Skip to content

Commit 3f47a66

Browse files
Merge branch 'main' into repo_sync_working_branch
2 parents 2f54fad + d8a6b97 commit 3f47a66

File tree

6 files changed

+63
-92
lines changed

6 files changed

+63
-92
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 6 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,12 @@ ms.topic: how-to
77

88
# Activate Microsoft Defender for Identity capabilities directly on a domain controller
99

10-
Microsoft Defender for Endpoint customers, who've already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
10+
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
1111

1212
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
1313

1414
> [!IMPORTANT]
15-
> Information in this article relates to a feature that is currently in limited availablility for a select set of use cases. If you weren't directed to use the Defender for Identity **Activation** page, use our [main deployment guide](deploy-defender-identity.md) instead.
16-
>
15+
> Information in this article relates to a feature that is currently in limited availability for a select set of use cases. If you weren't directed to use the Defender for Identity **Activation** page, use our [main deployment guide](deploy-defender-identity.md) instead.
1716
1817
## Prerequisites
1918

@@ -122,7 +121,7 @@ In the Defender portal, check for the following details:
122121

123122
- **Device entities**: Select **Assets > Devices**, and select the machine for your new sensor. Defender for Identity events are shown on the device timeline.
124123

125-
- **User entities**. Select **Assets > Users** and check for users from a newly onboarded domain. Alternately, use the global search option to search for specific users. User details pages should include **Overview**, **Observed in organization**, and **Timeline** data.
124+
- **User entities**: Select **Assets > Users** and check for users from a newly onboarded domain. Alternately, use the global search option to search for specific users. User details pages should include **Overview**, **Observed in organization**, and **Timeline** data.
126125

127126
- **Group entities**: Use the global search to find a user group, or pivot from a user or device details page where group details are shown. Check for details of group membership, view group users, and group timeline data.
128127

@@ -148,16 +147,7 @@ IdentityQueryEvents
148147
For more information, see [Advanced hunting in the Microsoft Defender portal](/microsoft-365/security/defender/advanced-hunting-microsoft-defender).
149148

150149

151-
### Test Identity Security Posture Management (ISPM) recommendations
152-
153-
Defender for Identity capabilities on domain controllers support the following ISPM assessments:
154-
155-
- [**Install Defender for Identity Sensor on all Domain Controllers**](../security-assessment-unmonitored-domain-controller.md)
156-
- [**Microsoft LAPS usage**](../security-assessment-laps.md)
157-
- [**Resolve unsecure domain configurations**](../security-assessment-unsecure-domain-configurations.md)
158-
- **Set a honeytoken account**
159-
- [**Unsecure account attributes**](../security-assessment-unsecure-account-attributes.md)
160-
- [**Unsecure SID History attributes**](../security-assessment-unsecure-sid-history-attribute.md)
150+
## Test Identity Security Posture Management (ISPM) recommendations
161151

162152
We recommend simulating risky behavior in a test environment to trigger supported assessments and verify that they appear as expected. For example:
163153

@@ -187,37 +177,6 @@ For more information, see [Microsoft Defender for Identity's security posture as
187177
188178
### Test alert functionality
189179
190-
The following alerts are supported by Defender for Identity capabilities on domain controllers:
191-
192-
:::row:::
193-
:::column span="":::
194-
- [Account enumeration reconnaissance](../reconnaissance-discovery-alerts.md#account-enumeration-reconnaissance-external-id-2003)
195-
- [Active Directory attributes Reconnaissance using LDAP](../reconnaissance-discovery-alerts.md#active-directory-attributes-reconnaissance-ldap-external-id-2210)
196-
- [Exchange Server Remote Code Execution (CVE-2021-26855)](../lateral-movement-alerts.md#exchange-server-remote-code-execution-cve-2021-26855-external-id-2414)
197-
- [Honeytoken user attributes modified](../persistence-privilege-escalation-alerts.md#honeytoken-user-attributes-modified-external-id-2427)
198-
- [Honeytoken was queried via LDAP](../reconnaissance-discovery-alerts.md#honeytoken-was-queried-via-ldap-external-id-2429)
199-
- [Honeytoken authentication activity](../credential-access-alerts.md#honeytoken-authentication-activity-external-id-2014)
200-
- [Honeytoken group membership changed](../persistence-privilege-escalation-alerts.md#honeytoken-group-membership-changed-external-id-2428)
201-
- [Remote code execution attempt](../other-alerts.md#remote-code-execution-attempt-external-id-2019)
202-
- [Security principal reconnaissance (LDAP)](../credential-access-alerts.md#security-principal-reconnaissance-ldap-external-id-2038)
203-
- [Suspicious service creation](../other-alerts.md#suspicious-service-creation-external-id-2026)
204-
- [Suspected NTLM relay attack (Exchange account)](../lateral-movement-alerts.md#suspected-ntlm-relay-attack-exchange-account-external-id-2037)
205-
:::column-end:::
206-
:::column span="":::
207-
- [Suspicious modification of the Resource Based Constrained Delegation attribute by a machine account](../persistence-privilege-escalation-alerts.md#suspicious-modification-of-the-resource-based-constrained-delegation-attribute-by-a-machine-account--external-id-2423)
208-
- [Suspicious additions to sensitive groups](../persistence-privilege-escalation-alerts.md#suspicious-additions-to-sensitive-groups-external-id-2024)
209-
- [Suspicious modification of a dNSHostName attribute (CVE-2022-26923)](../persistence-privilege-escalation-alerts.md#suspicious-modification-of-a-dnshostname-attribute-cve-2022-26923--external-id-2421)
210-
- [Suspicious modification of a sAMNameAccount attribute (CVE-2021-42278 and CVE-2021-42287)](../credential-access-alerts.md#suspicious-modification-of-a-samnameaccount-attribute-cve-2021-42278-and-cve-2021-42287-exploitation-external-id-2419)
211-
- [Suspected DCShadow attack (domain controller promotion)](../other-alerts.md#suspected-dcshadow-attack-domain-controller-promotion-external-id-2028)
212-
- [Suspected DFSCoerce attack using Distributed File System Protocol](../credential-access-alerts.md#suspected-dfscoerce-attack-using-distributed-file-system-protocol-external-id-2426) 
213-
- [Suspected DCShadow attack (domain controller replication request)](../other-alerts.md#suspected-dcshadow-attack-domain-controller-replication-request-external-id-2029)
214-
- [Suspected account takeover using shadow credentials](../credential-access-alerts.md#suspected-account-takeover-using-shadow-credentials-external-id-2431)
215-
- [Suspected SID-History injection](../persistence-privilege-escalation-alerts.md#suspected-sid-history-injection-external-id-1106)
216-
- [Suspected AD FS DKM key read](../credential-access-alerts.md#suspected-ad-fs-dkm-key-read-external-id-2413)
217-
:::column-end:::
218-
:::row-end:::
219-
220-
221180
Test alert functionality by simulating risky activity in a test environment. For example:
222181
223182
- Tag an account as a honeytoken account, and then try signing in to the honeytoken account against the activated domain controller.
@@ -232,16 +191,12 @@ Test remediation actions on a test user. For example:
232191
233192
1. In the Defender portal, go to the user details page for a test user.
234193
235-
1. From the options menu, select any or all of the following, one at a time:
236-
237-
- **Disable user in AD**
238-
- **Enable user in AD**
239-
- **Force password reset**
194+
1. From the **Options** menu, select any of the available remediation actions.
240195
241196
1. Check Active Directory for the expected activity.
242197
243198
> [!NOTE]
244-
> The current version does not collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
199+
> The current version doesn't collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
245200
246201
247202
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).

CloudAppSecurityDocs/release-notes.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,17 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
2121

2222
## February 2025
2323

24+
### Enhanced alert source accuracy
25+
26+
Microsoft Defender for Cloud Apps is enhancing its alert sources to deliver more precise information. This update, applicable to new alerts only, will be reflected across various experiences and APIs, including the Defender XDR portal, Advanced hunting, and Graph API.
27+
The goal is to improve the accuracy of alert origins, facilitating better identification, management, and response to alerts.
28+
29+
To learn more about the different alert sources in Defender XDR see the _Alert sources_ section of [Investigate alerts in Microsoft Defender XDR - Microsoft Defender XDR | Microsoft Learn](/defender-xdr/investigate-alerts?tabs=settings)
30+
31+
To learn more about the Graph API alert resource: [alert resource type - Microsoft Graph v1.0 | Microsoft Learn](/graph/api/resources/security-alert?view=graph-rest-1.0)
32+
33+
### Network requirement updates
34+
2435
Due to improvements being made to Microsoft Defender for Cloud Apps to improve security and performance, you must update network information in your system's firewall and additional third-party services. Make these changes by March 16, 2025 to ensure uninterrupted access to our services:
2536

2637
- Update your firewall rules to allow outbound traffic on port 443 to the following new CDN (Content Delivery Network) endpoints before March 16, 2025:
@@ -128,7 +139,7 @@ Administrators who understand the power of Edge in-browser protection, can now r
128139

129140
A primary reason is security, since the barrier to circumventing session controls using Edge is much higher than with reverse proxy technology.
130141

131-
For more information see [Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps).
142+
For more information, see [Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps).
132143

133144
### Connect Mural to Defender for Cloud Apps (Preview)
134145

0 commit comments

Comments
 (0)