You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/health-alerts.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,6 +39,12 @@ This section describes all the health issues for each component, listing the cau
39
39
40
40
Sensor-specific health issues are displayed in the **Sensor health issues** tab and domain related or aggregated health issues are displayed in the **Global health issues** tab as detailed in the following tables:
41
41
42
+
### Network configuration mismatch for sensors running on VMware
|The virtual machines that the listed Defender for Identity sensors are installed on has a network configuration mismatch. This issue may affect the performance and reliability of the sensors.|Review the network interface settings, including disabling the Large Send Offload (LSO), and follow the instructions in [here](https://aka.ms/mdi/vmware-sensor-issue).|High|Sensors health issues tab|
47
+
42
48
### A domain controller is unreachable by a sensor
Copy file name to clipboardExpand all lines: ATPDocs/notifications.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,18 +19,19 @@ This article describes how to configure Defender for Identity notifications so t
19
19
20
20
## Configure email notifications
21
21
22
-
This section describes how to configure email notifications for Defender for Identity health issues or security alerts.
22
+
This section describes how to configure email notifications for Defender for Identity health issues.
23
23
24
24
1. In [Microsoft Defender XDR](https://security.microsoft.com), select **Settings** > **Identities**.
25
25
26
-
1. Under **Notifications**, select **Health issues notifications** or **Alert notifications** as needed.
26
+
1. Under **Notifications**, select **Health issues notifications**.
27
27
28
28
1. In the **Add recipient email**, enter the email address(es) where you want to receive email notifications, and select **+ Add**.
29
29
30
-
Whenever Defender for Identity detects a health issue or security alert, configured recipients receive an email notification with the details, with a link to Microsoft Defender XDR for more details.
30
+
Whenever Defender for Identity detects a health issue, configured recipients receive an email notification with the details, with a link to Microsoft Defender XDR for more details.
31
31
32
32
> [!NOTE]
33
-
> *Alert notifications* page will be deprecated by January 15, 2025. Please use the '[Email Notifications](https://security.microsoft.com/securitysettings/defender/email_notifications)' page under Defender XDR settings for new and existing notifications rules. [Learn more](https://aka.ms/IncidentsNotificationsDefenderXdr)
33
+
> To receive email notifications about Incidents, please use the [Email Notifications](https://security.microsoft.com/securitysettings/defender/email_notifications) page under Defender XDR Settings for new and existing notifications rules. [Learn more](https://aka.ms/IncidentsNotificationsDefenderXdr).
34
+
34
35
## Configure Syslog notifications
35
36
36
37
This section describes how to configure Defender for Identity to send health issues and security events to a Syslog server through a configured sensor.
@@ -41,13 +42,13 @@ Events aren't sent from the Defender for Identity service to your Syslog server
41
42
42
43
1. In [Microsoft Defender XDR](https://security.microsoft.com), select **Settings** > **Identities**.
43
44
44
-
1. Under **Notifications**, select **Syslog notifications** and then toggle on the **Syslog service** option.
45
+
1. Under **Notifications**, select **Syslog notifications**, and then toggle on the **Syslog service** option.
45
46
46
47
1. Select **Configure service** to open the **Syslog service** pane.
47
48
48
49
1. Enter the following details:
49
50
50
-
-**Sensor**: Select the sensor you want to send notifications to the Syslog server
51
+
-**Sensor**: Select the sensor you want to send notifications to the Syslog server.
51
52
-**Service endpoint** and **Port**: Enter the IP address or fully qualified domain name (FQDN) for the Syslog server, and then enter the port number. You can configure only one Syslog endpoint.
52
53
-**Transport**: Select the **Transport** protocol (TCP or UDP).
53
54
-**Format**: Select the format (RFC 3164 or RFC 5424).
Copy file name to clipboardExpand all lines: ATPDocs/troubleshooting-known-issues.md
+5-7Lines changed: 5 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -224,7 +224,7 @@ Suggested possible workarounds:
224
224
225
225
## VMware virtual machine sensor issue
226
226
227
-
If you have a Defender for Identity sensor on VMware virtual machines, you might receive the health alert**Some network traffic is not being analyzed**. This can happen because of a configuration mismatch in VMware.
227
+
If you have a Defender for Identity sensor on VMware virtual machines, you might receive one or both of the following health alerts**Some network traffic is not being analyzed** and **Network configuratuin mismatch for sensors running on VMware**. This can happen because of a configuration mismatch in VMware.
228
228
229
229
To resolve the issue:
230
230
@@ -273,8 +273,6 @@ The domain controller hasn't been granted permission to retrieve the password of
273
273
274
274
Validate that the computer running the sensor has been granted permissions to retrieve the password of the gMSA account. For more information, see [Grant permissions to retrieve the gMSA account's password](deploy/create-directory-service-account-gmsa.md#prerequisites-grant-permissions-to-retrieve-the-gmsa-accounts-password).
275
275
276
-
277
-
278
276
### Cause 2
279
277
280
278
The sensor service runs as *LocalService* and performs impersonation of the Directory Service account.
@@ -446,16 +444,16 @@ Ensure that the sensor can browse to \*.atp.azure.com directly or through the co
446
444
For more information, see [Run a silent installation with a proxy configuration](install-sensor.md#run-a-silent-installation-with-a-proxy-configuration) and [Install the Microsoft Defender for Identity sensor](deploy/install-sensor.md).
447
445
448
446
> [!IMPORTANT]
449
-
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
447
+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that aren't present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
450
448
>
451
449
452
-
## Sensor service could not run and remains in Starting state
450
+
## Sensor service couldn't run and remains in Starting state
453
451
454
452
The following errors will appear in the **System log** in **Event viewer**:
455
453
456
454
- The Open procedure for service ".NETFramework" in DLL "C:\Windows\system32\mscoree.dll" failed with error code Access is denied. Performance data for this service won't be available.
457
-
- The Open procedure for service "Lsa" in DLL "C:\Windows\System32\Secur32.dll" failed with error code Access is denied. Performance data for this service will not be available.
458
-
- The Open procedure for service "WmiApRpl" in DLL "C:\Windows\system32\wbem\wmiaprpl.dll" failed with error code "The device is not ready". Performance data for this service won't be available.
455
+
- The Open procedure for service "Lsa" in DLL "C:\Windows\System32\Secur32.dll" failed with error code Access is denied. Performance data for this service won't be available.
456
+
- The Open procedure for service "WmiApRpl" in DLL "C:\Windows\system32\wbem\wmiaprpl.dll" failed with error code "The device isn't ready". Performance data for this service won't be available.
459
457
460
458
The Microsoft.TriSensorError.log will contain an error similar to this:
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-office-365.md
+12-7Lines changed: 12 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
8
8
9
9
10
10
11
-
As a major productivity suite providing cloud file storage, collaboration, BI, and CRM tools, Microsoft 365 enables your users to share their documents across your organization and partners in a streamlined and efficient way. Using Microsoft 365 may expose your sensitive data not only internally, but also to external collaborators, or even worse make it publicly available via a shared link. Such incidents might occur due to malicious actor, or by an unaware employee. Microsoft 365 also provides a large third-party app eco-system to help boost productivity. Using these apps can expose your organization to the risk of malicious apps or use of apps with excessive permissions.
11
+
As a major productivity suite providing cloud file storage, collaboration, BI, and CRM tools, Microsoft 365 enables your users to share their documents across your organization and partners in a streamlined and efficient way. Using Microsoft 365 might expose your sensitive data not only internally, but also to external collaborators, or even worse make it publicly available via a shared link. Such incidents might occur due to malicious actor, or by an unaware employee. Microsoft 365 also provides a large third-party app eco-system to help boost productivity. Using these apps can expose your organization to the risk of malicious apps or use of apps with excessive permissions.
12
12
13
13
Connecting Microsoft 365 to Defender for Cloud Apps gives you improved insights into your users' activities, provides threat detection using machine learning based anomaly detections, information protection detections (such as detecting external information sharing), enables automated remediation controls, and detects threats from enabled third-party apps in your organization.
14
14
@@ -17,7 +17,11 @@ Defender for Cloud Apps integrates directly with [Microsoft 365's audit logs](/m
To enhance file scanning efficiency and accuracy within Microsoft 365 environments, Defender for Cloud Apps has updated the file scanning process for Microsoft 365. Unless you activate information protection policies, Defender for Cloud Apps won't scan or store organizational files.
23
+
24
+
When you actively use information protection policies, organizational files might have significant scanning durations due to high volumes of file scanning activities.
21
25
22
26
Defender for Cloud Apps has added new file scanning improvements for SharePoint and OneDrive:
23
27
@@ -26,7 +30,7 @@ Defender for Cloud Apps has added new file scanning improvements for SharePoint
26
30
- Better identification for a file's access level in SharePoint: file access level in SharePoint will be marked by default as **Internal**, and not as **Private** (since every file in SharePoint is accessible by the site owner, and not only by the file owner).
27
31
28
32
>[!NOTE]
29
-
>This change could impact your file policies (if a file policy is looking for **Internal** or **Private** files in SharePoint).
33
+
>This change could affect your file policies (if a file policy is looking for **Internal** or **Private** files in SharePoint).
30
34
31
35
## Main threats
32
36
@@ -79,7 +83,7 @@ Review our best practices for [securing and collaborating with external users](b
79
83
80
84
## Defender for Cloud Apps integration with Microsoft 365
81
85
82
-
Defender for Cloud Apps supports the legacy Microsoft 365 Dedicated Platform as well as the latest offerings of Microsoft 365 services, commonly referred as the *vNext* release family of Microsoft 365.
86
+
Defender for Cloud Apps supports the legacy Microsoft 365 Dedicated Platform and the latest offerings of Microsoft 365 services, commonly referred as the *vNext* release family of Microsoft 365.
83
87
84
88
In some cases, a vNext service release differs slightly at the administrative and management levels from the standard Microsoft 365 offering.
85
89
@@ -115,7 +119,9 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
- To enable file monitoring of Microsoft 365 files, you must use a relevant Entra Admin ID, such as Application Administrator or Cloud Application Administrator. For more information, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference)
119
125
120
126
- You must have at least one assigned Microsoft 365 license to connect Microsoft 365 to Defender for Cloud Apps.
121
127
@@ -126,7 +132,6 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
126
132
- You must [enable auditing in Power BI](/power-bi/admin/service-admin-auditing) to get the logs from there. Once auditing is enabled, Defender for Cloud Apps starts getting the logs (with a delay of 24-72 hours).
127
133
- You must [enable auditing in Dynamics 365](/power-platform/admin/enable-use-comprehensive-auditing#enable-auditing) to get the logs from there. Once auditing is enabled, Defender for Cloud Apps starts getting the logs (with a delay of 24-72 hours).
128
134
129
-
130
135
**To connect Microsoft 365 to Defender for Cloud Apps**:
131
136
132
137
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**.
@@ -139,7 +144,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
139
144
> [!NOTE]
140
145
>
141
146
> - For best protection, we recommend selecting all Microsoft 365 components.
142
-
> - The **Azure AD files** component, requires the **Azure AD activities** component and Defender for Cloud Apps file monitoring (**Settings** > **Cloud Apps** > **Files** > **Enable file monitoring**).
@@ -45,8 +45,7 @@ Isolates a device from accessing external network.
45
45
> - Full isolation is available for all supported Linux devices. See [Microsoft Defender for Endpoint on Linux](/defender-endpoint/microsoft-defender-endpoint-linux).
46
46
> - Selective isolation is available for devices on Windows 10, version 1709 or later, and on Windows 11.
47
47
> - When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
48
-
> - Calling this API on unmanaged devices triggers the [contain device from the network](../respond-machine-alerts.md#contain-devices-from-the-network) action.
49
-
48
+
> - Calling this API on unmanaged devices triggers the [contain device from the network](../respond-machine-alerts.md#contain-devices-from-the-network) action. The IsolationType value should be set to 'UnManagedDevice.'
50
49
51
50
## Permissions
52
51
@@ -59,10 +58,9 @@ Delegated (work or school account)|Machine.Isolate|'Isolate machine'
59
58
60
59
> [!NOTE]
61
60
> When obtaining a token using user credentials:
62
-
>
63
-
> - The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](../user-roles.md) for more information)
64
-
> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
65
-
>
61
+
> - The user needs to have at least the following role permission: 'Active remediation actions.' For more information, see [Create and manage roles](../user-roles.md).
62
+
> - The user needs to have access to the device, based on device group settings. See [Create and manage device groups](../machine-groups.md) for more information.
63
+
>
66
64
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
In the request body, supply a JSON object with the following parameters:
84
82
85
-
Parameter|Type|Description
86
-
:---|:---|:---
87
-
Comment|String|Comment to associate with the action. **Required**.
88
-
IsolationType|String|Type of the isolation. Allowed values are: 'Full' or 'Selective'.
83
+
|Parameter|Type|Description|
84
+
|:---|:---|:---|
85
+
|Comment|String|Comment to associate with the action. **Required**.|
86
+
|IsolationType|String|Type of the isolation. Allowed values are: **Full**, **Selective**, or **UnManagedDevice**.|
89
87
90
88
**IsolationType** controls the type of isolation to perform and can be one of the following:
91
89
92
-
- Full: Full isolation
93
-
- Selective: Restrict only limited set of applications from accessing the network (see [Isolate devices from the network](../respond-machine-alerts.md#isolate-devices-from-the-network) for more details)
90
+
- Full: Full isolation. Works for managed devices.
91
+
- Selective: Restrict only limited set of applications from accessing the network on managed devices. For more information, see [Isolate devices from the network](../respond-machine-alerts.md#isolate-devices-from-the-network).
92
+
- UnManagedDevice: The isolation targets unmanaged devices only.
94
93
95
94
## Response
96
95
@@ -100,7 +99,7 @@ If successful, this method returns 201 - Created response code and [Machine Acti
100
99
101
100
### Request
102
101
103
-
Here is an example of the request.
102
+
Here's an example of the request.
104
103
105
104
```http
106
105
POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/isolate
Copy file name to clipboardExpand all lines: defender-endpoint/configure-endpoints-vdi.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
- tier2
15
15
ms.custom: admindeeplinkDEFENDER
16
16
ms.topic: conceptual
17
-
ms.date: 03/04/2025
17
+
ms.date: 03/11/2025
18
18
ms.subservice: onboard
19
19
---
20
20
@@ -55,8 +55,8 @@ Defender for Endpoint supports non-persistent VDI session onboarding. There migh
55
55
- In a VDI environment, VDI instances can have short lifespans. VDI devices can appear in the Microsoft Defender portal as either single entries for each VDI instance or multiple entries for each device.
56
56
57
57
- Single entry for each VDI instance. If the VDI instance was already onboarded to Microsoft Defender for Endpoint, and at some point deleted, and then recreated with the same host name, a new object representing this VDI instance is NOT be created in the portal. In this case, the *same* device name must be configured when the session is created, for example using an unattended answer file.
58
-
59
58
- Multiple entries for each device - one for each VDI instance.
59
+
- For all VDI machines, when they onboard for the first time, there's a client delay of approximately 3-4 hours.
60
60
61
61
> [!IMPORTANT]
62
62
> If you're deploying non-persistent VDIs through cloning technology, make sure that your internal template VMs are not onboarded to Defender for Endpoint. This recommendation is to avoid cloned VMs from being onboarded with the same senseGuid as your template VMs, which could prevent VMs from showing up as new entries in the Devices list.
0 commit comments