Skip to content

Commit 426d75e

Browse files
Merge branch 'main' into patch-20
2 parents cdf50df + 84b69f3 commit 426d75e

10 files changed

+99
-7
lines changed

ATPDocs/deploy/configure-windows-event-collection.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -235,15 +235,16 @@ To configure domain object auditing:
235235

236236
Now, all relevant changes to directory services appear as 4662 events when they're triggered.
237237

238-
1. Repeat the steps in this procedure, but for **Applies to**, select the following object types:
238+
1. Repeat the steps in this procedure, but for **Applies to**, select the following object types <sup>1</sup>
239239
- **Descendant Group Objects**
240240
- **Descendant Computer Objects**
241241
- **Descendant msDS-GroupManagedServiceAccount Objects**
242242
- **Descendant msDS-ManagedServiceAccount Objects**
243-
- **Descendant msDS-DelegatedManagedServiceAccount Objects**
243+
- **Descendant msDS-DelegatedManagedServiceAccount Objects** <sup>2</sup>
244244

245245
> [!NOTE]
246-
> Assigning the auditing permissions on **All descendant objects** would also work, but you need only the object types detailed in the last step.
246+
> 1. Assigning the auditing permissions on **All descendant objects** would also work, but you need only the object types detailed in the last step.
247+
> 2. The **msDS-DelegatedManagedServiceAccount** class is relevant only for domains running at least one Windows Server 2025 domain controller.
247248
248249
## Configure auditing on AD FS
249250

ATPDocs/identity-inventory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ Sort option applies to Display name, Domain, and Created time columns.
110110

111111
- **Critical Active Directory service accounts** card helps you quickly identify all Active Directory accounts designated as critical, making it easier to focus on identities most at risk.
112112

113-
At the top of each device inventory tab, the following device counts are available:
113+
At the top of the page, the following identities counts are available:
114114

115115
- __Total__: The total number of identities.
116116

@@ -120,7 +120,7 @@ At the top of each device inventory tab, the following device counts are availab
120120

121121
- **Services:** The number of all service accounts both on-premises and cloud.
122122

123-
You can use this information to help you prioritize devices for security posture improvements.
123+
You can use this information to help you prioritize identities for security posture improvements.
124124

125125
### Navigate to the Identity inventory page
126126

ATPDocs/ops-guide/ops-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This article summarizes the Microsoft Defender for Identity activities we recomm
1313

1414
|Cadence |Tasks |
1515
|---------|---------|
16-
|**Daily** | - [Triage incidents by priority](ops-guide-daily.md#triage-incidents-by-priority) <br> - [Investigate users with a high investigation score](ops-guide-daily.md#investigate-users-with-a-high-investigation-score) <br>- [Configure tuning rules for benign true positives / false positive alerts](ops-guide-daily.md#configure-tuning-rules-for-benign-true-positives--false-positive-alerts)<br> - [Review the ITDR dashboard](ops-guide-daily.md#review-the-itdr-dashboard) <br>- [Proactively hunt](ops-guide-daily.md#proactively-hunt) <br> - [Review Defender for Identity health issues](ops-guide-daily.md#review-defender-for-identity-health-issues) |
16+
|**Daily** | - [Triage incidents by priority](ops-guide-daily.md#triage-incidents-by-priority) <br>- [Configure tuning rules for benign true positives / false positive alerts](ops-guide-daily.md#configure-tuning-rules-for-benign-true-positives--false-positive-alerts)<br> - [Review the ITDR dashboard](ops-guide-daily.md#review-the-itdr-dashboard) <br>- [Proactively hunt](ops-guide-daily.md#proactively-hunt) <br> - [Review Defender for Identity health issues](ops-guide-daily.md#review-defender-for-identity-health-issues) |
1717
|**Weekly** |- [Review Secure score recommendations](ops-guide-weekly.md#review-secure-score-recommendations) <br> - [Review and respond to emerging threats](ops-guide-weekly.md#review-and-respond-to-emerging-threats) <br>- [Proactively hunt](ops-guide-weekly.md#proactively-hunt) |
1818
|**Monthly** | - [Review tuned alerts and adjust tuning if needed](ops-guide-monthly.md#review-tuned-alerts-and-adjust-tuning-if-needed) <br> - [Track new changes in Microsoft Defender XDR and Defender for Identity](ops-guide-monthly.md#track-new-changes-in-microsoft-defender-xdr-and-defender-for-identity) |
1919
| **Quarterly / Ad hoc** <br>Depending on your organization's needs and processes | - [Review Microsoft service health](ops-guide-quarterly.md#review-microsoft-service-health) <br> - [Review server setup process to include sensors](ops-guide-quarterly.md#review-server-setup-process-to-include-sensors) <br>- [Check domain configuration via PowerShell](ops-guide-quarterly.md#check-domain-configuration-via-powershell) |

defender-endpoint/manage-protection-updates-microsoft-defender-antivirus.md

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Each source has typical scenarios that depend on how your network is configured,
8181
|---|---|
8282
|Windows Server Update Service|You're using Windows Server Update Service to manage updates for your network.|
8383
|Microsoft Update|You want your endpoints to connect directly to Microsoft Update. This option is useful for endpoints that irregularly connect to your enterprise network, or if you don't use Windows Server Update Service to manage your updates.|
84-
|File share|You have devices that aren't connected to the Internet (such as virtual machines, or VMs). You can use your Internet-connected VM host to download the updates to a network share, from which the VMs can obtain the updates. See the [VDI deployment guide](deployment-vdi-microsoft-defender-antivirus.md) for how file shares are used in virtual desktop infrastructure (VDI) environments.|
84+
|UNC Share|You have devices that aren't connected to the Internet (such as virtual machines, or VMs). You can use your Internet-connected VM host to download the updates to a network share, from which the VMs can obtain the updates. See the [VDI deployment guide](deployment-vdi-microsoft-defender-antivirus.md) for how file shares are used in virtual desktop infrastructure (VDI) environments. Platform updates can also be deployed using this method. |
8585
|Microsoft Endpoint Configuration Manager|You're using Microsoft Endpoint Configuration Manager to update your endpoints.|
8686
|Security intelligence updates and platform updates for Microsoft Defender Antivirus and other Microsoft anti-malware (formerly referred to as MMPC)|[Make sure devices are updated to support SHA-2](https://support.microsoft.com/help/4472027/2019-sha-2-code-signing-support-requirement-for-windows-and-wsus). Microsoft Defender Antivirus Security intelligence and platform updates are delivered through Windows Update. As of October 21, 2019, security intelligence updates and platform updates are SHA-2 signed exclusively. <br/>Download the latest protection updates because of a recent infection or to help provision a strong, base image for [VDI deployment](deployment-vdi-microsoft-defender-antivirus.md). This option should be used only as a final fallback source, and not the primary source. It's only to be used if updates can't be downloaded from Windows Server Update Service or Microsoft Update for [a specified number of days](manage-outdated-endpoints-microsoft-defender-antivirus.md#set-the-number-of-days-before-protection-is-reported-as-out-of-date).|
8787

@@ -274,6 +274,32 @@ On a Windows File Server set up a network file share (UNC/mapped drive) to downl
274274
> [!NOTE]
275275
> Do not add the x64 (or x86) folder in the path. The `mpcmdrun.exe` process adds it automatically.
276276
277+
## Enable platform updates using UNC share
278+
279+
To enable platform updates using UNC share, download KB4052623 and copy it into the architecture folders as `updateplatform.exe`. These files are updated monthly and need to get manually updated by you.
280+
281+
KB4052623 is available for the following architectures:
282+
283+
* [x86](https://go.microsoft.com/fwlink/?LinkID=870379&clcid=0x409&arch=x86)
284+
285+
* [amd64](https://go.microsoft.com/fwlink/?LinkID=870379&clcid=0x409&arch=x64)
286+
287+
* [arm64](https://go.microsoft.com/fwlink/?LinkID=851034&clcid=0x409&arch=arm64)
288+
289+
**Example structure**
290+
291+
```dos
292+
[UNC Share]\
293+
x86\
294+
mpam-fe.exe
295+
mpam-d.exe
296+
updateplatform.exe
297+
x64\
298+
mpam-fe.exe
299+
mpam-d.exe
300+
updateplatform.exe
301+
```
302+
277303
## Related articles
278304

279305
- [Deploy Microsoft Defender Antivirus](deploy-manage-report-microsoft-defender-antivirus.md)

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,7 @@ You can manage the distribution of updates through one of the following methods:
7171
- [Windows Server Update Service (WSUS)](/mem/configmgr/protect/deploy-use/endpoint-definitions-wsus#to-synchronize-endpoint-protection-definition-updates-in-standalone-wsus)
7272
- [Microsoft Configuration Manager](/configmgr/sum/understand/software-updates-introduction)
7373
- The usual methods you use to deploy Microsoft and Windows updates to endpoints in your network.
74+
- UNC Share
7475

7576
For more information, see [Manage the sources for Microsoft Defender Antivirus protection updates](/mem/configmgr/protect/deploy-use/endpoint-definitions-wsus#to-synchronize-endpoint-protection-definition-updates-in-standalone-wsus).
7677

unified-secops-platform/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,9 @@
104104
href: mto-advanced-hunting.md
105105
- name: Multitenant devices
106106
href: mto-tenant-devices.md
107+
- name: Multitenant identities
108+
href: multitenant-identities-inventory.md
109+
displayName: MTO
107110
- name: Vulnerability management
108111
href: mto-dashboard.md
109112
- name: Manage tenants
112 KB
Loading
22.5 KB
Loading
25.7 KB
Loading
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
---
2+
# Required metadata
3+
# For more information, see https://learn.microsoft.com/en-us/help/platform/learn-editor-add-metadata
4+
# For valid values of ms.service, ms.prod, and ms.topic, see https://learn.microsoft.com/en-us/help/platform/metadata-taxonomies
5+
6+
title: Multitenant identities
7+
description: A multi-tenant identity inventory
8+
author: LiorShapiraa
9+
ms.author: liorshapira
10+
ms.service: microsoft-defender-for-identity
11+
ms.topic: article
12+
ms.date: 06/29/2025
13+
---
14+
15+
# Identities
16+
17+
The **Identities** page in multitenant management enables you to quickly manage tenants and identities.
18+
19+
## Identity inventory
20+
21+
The Identity inventory page lists all the identities in each tenant that you have access to. The page is like the [Defender for Identity inventory](/defender-for-identity/identity-inventory) with the addition of the **Tenant name** column and filter.
22+
23+
You can navigate to the identity inventory page by selecting **Assets > Identities** in Microsoft Defender XDR's navigation menu.
24+
25+
:::image type="content" source="media/multitenant-identities-inventory/screenshot-of-inventory.png" alt-text="Screenshot of inventory." lightbox="media/multitenant-identities-inventory/screenshot-of-inventory.png":::
26+
27+
At the top of the page, the following identities counts are available for all tenants:
28+
29+
**Total**: The total number of identities.
30+
31+
**Critical:** The number of your critical assets.
32+
33+
**Disabled:** The number of all disabled identities in your organization.
34+
35+
**Services:** The number of all service accounts both on-premises and cloud.
36+
37+
You can use this information to help you prioritize identities for security posture improvements.
38+
39+
Highly privileged identities card helps you investigate in Advanced hunting all sensitive accounts in your organization, including Microsoft Entra ID security administrators and Global admin users.
40+
41+
There are several options you can choose from to customize the identities list view. On the top navigation you can:
42+
43+
- Add or remove columns.
44+
45+
- Apply filters.
46+
47+
- Search for an identity by name or full UPN, SID, and Object ID.
48+
49+
- Export the list to a CSV file.
50+
51+
- Copy list link with the included filters configured.
52+
53+
> [!NOTE]
54+
> When exporting the identities list to a CSV file, a maximum of 5,000 identities are displayed.
55+
56+
To view full identity details, select a specific identity from the list. Tenant ID and Tenant name are available in the identity side panel and page:
57+
58+
:::image type="content" source="media/multitenant-identities-inventory/screenshot-of-tenant-details-on-identity.png" alt-text="Screenshot of tenant details on identity.":::
59+
60+
61+

0 commit comments

Comments
 (0)