md

Lines changed: 29 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,22 +25,46 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## September 2025
2727

28+
### Updates to multiple detections to reduce noise and improve alert accuracy
29+
30+
Several Defender for Identity detections are being updated to reduce noise and improve accuracy, making alerts more reliable and actionable. As the rollout continues, you may see a decrease in the number of alerts raised.
31+
32+
The improvements will gradually take effect across the following detections:
33+
34+
- Suspicious communication over DNS
35+
36+
- Suspected Netlogon privilege elevation attempt (CVE-2020-1472)
37+
38+
- Honeytoken authentication activity
39+
40+
- Remote code execution attempt over DNS
41+
42+
- Suspicious password reset by Microsoft Entra Connect account
43+
44+
- Data exfiltration over SMB
45+
46+
- Suspected skeleton key attack (encryption downgrade)
47+
48+
- Suspicious modification of Resource Based Constrained Delegation by a machine account
49+
50+
- Remote code execution attempt
51+
2852
### Unified connectors is now available for Okta Single Sign-On connectors (Preview)
2953

3054
Microsoft Defender for Identity supports the [Unified connectors](/azure/sentinel/unified-connector) experience, starting with the Okta Single Sign-On connector. This enables Defender for Identity to collect Okta system logs once and share them across supported Microsoft security products, reducing API usage and improving connector efficiency.
3155

32-
For more information see: [Connect Okta to Microsoft Defender for Identity (Preview)](okta-integration.md)
56+
For more information, see: [Connect Okta to Microsoft Defender for Identity (Preview)](okta-integration.md)
3357

3458

3559
## August 2025
3660

3761
### Microsoft Entra ID risk level is now available in near real time in Microsoft Defender for Identity (Preview)
3862

39-
Entra ID risk level is now available on the Identity Inventory assets page, the identity details page, and in the IdentityInfo table in Advanced Hunting, and includes the Entra ID risk score. SOC analysts can use this data to correlate risky users with sensitive or highly privileged users, create custom detections based on current or historical user risk, and improve investigation context.
63+
Microsoft Entra ID risk level is now available on the Identity Inventory assets page, the identity details page, and in the IdentityInfo table in Advanced Hunting, and includes the Microsoft Entra ID risk score. SOC analysts can use this data to correlate risky users with sensitive or highly privileged users, create custom detections based on current or historical user risk, and improve investigation context.
4064

41-
Previously, Defender for Identity tenants received Entra ID risk level in the IdentityInfo table through user and entity behavior analytics (UEBA). With this update, the Entra ID risk level is now updated in near real time through Microsoft Defender for Identity.
65+
Previously, Defender for Identity tenants received Microsoft Entra ID risk level in the IdentityInfo table through user and entity behavior analytics (UEBA). With this update, the Microsoft Entra ID risk level is now updated in near real time through Microsoft Defender for Identity.
4266

43-
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Entra ID risk level to the IdentityInfo table remains unchanged.
67+
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Microsoft Entra ID risk level to the IdentityInfo table remains unchanged.
4468

4569
### New security assessment: Remove stale service accounts (Preview)
4670

@@ -478,7 +502,7 @@ Defender for Identity added the new **Edit insecure ADCS certificate enrollment
478502

479503
Active Directory Certificate Services (AD CS) supports certificate enrollment through various methods and protocols, including enrollment via HTTP using the Certificate Enrollment Service (CES) or the Web Enrollment interface (Certsrv). Insecure configurations of the CES or Certsrv IIS endpoints might create vulnerabilities to relay attacks (ESC8).
480504

481-
The new **Edit insecure ADCS certificate enrollment IIS endpoints (ESC8)** recommendation is added to other AD CS-related recommendations recently released. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that post risks to the entire organization, together with related detections.
505+
The new **Edit insecure ADCS certificate enrollment IIS endpoints (ESC8)** recommendation is added to other AD CS-related recommendations recently released. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that pose risks to the entire organization, together with related detections.
482506

483507
For more information, see:
484508

defender-office-365/mdo-support-teams-about.md

Lines changed: 19 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,40 +16,51 @@ ms.collection:
1616
- tier1
1717
description: Admins can learn about Microsoft Teams features in Microsoft Defender for Office 365.
1818
ms.service: defender-office-365
19-
ms.date: 08/18/2025
19+
ms.date: 09/03/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2323
---
2424

2525
# Microsoft Defender for Office 365 support for Microsoft Teams
2626

27-
[!include[Prerelease information](../includes/prerelease.md)]
27+
[!INCLUDE [Prerelease information](../includes/prerelease.md)]
2828

2929
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
3030

31-
With the increased use of collaboration tools like Microsoft Teams, the possibility of malicious attacks using chat messages has also increased. Microsoft Defender for Office 365 already provides the following Teams protection features:
31+
With the increased use of collaboration tools like Microsoft Teams, the possibility of malicious attacks using chat messages has also increased.
32+
33+
All licenses of Microsoft Teams in Microsoft 365 include the following built-in protections:
34+
35+
- [Built-in virus protection in SharePoint, SharePoint Embedded, OneDrive, and Microsoft Teams](anti-malware-protection-for-spo-odfb-teams-about.md)
36+
- **Near real-time URL protection in Teams messages (currently in Preview)**: Known, malicious URLs in Teams messages are delivered with a warning. Messages found to contain malicious URLs up to 48 hours after delivery also receive a warning. The warning is added to messages in internal and external chats and teams for all URL verdicts (not just malware or high confidence phishing).
37+
38+
:::image type="content" source="media/teams-message-url-warning.png" alt-text="Screenshot showing a Microsoft Teams message with a URL warning." lightbox="media/teams-message-url-warning.png":::
39+
40+
To turn this feature off or on, see [Verify warnings for unsafe links are shown in Microsoft Teams messages](mdo-support-teams-quick-configure.md#step-3-verify-warnings-for-unsafe-links-are-shown-in-microsoft-teams-messages).
41+
42+
Microsoft Defender for Office 365 provides the following extra Teams protection features:
3243

3344
- Time of click protection for URLs and files in Teams messages through [Safe Links for Microsoft Teams](safe-links-about.md#safe-links-settings-for-microsoft-teams) and [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).
3445
- Allow/block [domains](tenant-allow-block-list-teams-domains-configure.md), [URLs](tenant-allow-block-list-urls-configure.md) and [files](tenant-allow-block-list-files-configure.md) inside Teams using the Tenant Allow Block List.
3546

36-
In Microsoft 365 E5 and Defender for Office 365 Plan 2, we've extended Teams protection with a set of capabilities that are designed to disrupt the attack chain:
47+
Microsoft 365 E5 and Defender for Office 365 Plan 2 extend Teams protection with a set of extra capabilities designed to disrupt the attack chain:
3748

3849
- **Report suspicious Teams messages**: Users can report malicious Teams messages. Depending on the reported message settings in the organization, the reported messages go to the specified reporting mailbox, to Microsoft, or both. For more information, see [User reported settings in Teams](submissions-teams.md).
3950

4051
- **Zero-hour auto protection (ZAP) for Teams**: ZAP is an existing email protection feature that detects and neutralizes spam, phishing, and malware messages after delivery by moving the messages to the Junk Email folder or quarantine.
4152

42-
ZAP for Teams quarantines messages in Teams chats or channels that are found to be malware or high confidence phishing. For more information, see [Zero-hour auto purge (ZAP) in Microsoft Teams](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-in-microsoft-teams).
53+
ZAP for Teams quarantines messages in internal Teams chats or channels that are found to be malware or high confidence phishing. For more information, see [Zero-hour auto purge (ZAP) in Microsoft Teams](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-in-microsoft-teams).
4354

4455
Instructions to configure ZAP for Teams protection are in the next section.
4556

46-
- **Teams messages in quarantine**: As with email messages that are identified as malware or high confidence phishing, only admins are able to manage Teams messages that are quarantined by ZAP for Teams by default. For more information, see [Manage quarantined Teams messages](quarantine-admin-manage-messages-files.md#use-the-microsoft-defender-portal-to-manage-microsoft-teams-quarantined-messages).
57+
- **Teams messages in quarantine**: By default, only admins are allowed to manage Teams messages quarantined by ZAP for Teams. This is the same default limitation for email messages identified as malware or high confidence phishing. For more information, see [Manage quarantined Teams messages](quarantine-admin-manage-messages-files.md#use-the-microsoft-defender-portal-to-manage-microsoft-teams-quarantined-messages).
4758

48-
- The **Teams message entity panel** is a single place to store all Teams message metadata for immediate SecOps review. Any threats coming from Teams chats, group chats, meeting chats, and other channels can be found in one place as soon as they're assessed. For more information, see [The Teams message entity panel in Microsoft Defender for Office 365 Plan 2](teams-message-entity-panel.md).
59+
- **Teams message entity panel**: A single place to store all Teams message metadata for immediate SecOps review. Any threats coming from Teams chats, group chats, meeting chats, and other channels can be found in one place as soon as they're assessed. For more information, see [The Teams message entity panel in Microsoft Defender for Office 365 Plan 2](teams-message-entity-panel.md).
4960

5061
- **Attack simulation training using Teams messages**: To ensure users are resilient to phishing attacks in Microsoft Teams, admins can configure phishing simulations using Teams messages instead of email messages. For more information, see [Microsoft Teams in Attack simulation training](attack-simulation-training-teams.md).
5162

52-
- **Hunting on Teams messages with URLs**: You can now hunt on Teams messages containing URL across three new advanced hunting tables: [MessageEvents](/defender-xdr/advanced-hunting-messageevents-table), [MessagePostDeliveryEvents](/defender-xdr/advanced-hunting-messagepostdeliveryevents-table), and [MessageURLInfo](/defender-xdr/advanced-hunting-messageurlinfo-table).
63+
- **Hunting on Teams messages with URLs**: You can hunt for Teams messages containing URL across three new advanced hunting tables: [MessageEvents](/defender-xdr/advanced-hunting-messageevents-table), [MessagePostDeliveryEvents](/defender-xdr/advanced-hunting-messagepostdeliveryevents-table), and [MessageURLInfo](/defender-xdr/advanced-hunting-messageurlinfo-table).
5364

5465
## Configure ZAP for Teams protection in Defender for Office 365 Plan 2
5566

defender-office-365/mdo-support-teams-quick-configure.md

Lines changed: 24 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
22
title: Quickly configure Microsoft Teams protection in Microsoft Defender for Office 365 Plan 2
3-
f1.keywords:
3+
f1.keywords:
44
- NOCSH
55
author: chrisda
66
ms.author: chrisda
77
manager: bagol
88
audience: Admin
99
ms.topic: overview
1010
ms.localizationpriority: medium
11-
search.appverid:
11+
search.appverid:
1212
- MET150
1313
- MOE150
14-
ms.collection:
14+
ms.collection:
1515
- m365-security
1616
- tier1
1717
description: Admins who aren't using Microsoft Defender for Office 365 can learn how to quickly set up protection in Microsoft Teams.
@@ -21,7 +21,7 @@ appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2222
---
2323

24-
# Quickly configure Microsoft Teams protection in Microsoft Defender for Office 365
24+
# Quickly configure Microsoft Teams protection in Microsoft Defender for Office 365
2525

2626
Even if you aren't using Microsoft Defender for Office 365 for email protection, you can still use it for Microsoft Teams protection.
2727

@@ -77,7 +77,25 @@ For complete instructions, see [Use the Microsoft Defender portal to modify cust
7777
> [!TIP]
7878
> Teams integration is on in the [Built-in protection preset security policy](preset-security-policies.md), but any other Safe Links policies [take precedence](preset-security-policies.md#order-of-precedence-for-preset-security-policies-and-other-threat-policies) over the Built-in protection preset security policy (as shown in the order they're listed on the **Safe Links** page).
7979
80-
## Step 3: Defender for Office 365 Plan 2: Verify Zero-hour auto purge (ZAP) for Microsoft Teams
80+
## Step 3: Verify warnings for unsafe links are shown in Microsoft Teams messages
81+
82+
> [!NOTE]
83+
> Currently, this feature is in Preview, isn't available in all organizations, and is subject to change.
84+
85+
You need to be assigned permissions before you can do the following procedure. Specifically, you need to be a member of the **Teams Administrator** or **Global Administrator**<sup>\*</sup> roles in [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal).
86+
87+
> [!IMPORTANT]
88+
> <sup>\*</sup> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role.
89+
90+
For more information about near real-time warning messages on known bad links in Microsoft Teams messages, see [Microsoft Defender for Office 365 support for Microsoft Teams](mdo-support-teams-about.md).
91+
92+
1. In the Microsoft Teams admin center, go to the **Message settings** page at <https://admin.teams.microsoft.com/messaging/settings>.
93+
94+
2. On the **Message settings** page, go to the **Messaging safety** section and verify the **Scan messages for unsafe links** toggle is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
95+
96+
:::image type="content" source="media/teams-message-url-warning-on-off.png" alt-text="Screenshot of the Scan messages for unsafe links toggle in the Microsoft Teams admin center." lightbox="media/teams-message-url-warning-on-off.png":::
97+
98+
## Step 4: Defender for Office 365 Plan 2: Verify Zero-hour auto purge (ZAP) for Microsoft Teams
8199

82100
For complete instructions, see [Configure ZAP for Teams protection in Defender for Office 365 Plan 2](mdo-support-teams-about.md#configure-zap-for-teams-protection-in-defender-for-office-365-plan-2).
83101

@@ -90,7 +108,7 @@ For complete instructions, see [Configure ZAP for Teams protection in Defender f
90108
> [!TIP]
91109
> When ZAP for Microsoft Teams is turned on, you can use **Exclude these participants** on the **Microsoft Teams protection** page to exclude users from Teams protection. For more information, see [Configure ZAP for Teams protection in Defender for Office 365 Plan 2](mdo-support-teams-about.md#configure-zap-for-teams-protection-in-defender-for-office-365-plan-2).
92110
93-
## Step 4: Defender for Office 365 Plan 2: Configure user reported settings for Microsoft Teams
111+
## Step 5: Defender for Office 365 Plan 2: Configure user reported settings for Microsoft Teams
94112

95113
For complete instructions, see [User reported message settings in Microsoft Teams](submissions-teams.md).
96114

116 KB
Loading
78.8 KB
Loading

0 commit comments

Comments
 (0)