Skip to content

Commit 4569d1d

Browse files
authored
Fixed typos and alignment
1 parent 0f4ea67 commit 4569d1d

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

defender-for-identity/whats-new.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,8 @@ For more information, see: [Link or Unlink an Account to an Identity (Preview)](
4343

4444
You can now perform remediation actions such as disabling accounts or resetting passwords on one or more accounts linked to an identity. For more information, see: [Remediation actions](remediation-actions.md#roles-and-permissions).
4545
Defender for Identity now offers an opt-in automatic event-auditing configuration for unified sensors (V3.x). This feature streamlines deployment by automatically applying required Windows auditing settings to new sensors and fixing misconfigurations on existing ones. Admins can enable the option in the Defender for Identity Settings -> Advanced Features or via Graph API. The capability and its related health alerts will roll out globally beginning mid-November 2025.
46-
**Releated Health alerts:**
46+
47+
**Related Health alerts:**
4748
- NTLM Auditing is not enabled
4849
- Directory Services Advanced Auditing is not enabled as required
4950
- Directory Services Object Auditing is not enabled as required
@@ -60,7 +61,7 @@ The new security posture assessment lists users whose valid credentials have bee
6061
|---------|---------|
6162
|2.250|The improved event log query method captures a broader range of unique events at scale. As a result, you might notice an increase in captured activities. This update also includes security and performance improvements.|
6263

63-
### Expansion of identity scoping: upport for Organizational units (Preview)
64+
### Expansion of identity scoping: Support for Organizational units (Preview)
6465

6566
In addition to the GA release of scoping by Active Directory domains a few months ago, you can now scope by **Organizational Units (OUs)** as part of XDR User Role-Based Access Control (URBAC). This enhancement provides even more granular control over which entities and resources are included in security analysis.
6667
For more information, see [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
@@ -84,7 +85,7 @@ As part of the ongoing transition to a unified alerting experience across Micros
8485

8586
| Classic Alert Title | External ID| XDR Alert Name |Detector ID|
8687
|--------------------|------------|----------------|-----------|
87-
|Active Directory attributes Reconnnaissance using LDAP|2210|[Active Directory attributes Reconnnaissance using LDAP](alerts-xdr.md#active-directory-attributes-reconnaissance-ldap)|xdr_LdapSensitiveAttributeRecon|
88+
|Active Directory attributes Reconnaissance using LDAP|2210|[Active Directory attributes Reconnaissance using LDAP](alerts-xdr.md#active-directory-attributes-reconnaissance-ldap)|xdr_LdapSensitiveAttributeRecon|
8889
|User and IP address reconnaissance|2012|[User and IP address reconnaissance (SMB)](alerts-xdr.md#user-and-ip-address-reconnaissance-smb)|xdr_SmbSessionEnumeration|
8990
|Account enumeration reconnaissance|2003|[Account enumeration reconnaissance in AD FS](alerts-xdr.md#account-enumeration-reconnaissance-in-ad-fs)|xdr_AccountEnumerationHintSecurityAlertAdfs|
9091
| | |[Account enumeration reconnaissance in Kerberos](alerts-xdr.md#account-enumeration-reconnaissance-in-kerberos)|xdr_AccountEnumerationHintSecurityAlertKerberos|

0 commit comments

Comments
 (0)