Skip to content

Commit 468670b

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into respond-overview
2 parents 2efa5a6 + ebe1aa9 commit 468670b

File tree

140 files changed

+1253
-1240
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

140 files changed

+1253
-1240
lines changed

.openpublishing.redirection.defender-office-365.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,16 @@
4949
"source_path": "defender-office-365/pilot-deploy-defender-office-365.md",
5050
"redirect_url": "/defender-xdr/pilot-deploy-defender-office-365",
5151
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "defender-office-365/submissions-error-messages.md",
55+
"redirect_url": "/defender-office-365/submissions-result-definitions",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "defender-office-365/step-by-step-guides/deploy-and-configure-the-report-message-add-in.md",
60+
"redirect_url": "/defender-office-365/submissions-outlook-report-messages",
61+
"redirect_document_id": false
5262
}
5363
]
5464
}

ATPDocs/deploy/activate-capabilities.md

Lines changed: 27 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Microsoft Defender for Endpoint customers, who have already onboarded their doma
1212
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
1313

1414
> [!IMPORTANT]
15-
> Information in this article relates to a feature that is currently in limited availability for a select set of use cases. If you weren't directed to use the Defender for Identity **Activation** page, use our [main deployment guide](deploy-defender-identity.md) instead.
15+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](quick-installation-guide.md).
1616
1717
## Prerequisites
1818

@@ -29,10 +29,8 @@ Make sure that the domain controller where you're planning to activate Defender
2929

3030
Direct Defender for Identity capabilities are supported on domain controllers only, using the one of the following operating systems:
3131

32-
- Windows Server 2019
33-
- Windows Server 2022
34-
35-
You must also have the [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) installed.
32+
- Windows Server 2019 or above
33+
- [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) or later
3634

3735
> [!IMPORTANT]
3836
>After installing the March 2024 Cumulative Update, LSASS might experience a memory leak on domain controllers when on-premises and cloud-based Active Directory Domain Controllers service Kerberos authentication requests.
@@ -45,7 +43,7 @@ Your domain controller must be onboarded to Microsoft Defender for Endpoint.
4543

4644
For more information, see [Onboard a Windows server](/microsoft-365/security/defender-endpoint/onboard-windows-server).
4745

48-
### Required permissions
46+
### Permissions requirements
4947

5048
To access the Defender for Identity **Activation** page, you must either be a [Security Administrator](/entra/identity/role-based-access-control/permissions-reference), or have the following Unified RBAC permissions:
5149

@@ -82,15 +80,31 @@ Set-MDIConfiguration -Mode Domain -Configuration All
8280

8381
## Activate Defender for Identity capabilities
8482

85-
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
83+
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
84+
85+
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
86+
87+
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
88+
89+
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
90+
91+
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
92+
93+
> [!NOTE]
94+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
8695
87-
1. In the [Defender portal](https://security.microsoft.com), select **Settings > Identities > [Activation](https://security.microsoft.com/settings/identities?tabid=onboarding)**.
96+
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
8897

89-
The **Activation** page lists any detected and eligible domain controllers.
98+
## Onboarding Confirmation
9099

91-
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
100+
To confirm the sensor has been onboarded:
92101

93-
When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
102+
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
103+
104+
2. Check that the onboarded domain controller is listed.
105+
106+
> [!NOTE]
107+
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
94108
95109
## Test activated capabilities
96110

@@ -108,9 +122,9 @@ Use the following procedures to test your environment for Defender for Identity
108122

109123
### Check the ITDR dashboard
110124

111-
In the Defender portal, select **Identities > Dashboard** and review the details shown, checking for expected results from your environment.
125+
In the Defender portal, select **Identities** > **Dashboard**, and review the details shown, checking for expected results from your environment.
112126

113-
For more information, see [Work with Defender for Identity's ITDR dashboard (Preview)](../dashboard.md).
127+
For more information, see [Work with Defender for Identity's ITDR dashboard](../dashboard.md).
114128

115129

116130
### Confirm entity page details
@@ -195,10 +209,6 @@ Test remediation actions on a test user. For example:
195209
196210
1. Check Active Directory for the expected activity.
197211
198-
> [!NOTE]
199-
> The current version doesn't collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
200-
201-
202212
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
203213
204214
## Deactivate Defender for Identity capabilities on your domain controller

ATPDocs/deploy/configure-windows-event-collection.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -328,7 +328,7 @@ To configure auditing on Microsoft Entra Connect servers:
328328
<a name="enable-auditing-on-an-exchange-object"></a>
329329
330330
>[!NOTE]
331-
> The configuration container audit is requried only for environments that currently have or previously had Microsoft Exchange, as these environments have an Exchange container located within the domain's Configuration section.
331+
> The configuration container audit is required only for environments that currently have or previously had Microsoft Exchange, as these environments have an Exchange container located within the domain's Configuration section.
332332
333333
**Related health issue:** [Auditing on the Configuration container is not enabled as required](../health-alerts.md#auditing-on-the-configuration-container-is-not-enabled-as-required)
334334
@@ -340,6 +340,8 @@ To configure auditing on Microsoft Entra Connect servers:
340340
341341
1. Expand the **Configuration** container to show the **Configuration** node, which begins with **"CN=Configuration,DC=..."**.
342342
343+
:::image type="content" source="../media/cn-configuration.png" alt-text="Screenshot of selections for opening properties for the CN Configuration node.":::
344+
343345
1. Right-click the **Configuration** node and select **Properties**.
344346
345347
![Screenshot of selections for opening properties for the Configuration node.](../media/configuration-properties.png)

ATPDocs/deploy/deploy-defender-identity.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,17 @@ Use the following steps to prepare for deploying Defender for Identity:
5353
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if the servers in your environment have the necessary prerequisites.
5454
> You can use the [DefenderForIdentity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/) to add the required auditing and configure the necessary settings.
5555
56-
## Deploy Defender for Identity
56+
> [!IMPORTANT]
57+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
58+
59+
## Deploy Defender for Identity classic sensor
5760

5861
After you've prepared your system, use the following steps to deploy Defender for Identity:
5962

6063
1. [Verify connectivity to the Defender for Identity service](configure-proxy.md).
61-
1. [Download the Defender for Identity sensor](download-sensor.md).
62-
1. [Install the Defender for Identity sensor](install-sensor.md).
63-
1. [Configure the Defender for Identity sensor](configure-sensor-settings.md) to start receiving data.
64+
1. [Download the Defender for Identity classic sensor](download-sensor.md).
65+
1. [Install the Defender for Identity classic sensor](install-sensor.md).
66+
1. [Configure the Defender for Identity classic sensor](configure-sensor-settings.md) to start receiving data.
6467

6568
## Post-deployment configuration
6669

ATPDocs/deploy/download-sensor.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,12 @@ ms.date: 06/13/2023
55
ms.topic: how-to
66
---
77

8-
# Download the Microsoft Defender for Identity sensor
8+
# Download the Microsoft Defender for Identity classic sensor
99

10-
This article describes how to download the Microsoft Defender for Identity sensor for your domain controllers or AD CS / AD FS servers.
10+
This article describes how to download the Microsoft Defender for Identity classic sensor for your domain controllers or AD CS / AD FS and Entra Connect servers.
11+
12+
> [!IMPORTANT]
13+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
1114
1215
## Add a sensor and download sensor software
1316

@@ -17,7 +20,7 @@ This article describes how to download the Microsoft Defender for Identity senso
1720

1821
[![Screenshot of the Sensors tab.](../media//sensor-page.png)](../media/sensor-page.png#lightbox)
1922

20-
1. Select **Add sensor**. Then, in the **Add a new sensor** pane, select **Download installer** and save the installation package locally. The downloaded zip file includes the following files:
23+
1. Select **Add sensor**. Then, in the **Add a new sensor** pane, select **Download installer**, and save the installation package locally. The downloaded zip file includes the following files:
2124

2225
- The Defender for Identity sensor installer
2326

ATPDocs/deploy/event-collection-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The following event is required for Microsoft Entra Connect servers:
5050

5151
- 4624: An account was successfully logged on
5252

53-
For more information, see [Configure auditing on Microsoft Entra Connect](../configure-windows-event-collection.md#configure-auditing-for-entra-connect).
53+
For more information, see [Configure auditing on Microsoft Entra Connect](../configure-windows-event-collection.md#configure-auditing-on-microsoft-entra-connect).
5454

5555
### Other required Windows events
5656

ATPDocs/deploy/install-sensor.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,10 @@ ms.topic: how-to
77

88
# Install a Microsoft Defender for Identity sensor
99

10-
This article describes how to install a Microsoft Defender for Identity sensor, including a standalone sensor. The default recommendation is to use the UI. However:
10+
> [!IMPORTANT]
11+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
12+
13+
This article describes how to install a Microsoft Defender for Identity classic sensor, including a standalone sensor. The default recommendation is to use the UI. However:
1114

1215
- When you're installing the sensor on Windows Server Core, or to deploy the sensor via a software deployment system, follow the steps for [silent installation](#perform-a-defender-for-identity-silent-installation) instead.
1316

@@ -29,9 +32,9 @@ Before you start, make sure that you have:
2932

3033
- Trusted root certificates on your machine. If your trusted root CA-signed certificates are missing, [you might receive a connection error](../troubleshooting-known-issues.md#proxy-authentication-problem-presents-as-a-connection-error).
3134

32-
## Install the sensor by using the UI
35+
## Install the classic sensor by using the UI
3336

34-
Perform the following steps on the domain controller, Active Directory Federation Services (AD FS) server, or Active Directory Certificate Services (AD CS) server.
37+
Perform the following steps on the domain controller, Active Directory Federation Services (AD FS) server, Active Directory Certificate Services (AD CS) server or Entra Connect server.
3538

3639
1. Verify that the machine has connectivity to the relevant [Defender for Identity cloud service endpoints](configure-proxy.md#enable-access-to-defender-for-identity-service-urls-in-the-proxy-server).
3740

55 KB
Loading
49.7 KB
Loading
37.7 KB
Loading

0 commit comments

Comments
 (0)