Skip to content

Commit 52d70e9

Browse files
Merge pull request #3299 from MicrosoftDocs/main
Publish main to live, 03/27/25, 10:30 AM PDT
2 parents 3dba8e2 + 068f6d7 commit 52d70e9

File tree

52 files changed

+171
-146
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

52 files changed

+171
-146
lines changed

ATPDocs/troubleshooting-known-issues.md

Lines changed: 18 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ Suggested possible workarounds:
224224

225225
## VMware virtual machine sensor issue
226226

227-
If you have a Defender for Identity sensor on VMware virtual machines, you might receive one or both of the following health alerts **Some network traffic is not being analyzed** and **Network configuratuin mismatch for sensors running on VMware**. This can happen because of a configuration mismatch in VMware.
227+
If you have a Defender for Identity sensor on VMware virtual machines, you might receive one or both of the following health alerts **Some network traffic is not being analyzed** and **Network configuration mismatch for sensors running on VMware**. This can happen because of a configuration mismatch in VMware.
228228

229229
To resolve the issue:
230230

@@ -422,7 +422,7 @@ Uninstall the certificate management client, install the Defender for Identity s
422422
423423
>[!NOTE]
424424
>
425-
>The self-signed certificate is renewed every 2 years, and the auto-renewal process might fail if the certificate management client prevents the self-signed certificate creation.
425+
> The self-signed certificate is renewed every 2 years, and the auto-renewal process might fail if the certificate management client prevents the self-signed certificate creation.
426426
> This will cause the sensor to stop communicating with the backend, which will require a sensor reinstallation using the workaround mentioned above.
427427
428428
## Sensor installation fails due to network connectivity issues
@@ -445,7 +445,6 @@ For more information, see [Run a silent installation with a proxy configuration]
445445
446446
> [!IMPORTANT]
447447
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that aren't present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
448-
>
449448
450449
## Sensor service couldn't run and remains in Starting state
451450
@@ -486,6 +485,22 @@ The issue can come up when a Defender for Identity workspace license expires and
486485
- "Azure ATP workspaceName Users" -> "Azure ATP workspaceName Users - old"
487486
1. Then you can go back in the [Microsoft Defender portal](https://security.microsoft.com), to the [Settings](https://security.microsoft.com/securitysettings) -> [Identities](https://security.microsoft.com/settings/identities) section to create the new workspace for Defender for Identity.
488487
488+
## Entra Connect sensor experiences loss of database permissions following the update to Microsoft Entra Connect
489+
490+
**Cause:**
491+
492+
Updating Microsoft Entra Connect may cause the Entra Connect sensor to lose previously configured database permissions. To investigate, check the Microsoft Defender logs for relevant indicators. Refer to [Troubleshooting Microsoft Defender for Identity sensor using the Defender for Identity logs](troubleshooting-using-logs.md) for log locations and further details.
493+
494+
Sample logs that may indicate the issue:
495+
496+
`GetEntraConnectGlobalSettingsAsync GetEntraConnectGlobalSettingsAsync failed. Exception - The EXECUTE permission was denied on the object 'mms_get_globalsettings', database Contoso', schema 'dbo'`
497+
498+
`GetEntraConnectConnectivityParametersAsync GetEntraConnectConnectivityParametersAsync failed. Exception - The EXECUTE permission was denied on the object 'mms_get_connectors', database Contoso, schema 'dbo'`
499+
500+
**Resolution:**
501+
502+
If permissions need to be reconfigured, please follow the steps outlined in this [guide](deploy/active-directory-federation-services.md).
503+
489504
## Next steps
490505
491506
- [Defender for Identity prerequisites](deploy/prerequisites.md)

defender-endpoint/alerts-queue-endpoint-detection-response.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ ms.reviewer:
44
description: View and manage the alerts surfaced in Microsoft Defender XDR
55
keywords:
66
ms.service: defender-endpoint
7-
ms.author: deniseb
8-
author: denisebmsft
7+
ms.author: ewalsh
8+
author: emmwalshh
99
ms.localizationpriority: medium
1010
manager: deniseb
1111
audience: ITPro
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier1
1515
- mde-edr
1616
ms.topic: conceptual
17-
ms.date: 02/15/2024
17+
ms.date: 03/26/2025
1818
ms.subservice: edr
1919
search.appverid: met150
2020
---

defender-endpoint/alerts-queue.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: View and organize the Microsoft Defender for Endpoint Alerts queue
33
description: Learn about how the Microsoft Defender for Endpoint alerts queues work, and how to sort and filter lists of alerts.
44
ms.service: defender-endpoint
5-
ms.author: deniseb
6-
author: denisebmsft
5+
ms.author: ewalsh
6+
author: emmwalshh
77
ms.localizationpriority: medium
88
manager: deniseb
99
audience: ITPro
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier1
1313
- mde-edr
1414
ms.topic: conceptual
15-
ms.date: 02/15/2024
15+
ms.date: 03/26/2025
1616
ms.subservice: edr
1717
search.appverid: met150
1818
---

defender-endpoint/attack-surface-reduction-rules-deployment-operationalize.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ ms.service: defender-endpoint
55
ms.subservice: asr
66
ms.localizationpriority: medium
77
audience: ITPro
8-
author: denisebmsft
9-
ms.author: deniseb
8+
author: emmwalshh
9+
ms.author: ewalsh
1010
ms.reviewer: sugamar, yongrhee
1111
manager: deniseb
1212
ms.custom: asr
@@ -17,7 +17,7 @@ ms.collection:
1717
- highpri
1818
- tier1
1919
- mde-asr
20-
ms.date: 03/10/2025
20+
ms.date: 03/26/2025
2121
search.appverid: met150
2222
---
2323

defender-endpoint/attack-surface-reduction-rules-deployment-test.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ ms.service: defender-endpoint
55
ms.subservice: asr
66
ms.localizationpriority: medium
77
audience: ITPro
8-
author: denisebmsft
9-
ms.author: deniseb
8+
author: emmwalshh
9+
ms.author: ewalsh
1010
ms.reviewer: sugamar
1111
manager: deniseb
1212
ms.custom: asr
@@ -17,7 +17,7 @@ ms.collection:
1717
- highpri
1818
- tier1
1919
- mde-asr
20-
ms.date: 08/14/2023
20+
ms.date: 03/26/2025
2121
search.appverid: met150
2222
---
2323

defender-endpoint/auto-investigation-action-center.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Visit the Action center to see remediation actions
33
description: Use the action center to view details and results following an automated investigation
44
ms.service: defender-endpoint
55
ms.subservice: edr
6-
author: denisebmsft
7-
ms.author: deniseb
6+
author: emmwalshh
7+
ms.author: ewalsh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -16,7 +16,7 @@ ms.custom: admindeeplinkDEFENDER
1616
ms.topic: how-to
1717
ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs
1818
search.appverid: met150
19-
ms.date: 02/21/2024
19+
ms.date: 03/26/2025
2020
---
2121

2222
# Visit the Action center to see remediation actions

defender-endpoint/behavioral-blocking-containment.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Behavioral blocking and containment
33
description: Learn about behavioral blocking and containment capabilities at Microsoft Defender for Endpoint
44
author: denisebmsft
5-
ms.author: deniseb
6-
manager: deniseb
5+
ms.author: ewalsh
6+
manager: emmwalshh
77
ms.reviewer: shwetaj
88
audience: ITPro
99
ms.topic: conceptual
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
search.appverid: met150
18-
ms.date: 02/29/2024
18+
ms.date: 03/29/2025
1919
---
2020

2121
# Behavioral blocking and containment

defender-endpoint/check-sensor-status.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,16 @@ title: Check the device health at Microsoft Defender for Endpoint
33
description: Check the sensor health on devices to identify which ones are misconfigured, inactive, or aren't reporting sensor data.
44
ms.service: defender-endpoint
55
ms.subservice: onboard
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: ewalsh
7+
author: emmwalshh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
1313
- tier2
1414
ms.topic: conceptual
15-
ms.date: 05/16/2023
15+
ms.date: 03/26/2025
1616
search.appverid: met150
1717
---
1818

defender-endpoint/conditional-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,16 @@ description: Enable Conditional Access to prevent applications from running if a
44
search.appverid: met150
55
ms.service: defender-endpoint
66
ms.subservice: onboard
7-
ms.author: deniseb
8-
author: denisebmsft
7+
ms.author: ewalsh
8+
author: emmwalshh
99
ms.localizationpriority: medium
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier3
1515
ms.topic: conceptual
16-
ms.date: 12/18/2020
16+
ms.date: 03/26/2025
1717
---
1818

1919
# Enable Conditional Access to better protect users, devices, and data

defender-endpoint/configure-endpoints-script.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Onboard Windows devices using a local script
33
description: Use a local script to deploy the configuration package on devices to enable onboarding of the devices to the service.
44
search.appverid: met150
55
ms.service: defender-endpoint
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: ewalsh
7+
author: emmwalshh
88
ms.reviewer: pahuijbr
99
ms.localizationpriority: medium
1010
manager: deniseb
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: conceptual
1717
ms.subservice: onboard
18-
ms.date: 02/29/2024
18+
ms.date: 03/26/2025
1919
---
2020

2121
# Onboard Windows devices using a local script

0 commit comments

Comments
 (0)