You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/activate-capabilities.md
+29-13Lines changed: 29 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ Microsoft Defender for Endpoint customers, who have already onboarded their doma
12
12
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
13
13
14
14
> [!IMPORTANT]
15
-
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](https://learn.microsoft.com/defender-for-identity/deploy/quick-installation-guide)
15
+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](quick-installation-guide.md).
16
16
17
17
## Prerequisites
18
18
@@ -43,7 +43,7 @@ Your domain controller must be onboarded to Microsoft Defender for Endpoint.
43
43
44
44
For more information, see [Onboard a Windows server](/microsoft-365/security/defender-endpoint/onboard-windows-server).
45
45
46
-
### Required permissions
46
+
### Permissions requirements
47
47
48
48
To access the Defender for Identity **Activation** page, you must either be a [Security Administrator](/entra/identity/role-based-access-control/permissions-reference), or have the following Unified RBAC permissions:
49
49
@@ -82,13 +82,32 @@ Set-MDIConfiguration -Mode Domain -Configuration All
82
82
83
83
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
84
84
85
-
1. In the [Defender portal](https://security.microsoft.com), select **Settings > Identities > [Activation](https://security.microsoft.com/settings/identities?tabid=onboarding)**.
85
+
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
86
86
87
-
The**Activation**page lists any detected and eligible domain controllers.
87
+
1. Navigate to **System** >**Settings**> **Identities** > **Activation**.
88
88
89
-
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
89
+
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
90
90
91
-
When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
91
+
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they are discovered, or manually, where you select specific domain controllers from the list of eligible servers.
97
+
98
+
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
106
+
107
+
2. Check that the onboarded domain controller is listed.
108
+
109
+
> [!NOTE]
110
+
> The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
92
111
93
112
## Test activated capabilities
94
113
@@ -106,9 +125,9 @@ Use the following procedures to test your environment for Defender for Identity
106
125
107
126
### Check the ITDR dashboard
108
127
109
-
In the Defender portal, select **Identities > Dashboard** and review the details shown, checking for expected results from your environment.
128
+
In the Defender portal, select **Identities** > **Dashboard**, and review the details shown, checking for expected results from your environment.
110
129
111
-
For more information, see [Work with Defender for Identity's ITDR dashboard (Preview)](../dashboard.md).
130
+
For more information, see [Work with Defender for Identity's ITDR dashboard](../dashboard.md).
112
131
113
132
114
133
### Confirm entity page details
@@ -193,18 +212,15 @@ Test remediation actions on a test user. For example:
193
212
194
213
1. Check Active Directory for the expected activity.
195
214
196
-
> [!NOTE]
197
-
> The current version doesn't collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
198
-
199
-
200
215
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
201
216
202
217
## Deactivate Defender for Identity capabilities on your domain controller
203
218
204
219
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
205
220
206
221
1. In the Defender portal, select **Settings > Identities > Sensors**.
207
-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
222
+
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/get-started.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,10 +25,10 @@ Microsoft Defender for Cloud Apps is a security tool and therefore doesn't requi
25
25
26
26
Microsoft Defender for Cloud Apps depends on the following Microsoft Entra ID applications to function properly. Do not disable these applications in Microsoft Entra ID:
27
27
28
-
- Microsoft Defender for Cloud Apps - APIs
29
-
- Microsoft Defender for Cloud Apps - Customer Experience
30
-
- Microsoft Defender for Cloud Apps - Information Protection
31
-
- Microsoft Defender for Cloud Apps - MIP Server
28
+
- Microsoft Defender for Cloud Apps - APIs (ID: 972bb84a-1d27-4bd3-8306-6b8e57679e8c)
29
+
- Microsoft Defender for Cloud Apps - Customer Experience (ID: 9ba4f733-be8f-4112-9c4a-e3b417c44e7d)
30
+
- Microsoft Defender for Cloud Apps - Information Protection (ID: ac6dbf5e-1087-4434-beb2-0ebf7bd1b883)
31
+
- Microsoft Defender for Cloud Apps - MIP Server (ID: 0858ddce-8fca-4479-929b-4504feeed95e)
Copy file name to clipboardExpand all lines: defender-endpoint/threat-analytics.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.custom:
19
19
- cx-ta
20
20
ms.topic: conceptual
21
21
ms.subservice: edr
22
-
ms.date: 11/12/2024
22
+
ms.date: 02/25/2025
23
23
---
24
24
25
25
# Track and respond to emerging threats through threat analytics
@@ -63,7 +63,7 @@ Each report provides an analysis of a tracked threat and extensive guidance on h
63
63
The following roles and permissions are required to access Threat analytics in the Defender portal:
64
64
65
65
-**Security data basics (read)**—to view threat analytics report, related incidents and alerts, and impacted assets
66
-
-**Vulnerability management (read)** and **Secure Score (read)**—to see related exposure data and recommended actions
66
+
-**Vulnerability management (read)** and **Exposure Management (read)**—to see related exposure data and recommended actions
67
67
68
68
By default, access to services available in the Defender portal are managed collectively using [Microsoft Entra global roles](/defender-xdr/m365d-permissions). If you need greater flexibility and control over access to specific product data, and aren't yet using the [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac) for centralized permissions management, we recommend creating custom roles for each service. [Learn more about creating custom roles](/defender-xdr/custom-roles)
Copy file name to clipboardExpand all lines: defender-xdr/threat-analytics.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ ms.custom:
20
20
- cx-ta
21
21
- seo-marvel-apr2020
22
22
search.appverid: met150
23
-
ms.date: 11/12/2024
23
+
ms.date: 02/25/2025
24
24
---
25
25
26
26
# Threat analytics in Microsoft Defender XDR
@@ -61,7 +61,7 @@ Each report provides an analysis of a tracked threat and extensive guidance on h
61
61
## Required roles and permissions
62
62
The following roles and permissions are required to access Threat analytics in the Defender portal:
63
63
-**Security data basics (read)**—to view threat analytics report, related incidents and alerts, and impacted assets
64
-
-**Vulnerability management (read)** and **Secure Score (read)**—to see related exposure data and recommended actions
64
+
-**Vulnerability management (read)** and **Exposure Management (read)**—to see related exposure data and recommended actions
65
65
66
66
By default, access to services available in the Defender portal are managed collectively using [Microsoft Entra global roles](m365d-permissions.md). If you need greater flexibility and control over access to specific product data, and aren't yet using the [Microsoft Defender XDR Unified role-based access control (RBAC)](manage-rbac.md) for centralized permissions management, we recommend creating custom roles for each service. [Learn more about creating custom roles](custom-roles.md)
0 commit comments