You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-for-identity/whats-new.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,13 @@ For updates about versions and features released six months ago or earlier, see
25
25
26
26
## November 2025
27
27
28
+
|Version number |Updates |
29
+
|---------|---------|
30
+
|2.251|The enhanced ADWS LDAP and legacy password-based LDAP query methods now capture a broader range of unique events at scale. As a result, you may notice an increase in recorded activity.|
31
+
32
+
### Automatic Windows event auditing configuration for Defender for Identity sensors v3.x
33
+
34
+
Defender for Identity now offers automatic Windows event-auditing configuration for Defender for Identity sensors v3.x. Automatic event auditing streamlines deployment by applying required Windows auditing settings to new sensors and fixing any misconfigurations on existing sensors. Admins can enable the option in the Defender portal or using Graph API.
28
35
29
36
### Identity Inventory enhancements: Accounts tab, manual account linking and unlinking, and expanded remediation actions
30
37
@@ -44,13 +51,6 @@ For more information, see: [Link or Unlink an Account to an Identity (Preview)](
44
51
You can now perform remediation actions such as disabling accounts or resetting passwords on one or more accounts linked to an identity. For more information, see: [Remediation actions](remediation-actions.md#roles-and-permissions).
45
52
Defender for Identity now offers an opt-in automatic event-auditing configuration for unified sensors (V3.x). This feature streamlines deployment by automatically applying required Windows auditing settings to new sensors and fixing misconfigurations on existing ones. Admins can enable the option in the Defender for Identity Settings -> Advanced Features or via Graph API. The capability and its related health alerts will roll out globally beginning mid-November 2025.
46
53
47
-
Releated Health alerts:
48
-
- NTLM Auditing is not enabled
49
-
- Directory Services Advanced Auditing is not enabled as required
50
-
- Directory Services Object Auditing is not enabled as required
51
-
- Auditing on the Configuration container is not enabled as required
52
-
- Auditing on the ADFS container is not enabled as required
53
-
54
54
### New security posture assessment: Change password for on-prem account with potentially leaked credentials (Preview)
55
55
56
56
The new security posture assessment lists users whose valid credentials have been leaked. For more information, see: [Change password for on-prem account with potentially leaked credentials (Preview)](/defender-for-identity/security-posture-assessments/accounts#change-password-for-on-prem-account-with-potentially-leaked-credentials-preview)
@@ -68,8 +68,8 @@ For more information, see [Configure scoped access for Microsoft Defender for Id
68
68
69
69
## October 2025
70
70
71
-
We’re excited to announce that the Microsoft Defender for Identity Sensor (v3.x) is now generally available (GA).
72
-
[Version 3.x of the sensor](/defender-for-identity/deploy/activate-sensor) provides enhanced coverage, improved performance across your environment and offering easier deployment and management for domain controllers.
71
+
We’re excited to announce that the Microsoft Defender for Identity sensor v3.x is now generally available (GA).
72
+
The [Microsoft Defender for Identity sensor v3.x](/defender-for-identity/deploy/activate-sensor) provides enhanced coverage, improved performance across your environment and offering easier deployment and management for domain controllers.
73
73
74
74
### Microsoft Defender for Identity sensor version updates
75
75
@@ -93,9 +93,9 @@ As part of the ongoing transition to a unified alerting experience across Micros
|Suspicious network connection over Encrypting File System Remote Protocol|2416|[Suspicious network connection over Encrypting File System Remote Protocol](alerts-xdr.md#suspicious-network-connection-over-encrypting-file-system-remote-protocol)|xdr_SuspiciousConnectionOverEFSRPC|
95
95
96
-
### Unlock additional security value in the unified agent (Preview)
96
+
### Additional security value in the Defender for Identity sensor v3.x
97
97
98
-
Get enhanced protection by applying the **Unified sensor RPC audit** tag to your v3.x sensors through the Asset rule management feature. Learn more [here](/defender-for-identity/deploy/prerequisites-sensor-version-3).
98
+
Apply the **Unified sensor RPC audit** tag to your Defender for Identity sensor v3.x in the **Asset rule management** page for enhanced protection. Learn more [here](/defender-for-identity/deploy/prerequisites-sensor-version-3).
99
99
100
100
### Identity posture recommendations view on the identity page (preview)
101
101
@@ -106,18 +106,18 @@ For more information, see [Investigate users in Microsoft Defender XDR](/microso
106
106
Defender for Identity data centers are now also deployed in the United Arab Emirates, North and Central regions. For the most current list of regional deployments, see [Defender for Identity data locations](/defender-for-identity/privacy-compliance/#data-location).
107
107
108
108
109
-
### New API support for unified sensor (preview)
110
-
We are excited to announce the availability of a new Graph-based API for managing unified sensor server actions in Microsoft Defender for Identity.
109
+
### New API support for the Defender for Identity sensor v3.x (Preview)
110
+
We are excited to announce the availability of a new Graph-based API for managing the Defender for Identity sensor v3.x server actions.
111
111
This capability is currently in preview and available in API Beta version.
112
112
113
113
This API allows customers to:
114
114
115
-
* Monitor the status of unified sensor servers
115
+
* Monitor the status of servers deployed with the Defender for Identity sensor v3.x
116
116
* Enable or disable the automatic activation of eligible servers
117
117
* Activate or deactivate the sensor on eligible servers
118
118
119
119
120
-
For more information, see [Managing unified sensor actions through Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true).
120
+
For more information, see [Managing the Defender for Identity sensor v3.x actions using Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true).
121
121
122
122
### Microsoft Defender for Identity sensor version updates
Copy file name to clipboardExpand all lines: defender-office-365/air-user-automatic-feedback-response.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: chrisda
6
6
manager: bagol
7
7
ms.reviewer: kellycrider
8
8
ms.topic: overview
9
-
ms.date: 11/17/2024
9
+
ms.date: 07/10/2024
10
10
ms.service: defender-office-365
11
11
appliesto:
12
12
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
@@ -21,8 +21,6 @@ This article explains how to enable and customize automatic feedback response fo
21
21
22
22
## What do you need to know before you begin?
23
23
24
-
- The alert policy named **Email reported by user as malware or phish** must be enabled for this feature to work (it's on by default). For more information about this alert policy, see [Threat management alert policies](/defender-xdr/alert-policies#threat-management-alert-policies).
25
-
26
24
- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **User reported settings** page, use <https://security.microsoft.com/securitysettings/userSubmission>.
27
25
28
26
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
0 commit comments