Skip to content

Commit 5514fea

Browse files
committed
Merge branch 'main' into Submissions-chrisda
2 parents 22b9928 + 16b64f3 commit 5514fea

File tree

7 files changed

+37
-21
lines changed

7 files changed

+37
-21
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 29 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Microsoft Defender for Endpoint customers, who have already onboarded their doma
1212
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
1313

1414
> [!IMPORTANT]
15-
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](https://learn.microsoft.com/defender-for-identity/deploy/quick-installation-guide)
15+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](quick-installation-guide.md).
1616
1717
## Prerequisites
1818

@@ -43,7 +43,7 @@ Your domain controller must be onboarded to Microsoft Defender for Endpoint.
4343

4444
For more information, see [Onboard a Windows server](/microsoft-365/security/defender-endpoint/onboard-windows-server).
4545

46-
### Required permissions
46+
### Permissions requirements
4747

4848
To access the Defender for Identity **Activation** page, you must either be a [Security Administrator](/entra/identity/role-based-access-control/permissions-reference), or have the following Unified RBAC permissions:
4949

@@ -82,13 +82,32 @@ Set-MDIConfiguration -Mode Domain -Configuration All
8282

8383
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
8484

85-
1. In the [Defender portal](https://security.microsoft.com), select **Settings > Identities > [Activation](https://security.microsoft.com/settings/identities?tabid=onboarding)**.
85+
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
8686

87-
The **Activation** page lists any detected and eligible domain controllers.
87+
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
8888

89-
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
89+
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
9090

91-
When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
91+
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
92+
93+
![Activation Defensor.](media/activate-capabilities/1.png)
94+
95+
> [!NOTE]
96+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they are discovered, or manually, where you select specific domain controllers from the list of eligible servers.
97+
98+
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
99+
![Sensors page.](media/activate-capabilities/2.png)
100+
101+
## Onboarding Confirmation
102+
103+
To confirm the sensor has been onboarded:
104+
105+
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
106+
107+
2. Check that the onboarded domain controller is listed.
108+
109+
> [!NOTE]
110+
> The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
92111
93112
## Test activated capabilities
94113

@@ -106,9 +125,9 @@ Use the following procedures to test your environment for Defender for Identity
106125

107126
### Check the ITDR dashboard
108127

109-
In the Defender portal, select **Identities > Dashboard** and review the details shown, checking for expected results from your environment.
128+
In the Defender portal, select **Identities** > **Dashboard**, and review the details shown, checking for expected results from your environment.
110129

111-
For more information, see [Work with Defender for Identity's ITDR dashboard (Preview)](../dashboard.md).
130+
For more information, see [Work with Defender for Identity's ITDR dashboard](../dashboard.md).
112131

113132

114133
### Confirm entity page details
@@ -193,18 +212,15 @@ Test remediation actions on a test user. For example:
193212
194213
1. Check Active Directory for the expected activity.
195214
196-
> [!NOTE]
197-
> The current version doesn't collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
198-
199-
200215
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
201216
202217
## Deactivate Defender for Identity capabilities on your domain controller
203218
204219
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
205220
206221
1. In the Defender portal, select **Settings > Identities > Sensors**.
207-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
222+
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
223+
![Offboarding defensor.](media/activate-capabilities/3.png)
208224
209225
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
210226
55 KB
Loading
49.7 KB
Loading
37.7 KB
Loading

CloudAppSecurityDocs/get-started.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,10 +25,10 @@ Microsoft Defender for Cloud Apps is a security tool and therefore doesn't requi
2525

2626
Microsoft Defender for Cloud Apps depends on the following Microsoft Entra ID applications to function properly. Do not disable these applications in Microsoft Entra ID:
2727

28-
- Microsoft Defender for Cloud Apps - APIs
29-
- Microsoft Defender for Cloud Apps - Customer Experience
30-
- Microsoft Defender for Cloud Apps - Information Protection
31-
- Microsoft Defender for Cloud Apps - MIP Server
28+
- Microsoft Defender for Cloud Apps - APIs (ID: 972bb84a-1d27-4bd3-8306-6b8e57679e8c)
29+
- Microsoft Defender for Cloud Apps - Customer Experience (ID: 9ba4f733-be8f-4112-9c4a-e3b417c44e7d)
30+
- Microsoft Defender for Cloud Apps - Information Protection (ID: ac6dbf5e-1087-4434-beb2-0ebf7bd1b883)
31+
- Microsoft Defender for Cloud Apps - MIP Server (ID: 0858ddce-8fca-4479-929b-4504feeed95e)
3232

3333
## Access Defender for Cloud Apps
3434

defender-endpoint/threat-analytics.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom:
1919
- cx-ta
2020
ms.topic: conceptual
2121
ms.subservice: edr
22-
ms.date: 11/12/2024
22+
ms.date: 02/25/2025
2323
---
2424

2525
# Track and respond to emerging threats through threat analytics
@@ -63,7 +63,7 @@ Each report provides an analysis of a tracked threat and extensive guidance on h
6363
The following roles and permissions are required to access Threat analytics in the Defender portal:
6464

6565
- **Security data basics (read)**—to view threat analytics report, related incidents and alerts, and impacted assets
66-
- **Vulnerability management (read)** and **Secure Score (read)**—to see related exposure data and recommended actions
66+
- **Vulnerability management (read)** and **Exposure Management (read)**—to see related exposure data and recommended actions
6767

6868
By default, access to services available in the Defender portal are managed collectively using [Microsoft Entra global roles](/defender-xdr/m365d-permissions). If you need greater flexibility and control over access to specific product data, and aren't yet using the [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac) for centralized permissions management, we recommend creating custom roles for each service. [Learn more about creating custom roles](/defender-xdr/custom-roles)
6969

defender-xdr/threat-analytics.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.custom:
2020
- cx-ta
2121
- seo-marvel-apr2020
2222
search.appverid: met150
23-
ms.date: 11/12/2024
23+
ms.date: 02/25/2025
2424
---
2525

2626
# Threat analytics in Microsoft Defender XDR
@@ -61,7 +61,7 @@ Each report provides an analysis of a tracked threat and extensive guidance on h
6161
## Required roles and permissions
6262
The following roles and permissions are required to access Threat analytics in the Defender portal:
6363
- **Security data basics (read)**—to view threat analytics report, related incidents and alerts, and impacted assets
64-
- **Vulnerability management (read)** and **Secure Score (read)**—to see related exposure data and recommended actions
64+
- **Vulnerability management (read)** and **Exposure Management (read)**—to see related exposure data and recommended actions
6565

6666
By default, access to services available in the Defender portal are managed collectively using [Microsoft Entra global roles](m365d-permissions.md). If you need greater flexibility and control over access to specific product data, and aren't yet using the [Microsoft Defender XDR Unified role-based access control (RBAC)](manage-rbac.md) for centralized permissions management, we recommend creating custom roles for each service. [Learn more about creating custom roles](custom-roles.md)
6767

0 commit comments

Comments
 (0)