Skip to content

Commit 52db420

Browse files
committed
Merge branch 'main' into chrisda
2 parents 8263095 + 6c57609 commit 52db420

File tree

2 files changed

+16
-18
lines changed

2 files changed

+16
-18
lines changed

defender-for-identity/whats-new.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,13 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## November 2025
2727

28+
|Version number |Updates |
29+
|---------|---------|
30+
|2.251|The enhanced ADWS LDAP and legacy password-based LDAP query methods now capture a broader range of unique events at scale. As a result, you may notice an increase in recorded activity.|
31+
32+
### Automatic Windows event auditing configuration for Defender for Identity sensors v3.x
33+
34+
Defender for Identity now offers automatic Windows event-auditing configuration for Defender for Identity sensors v3.x. Automatic event auditing streamlines deployment by applying required Windows auditing settings to new sensors and fixing any misconfigurations on existing sensors. Admins can enable the option in the Defender portal or using Graph API.
2835

2936
### Identity Inventory enhancements: Accounts tab, manual account linking and unlinking, and expanded remediation actions
3037

@@ -44,13 +51,6 @@ For more information, see: [Link or Unlink an Account to an Identity (Preview)](
4451
You can now perform remediation actions such as disabling accounts or resetting passwords on one or more accounts linked to an identity. For more information, see: [Remediation actions](remediation-actions.md#roles-and-permissions).
4552
Defender for Identity now offers an opt-in automatic event-auditing configuration for unified sensors (V3.x). This feature streamlines deployment by automatically applying required Windows auditing settings to new sensors and fixing misconfigurations on existing ones. Admins can enable the option in the Defender for Identity Settings -> Advanced Features or via Graph API. The capability and its related health alerts will roll out globally beginning mid-November 2025.
4653

47-
Releated Health alerts:
48-
- NTLM Auditing is not enabled
49-
- Directory Services Advanced Auditing is not enabled as required
50-
- Directory Services Object Auditing is not enabled as required
51-
- Auditing on the Configuration container is not enabled as required
52-
- Auditing on the ADFS container is not enabled as required
53-
5454
### New security posture assessment: Change password for on-prem account with potentially leaked credentials (Preview)
5555

5656
The new security posture assessment lists users whose valid credentials have been leaked. For more information, see: [Change password for on-prem account with potentially leaked credentials (Preview)](/defender-for-identity/security-posture-assessments/accounts#change-password-for-on-prem-account-with-potentially-leaked-credentials-preview)
@@ -68,8 +68,8 @@ For more information, see [Configure scoped access for Microsoft Defender for Id
6868

6969
## October 2025
7070

71-
We’re excited to announce that the Microsoft Defender for Identity Sensor (v3.x) is now generally available (GA).
72-
[Version 3.x of the sensor](/defender-for-identity/deploy/activate-sensor) provides enhanced coverage, improved performance across your environment and offering easier deployment and management for domain controllers.
71+
We’re excited to announce that the Microsoft Defender for Identity sensor v3.x is now generally available (GA).
72+
The [Microsoft Defender for Identity sensor v3.x](/defender-for-identity/deploy/activate-sensor) provides enhanced coverage, improved performance across your environment and offering easier deployment and management for domain controllers.
7373

7474
### Microsoft Defender for Identity sensor version updates
7575

@@ -93,9 +93,9 @@ As part of the ongoing transition to a unified alerting experience across Micros
9393
|Suspected brute-force attack (LDAP)|2004|[Suspected brute-force attack (LDAP)](alerts-xdr.md#suspected-brute-force-attack-ldap)|xdr_LdapBindBruteForce|
9494
|Suspicious network connection over Encrypting File System Remote Protocol|2416|[Suspicious network connection over Encrypting File System Remote Protocol](alerts-xdr.md#suspicious-network-connection-over-encrypting-file-system-remote-protocol)|xdr_SuspiciousConnectionOverEFSRPC|
9595

96-
### Unlock additional security value in the unified agent (Preview)
96+
### Additional security value in the Defender for Identity sensor v3.x
9797

98-
Get enhanced protection by applying the **Unified sensor RPC audit** tag to your v3.x sensors through the Asset rule management feature. Learn more [here](/defender-for-identity/deploy/prerequisites-sensor-version-3).
98+
Apply the **Unified sensor RPC audit** tag to your Defender for Identity sensor v3.x in the **Asset rule management** page for enhanced protection. Learn more [here](/defender-for-identity/deploy/prerequisites-sensor-version-3).
9999

100100
### Identity posture recommendations view on the identity page (preview)
101101

@@ -106,18 +106,18 @@ For more information, see [Investigate users in Microsoft Defender XDR](/microso
106106
Defender for Identity data centers are now also deployed in the United Arab Emirates, North and Central regions. For the most current list of regional deployments, see [Defender for Identity data locations](/defender-for-identity/privacy-compliance/#data-location).
107107

108108

109-
### New API support for unified sensor (preview)
110-
We are excited to announce the availability of a new Graph-based API for managing unified sensor server actions in Microsoft Defender for Identity.
109+
### New API support for the Defender for Identity sensor v3.x (Preview)
110+
We are excited to announce the availability of a new Graph-based API for managing the Defender for Identity sensor v3.x server actions.
111111
This capability is currently in preview and available in API Beta version.
112112

113113
This API allows customers to:
114114

115-
* Monitor the status of unified sensor servers
115+
* Monitor the status of servers deployed with the Defender for Identity sensor v3.x
116116
* Enable or disable the automatic activation of eligible servers
117117
* Activate or deactivate the sensor on eligible servers
118118
119119

120-
For more information, see [Managing unified sensor actions through Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true).
120+
For more information, see [Managing the Defender for Identity sensor v3.x actions using Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true).
121121

122122
### Microsoft Defender for Identity sensor version updates
123123

defender-office-365/air-user-automatic-feedback-response.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: chrisda
66
manager: bagol
77
ms.reviewer: kellycrider
88
ms.topic: overview
9-
ms.date: 11/17/2024
9+
ms.date: 07/10/2024
1010
ms.service: defender-office-365
1111
appliesto:
1212
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
@@ -21,8 +21,6 @@ This article explains how to enable and customize automatic feedback response fo
2121

2222
## What do you need to know before you begin?
2323

24-
- The alert policy named **Email reported by user as malware or phish** must be enabled for this feature to work (it's on by default). For more information about this alert policy, see [Threat management alert policies](/defender-xdr/alert-policies#threat-management-alert-policies).
25-
2624
- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **User reported settings** page, use <https://security.microsoft.com/securitysettings/userSubmission>.
2725

2826
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:

0 commit comments

Comments
 (0)