You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-vulnerability-management/windows-authenticated-scan.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ audience: Admin
9
9
ms.topic: conceptual
10
10
ms.service: defender-vuln-mgmt
11
11
ms.localizationpriority: medium
12
-
ms.date: 09/20/2024
12
+
ms.date: 11/03/2024
13
13
ms.collection:
14
14
- m365-security
15
15
- Tier1
@@ -24,11 +24,14 @@ ms.collection:
24
24
-[Microsoft Defender XDR](/defender-xdr)
25
25
-[Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
26
26
27
-
> [!NOTE]
28
-
> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
27
+
> [!IMPORTANT]
28
+
> This feature will be deprecated by the end of November 2025 and will not be supported beyond that date. Reach out to Microsoft Support for more information or assistance.
29
29
30
30
Authenticated scan for Windows provides the ability to run scans on unmanaged Windows devices. You can remotely target by IP ranges or hostnames and scan Windows services by providing Microsoft Defender Vulnerability Management with credentials to remotely access the devices. Once configured the targeted unmanaged devices will be scanned regularly for software vulnerabilities. By default, the scan will run every four hours with options to change this interval or have it only run once.
31
31
32
+
> [!NOTE]
33
+
> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
34
+
32
35
Security administrators can then see the latest security recommendations and review recently discovered vulnerabilities for the targeted device in the [Microsoft Defender portal](https://security.microsoft.com).
Copy file name to clipboardExpand all lines: defender-xdr/security-copilot-defender-identity-summary.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,6 +30,8 @@ appliesto:
30
30
31
31
Security operations teams investigating users can easily understand identity information with the identity summary capability in [Microsoft Copilot for Security](/security-copilot/microsoft-security-copilot) in Microsoft Defender. Through generative AI and harnessing the power of Microsoft Defender for Identity, Copilot creates contextual insights about an identity in an organization, helping analysts quickly understand important data to speed up their investigation.
32
32
33
+
With the identity summary capability, analysts can immediately identify suspicious or risky identity-related changes and actions that can negatively impact an organization. The summary also includes potential misconfigurations that affect an identity. Using natural language, Copilot delivers clear and actionable user information that analysts can use in their incident investigation activities. The capability currently focuses on users and will include service accounts in its next iteration.
34
+
33
35
This guide describes what the identity summary capability is and how it works, including how you can provide feedback on the results generated.
34
36
35
37
## Know before you begin
@@ -42,8 +44,6 @@ If you're new to Copilot for Security, you should familiarize yourself with it b
42
44
-[Understand authentication in Copilot for Security](/security-copilot/authentication)
43
45
-[Prompting in Copilot for Security](/security-copilot/prompting-security-copilot)
44
46
45
-
With the identity summary capability, analysts can immediately identify suspicious or risky identity-related changes and actions that can negatively impact an organization. The summary also includes potential misconfigurations that affects an identity. Using natural language, Copilot delivers clear and actionable user information that analysts can use in their incident investigation activities. The capability currently focuses on users and will include service accounts in its next iteration.
46
-
47
47
## Copilot for Security integration in Microsoft Defender
48
48
49
49
The identity summary capability is available in the Microsoft Defender portal for customers who have provisioned access to Copilot for Security.
@@ -80,7 +80,7 @@ You can access the identity summary capability in the following ways:
80
80
81
81
- From the main menu, navigate to **Assets > Identities**. Select a username from the list, then select **View user page** to open the user page. Copilot automatically generates the identity summary and displays the side panel upon opening the user page.
82
82
83
-
:::image type="content" source="/defender/media/copilot-in-defender/identity-summary/identity-summary-viewuser-small.png" alt-text="Screenshot highlighting the view user page option in an username search within Identities." lightbox="/defender/media/copilot-in-defender/identity-summary/identity-summary-viewuser.png":::
83
+
:::image type="content" source="/defender/media/copilot-in-defender/identity-summary/identity-summary-viewuser-small.png" alt-text="Screenshot highlighting the view user page option in a username search within Identities." lightbox="/defender/media/copilot-in-defender/identity-summary/identity-summary-viewuser.png":::
84
84
85
85
- Type a username in the Microsoft Defender portal’s **search box** then select the username from the search results. In the user details side panel, select **Summarize** to generate the identity summary.
86
86
@@ -108,4 +108,4 @@ Fill in the dedicated text box to share your thoughts, experiences, and requests
108
108
-[Learn about other Copilot for Security embedded experiences](/security-copilot/experiences-security-copilot)
109
109
-[Privacy and data security in Copilot for Security](/copilot/security/privacy-data-security)
0 commit comments