Skip to content

Commit 4b00a5a

Browse files
authored
Merge pull request #5498 from limwainstein/predictive-shielding
Predictive shielding (Ignite)
2 parents 9d7ac2a + bf1e250 commit 4b00a5a

15 files changed

+297
-10
lines changed
10.1 KB
Binary file not shown.

defender-endpoint/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1072,7 +1072,7 @@
10721072
- name: Contain devices from the network
10731073
href: respond-machine-alerts.md#contain-devices-from-the-network
10741074
- name: Contain user from the network
1075-
href: respond-machine-alerts.md#contain-user-from-the-network
1075+
href: respond-machine-alerts.md#contain-user-from-the-network
10761076
- name: Consult a threat expert
10771077
href: respond-machine-alerts.md#consult-a-threat-expert
10781078
- name: Check activity details in Action center

defender-endpoint/respond-machine-alerts.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -359,13 +359,10 @@ You can identify critical assets by the **critical asset** tag on the device or
359359

360360
When an identity in your network might be compromised, you must prevent that identity from accessing the network and different endpoints. Defender for Endpoint can contain an identity, blocking it from access, and helping prevent attacks-- specifically, ransomware. When an identity is contained, any supported Microsoft Defender for Endpoint onboarded device will block incoming traffic in specific protocols related to attacks (deny network logons, RPC, SMB, RDP), terminate ongoing remote sessions and logoff existing RDP connections (terminating the session itself including all its related processes), while enabling legitimate traffic. This action can significantly help to reduce the impact of an attack. When an identity is contained, security operations analysts have extra time to locate, identify and remediate the threat to the compromised identity. Once contained by automatic attack disruption, a user is automatically removed from containment in the next five days.
361361

362-
> [!NOTE]
363-
> Blocking incoming communication with a "contained" user is supported on onboarded Microsoft Defender for Endpoint Windows 10 and 11 devices (Sense version 8740 and higher), Windows Server 2019+ devices, and Windows Servers 2012R2 and 2016 with the modern agent.
362+
### Contain user important notes
364363

365-
> [!IMPORTANT]
366-
> As part of the active protection provided by Microsoft Defender for Endpoint, a distributed mechanism can apply LSA Policy to prevent compromised users from accessing machines in your organization. Currently, when this policy is applied on domain controllers, it may cause Group Policy synchronization activity across domain controllers.
367-
>
368-
> We are gradually rolling out a new solution by integrating with new OS APIs. This deployment will be phased and thoroughly tested to ensure stability and security. During this rollout, LSA Policy enforcement on your servers will be temporarily removed to prevent potential GPO sync. This change will remain in effect until the rollout is complete.
364+
- Blocking incoming communication with a "contained" user is supported on onboarded Microsoft Defender for Endpoint Windows 10 and 11 devices (Sense version 8740 and higher), Windows Server 2019+ devices, and Windows Servers 2012R2 and 2016 with the modern agent.
365+
- **Important**: Once a **Contain user** action is enforced on a domain controller, it starts a GPO update on the Default Domain Controller policy. A change of a GPO starts a sync across the domain controllers in your environment. This is expected behavior, and if you monitor your environment for AD GPO changes, you may be notified of such changes. Undoing the **Contain user** action reverts the GPO changes to their previous state, which will then start another AD GPO synchronization in your environment. Learn more about [merging of security policies on domain controllers](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj966251(v=ws.11)#merging-of-security-policies-on-domain-controllers).
369366

370367
### How to contain a user
371368

defender-xdr/TOC.yml

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -137,16 +137,22 @@
137137
href: m365d-autoir-results.md
138138
- name: Address false positives and negatives
139139
href: m365d-autoir-report-false-positives-negatives.md
140-
- name: Manage attack disruption
140+
- name: Attack disruption
141141
items:
142142
- name: Overview
143143
href: automatic-attack-disruption.md
144-
- name: Configure capabilities
144+
- name: Manage
145145
href: configure-attack-disruption.md
146146
- name: View details and results
147147
href: autoad-results.md
148148
- name: Exclude assets from automated responses
149-
href: automatic-attack-disruption-exclusions.md
149+
href: automatic-attack-disruption-exclusions.md
150+
- name: Predictive shielding
151+
items:
152+
- name: Overview
153+
href: shield-predict-threats.md
154+
- name: Manage and view details
155+
href: shield-predict-threats-manage.md
150156
- name: Search for threats with advanced hunting
151157
items:
152158
- name: Overview
19 KB
Loading
221 KB
Loading
26.6 KB
Loading
147 KB
Loading
340 KB
Loading
81.3 KB
Loading

0 commit comments

Comments
 (0)