You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/activate-capabilities.md
+19-14Lines changed: 19 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,20 +7,20 @@ ms.topic: how-to
7
7
8
8
# Activate Microsoft Defender for Identity capabilities directly on a domain controller
9
9
10
-
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
10
+
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using [Microsoft Defender for Identity classic sensor](deploy-defender-identity.md).
11
11
12
12
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
13
13
14
14
> [!IMPORTANT]
15
-
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](quick-installation-guide.md).
15
+
> The new Defender for Identity sensor (version 3.x) is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](quick-installation-guide.md).
16
16
17
17
## Prerequisites
18
18
19
19
Before activating the Defender for Identity capabilities on your domain controller, make sure that your environment complies with the prerequisites in this section.
20
20
21
21
### Defender for Identity sensor conflicts
22
22
23
-
The configuration described in this article doesn't support side-by-side installation with an existing Defender for Identity sensor, and isn't recommended as a replacement for the Defender for Identity sensor.
23
+
The configuration described in this article doesn't support side-by-side installation with an existing Defender for Identity sensor, and isn't recommended as a replacement for the Defender for Identity classic sensor.
24
24
25
25
Make sure that the domain controller where you're planning to activate Defender for Identity capabilities doesn't have a [Defender for Identity sensor](deploy-defender-identity.md) deployed.
26
26
@@ -80,20 +80,24 @@ Set-MDIConfiguration -Mode Domain -Configuration All
80
80
81
81
## Activate Defender for Identity capabilities
82
82
83
-
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
83
+
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
84
84
85
85
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
86
86
87
87
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
88
88
89
89
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
90
90
91
-
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
91
+
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
92
+
93
+
:::image type="content" source="media/activate-capabilities/1.jpg" lightbox="media/activate-capabilities/1.jpg" alt-text="Screenshot that shows how to activate the new sensor.":::
92
94
93
95
> [!NOTE]
94
-
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they are discovered, or manually, where you select specific domain controllers from the list of eligible servers.
96
+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
97
+
98
+
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
95
99
96
-
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
100
+
:::image type="content" source="media/activate-capabilities/2.jpg" lightbox="media/activate-capabilities/2.jpg" alt-text="Screenshot that shows how to seethe onboarded servers.":::
97
101
98
102
## Onboarding Confirmation
99
103
@@ -104,7 +108,7 @@ To confirm the sensor has been onboarded:
104
108
2. Check that the onboarded domain controller is listed.
105
109
106
110
> [!NOTE]
107
-
> The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as**Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
111
+
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as**Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
108
112
109
113
## Test activated capabilities
110
114
@@ -126,7 +130,6 @@ In the Defender portal, select **Identities** > **Dashboard**, and review the de
126
130
127
131
For more information, see [Work with Defender for Identity's ITDR dashboard](../dashboard.md).
128
132
129
-
130
133
### Confirm entity page details
131
134
132
135
Confirm that entities, such as domain controllers, users, and groups, are populated as expected.
@@ -139,7 +142,7 @@ In the Defender portal, check for the following details:
139
142
140
143
-**Group entities**: Use the global search to find a user group, or pivot from a user or device details page where group details are shown. Check for details of group membership, view group users, and group timeline data.
141
144
142
-
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
145
+
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
143
146
144
147
For more information, see [Investigate assets](../investigate-assets.md).
145
148
@@ -205,18 +208,20 @@ Test remediation actions on a test user. For example:
205
208
206
209
1. In the Defender portal, go to the user details page for a test user.
207
210
208
-
1. From the **Options** menu, select any of the available remediation actions.
211
+
2. From the **Options** menu, select any of the available remediation actions.
209
212
210
-
1. Check Active Directory for the expected activity.
213
+
3. Check Active Directory for the expected activity.
211
214
212
215
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
213
216
214
217
## Deactivate Defender for Identity capabilities on your domain controller
215
218
216
219
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
217
220
218
-
1. In the Defender portal, select **Settings > Identities > Sensors**.
219
-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
221
+
1. In the Defender portal, select **Settings** > **Identities** > **Sensors**.
222
+
2. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
223
+
224
+
:::image type="content" source="media/activate-capabilities/3.jpg" lightbox="media/activate-capabilities/3.jpg" alt-text="Screenshot that shows how to deactivate a server.":::
220
225
221
226
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
Copy file name to clipboardExpand all lines: ATPDocs/role-groups.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ The following table details the specific permissions required for Defender for I
41
41
| ------------------- | ---------------------- |
42
42
|**Onboard Defender for Identity** (create workspace) |[Security Administrator](/entra/identity/role-based-access-control/permissions-reference)|
43
43
|**Configure Defender for Identity settings**| One of the following Microsoft Entra roles:<br>- [Security Administrator](/entra/identity/role-based-access-control/permissions-reference)<br>- [Security Operator](/entra/identity/role-based-access-control/permissions-reference)<br> **Or** <br>The following [Unified RBAC permissions](#unified-role-based-access-control-rbac):<br />- `Authorization and settings/Security settings/Read`<br/>- `Authorization and settings/Security settings/All permissions`<br/>- `Authorization and settings/System settings/Read`<br/>- `Authorization and settings/System settings/All permissions`|
44
-
|**View Defender for Identity settings**|One of the following Microsoft Entra roles:<br>- [Global Reader](/entra/identity/role-based-access-control/permissions-reference)<br>- [Security Reader](/entra/identity/role-based-access-control/permissions-reference) <br> **Or** <br>The following [Unified RBAC permissions](#unified-role-based-access-control-rbac):<br />- `Authorization and settings/Security settings/Read` <br/>- `Authorization and settings/System settings/Read`|
44
+
|**View Defender for Identity settings**| Microsoft Entra roles:<br>- [Security Reader](/entra/identity/role-based-access-control/permissions-reference) <br> **Or** <br>The following [Unified RBAC permissions](#unified-role-based-access-control-rbac):<br />- `Authorization and settings/Security settings/Read` <br/>- `Authorization and settings/System settings/Read`|
45
45
|**Manage Defender for Identity security alerts and activities**| One of the following Microsoft Entra roles:<br>- [Security Operator](/entra/identity/role-based-access-control/permissions-reference)<br> **Or** <br>The following [Unified RBAC permissions](#unified-role-based-access-control-rbac):<br />- `Security operations/Security data/Alerts (Manage)`<br/>- `Security operations/Security data /Security data basics (Read)`|
46
46
|**View Defender for Identity security assessments** <br> (now part of Microsoft Secure Score) |[Permissions](/microsoft-365/security/defender/microsoft-secure-score#required-permissions) to access Microsoft Secure Score <br> **And** <br> The following [Unified RBAC permissions](#unified-role-based-access-control-rbac): `Security operations/Security data /Security data basics (Read)`|
47
47
|**View the Assets / Identities page**|[Permissions](/defender-cloud-apps/manage-admins) to access Defender for Cloud Apps <br> **Or** <br> One of the Microsoft Entra roles required by [Microsoft Defender XDR](/microsoft-365/security/defender/m365d-permissions)|
0 commit comments