Skip to content

Commit 57214ed

Browse files
authored
Merge branch 'main' into rename-root-folder-ATADocs
2 parents 81f06fe + 82726aa commit 57214ed

File tree

593 files changed

+1961
-1802
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

593 files changed

+1961
-1802
lines changed

ATPDocs/change-password-krbtgt-account.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,9 @@ If the KRBTGT account's password is compromised, an attacker can use its hash to
2929
1. Take appropriate action on those accounts by resetting their password **twice** to invalidate the Golden Ticket attack. 
3030

3131
> [!NOTE]
32-
> The krbtgt Kerberos account in all Active Directory domains supports key storage in all Kerberos Key Distribution Centers (KDC). To renew the Kerberos keys for TGT encryption, periodically change the krbtgt account password. It is recommended to use the [Microsoft-provided script.](https://github.com/microsoft/New-KrbtgtKeys.ps1)
32+
> The krbtgt Kerberos account in all Active Directory domains supports key storage in all Kerberos Key Distribution Centers (KDC). To renew the Kerberos keys for TGT encryption, periodically change the krbtgt account password. It is recommended to use the [Microsoft-provided script.](https://github.com/microsoft/New-KrbtgtKeys.ps1)
33+
> When resetting the password twice, wait at least 10 hours between resets to avoid Kerberos authentication issues. This wait time is enforced by the script and aligns with best practices.
34+
3335
### Next steps
3436

3537
[Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)

ATPDocs/deploy/configure-windows-event-collection.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Use the following procedures to configure auditing on the domain controllers tha
5959

6060
This procedure describes how to modify your domain controller's Advanced Audit Policy settings as needed for Defender for Identity via the UI.
6161

62-
**Related health issue:** [Directory Services Advanced Auditing is not enabled as required](../health-alerts.md)
62+
**Related health issue:** [Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
6363

6464
To configure your Advanced Audit Policy settings:
6565

@@ -100,7 +100,7 @@ To configure your Advanced Audit Policy settings:
100100

101101
1. From an elevated command prompt, enter `gpupdate`.
102102

103-
1. After you apply the policy via GPO, conform that the new events appear in the Event Viewer, under **Windows Logs** > **Security**.
103+
1. After you apply the policy via GPO, confirm that the new events appear in the Event Viewer, under **Windows Logs** > **Security**.
104104

105105
To test your audit policies from the command line, run the following command:
106106

@@ -114,7 +114,7 @@ For more information, see the [auditpol reference documentation](/windows-server
114114
115115
The following actions describe how to modify your domain controller's Advanced Audit Policy settings as needed for Defender for Identity by using PowerShell.
116116
117-
**Related health issue:** [Directory Services Advanced Auditing is not enabled as required](../health-alerts.md)
117+
**Related health issue:** [Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
118118
119119
To configure your settings, run:
120120
@@ -167,7 +167,7 @@ This section describes the extra configuration steps that you need for auditing
167167
> - Domain group policies to collect Windows event 8004 should be applied *only* to domain controllers.
168168
> - When a Defender for Identity sensor parses Windows event 8004, Defender for Identity NTLM authentication activities are enriched with the server-accessed data.
169169
170-
**Related health issue:** [NTLM Auditing is not enabled](../health-alerts.md)
170+
**Related health issue:** [NTLM Auditing isn't enabled](../health-alerts.md)
171171

172172
To configure NTLM auditing:
173173

@@ -192,7 +192,7 @@ To collect events for object changes, such as for event 4662, you must also conf
192192
> [!IMPORTANT]
193193
> Review and audit your policies (via the [UI](#configure-advanced-audit-policy-settings-from-the-ui) or [PowerShell](#configure-advanced-audit-policy-settings-by-using-powershell)) before you enable event collection, to ensure that the domain controllers are properly configured to record the necessary events. If this auditing is configured properly, it should have a minimal effect on server performance.
194194
195-
**Related health issue:** [Directory Services Object Auditing is not enabled as required](../health-alerts.md)
195+
**Related health issue:** [Directory Services Object Auditing isn't enabled as required](../health-alerts.md)
196196

197197
To configure domain object auditing:
198198

@@ -233,7 +233,7 @@ To configure domain object auditing:
233233

234234
![Screenshot of selecting permissions.](../media/select-permissions.png)
235235

236-
Now, all relevant changes to directory services appear as 4662 events when they're triggered.
236+
Now, all relevant changes to directory services appear as 4,662 events when they're triggered.
237237

238238
1. Repeat the steps in this procedure, but for **Applies to**, select the following object types <sup>1</sup>
239239
- **Descendant Group Objects**
@@ -368,7 +368,7 @@ To configure auditing on Microsoft Entra Connect servers:
368368
369369
## Update legacy configurations
370370
371-
Defender for Identity no longer requires logging 1644 events. If you have either of the following settings enabled, you can remove them from the registry.
371+
Defender for Identity no longer requires logging 1,644 events. If you have either of the following settings enabled, you can remove them from the registry.
372372
373373
```reg
374374
Windows Registry Editor Version 5.00

ATPDocs/whats-new.md

Lines changed: 36 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,22 +25,53 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## September 2025
2727

28+
### Microsoft Defender for Identity sensor version updates
29+
30+
|Version number |Updates |
31+
|---------|---------|
32+
|2.248|The improved event log query method now captures a broader range of unique events at scale. As a result, you might notice an increase in captured activities. This update also delivers additional security enhancements and performance improvements.|
33+
34+
### Updates to multiple detections to reduce noise and improve alert accuracy
35+
36+
Several Defender for Identity detections are being updated to reduce noise and improve accuracy, making alerts more reliable and actionable. As the rollout continues, you might see a decrease in the number of alerts raised.
37+
38+
The improvements will gradually take effect across the following detections:
39+
40+
- Suspicious communication over DNS
41+
42+
- Suspected Netlogon privilege elevation attempt (CVE-2020-1472)
43+
44+
- Honeytoken authentication activity
45+
46+
- Remote code execution attempt over DNS
47+
48+
- Suspicious password reset by Microsoft Entra Connect account
49+
50+
- Data exfiltration over SMB
51+
52+
- Suspected skeleton key attack (encryption downgrade)
53+
54+
- Suspicious modification of Resource Based Constrained Delegation by a machine account
55+
56+
- Remote code execution attempt
57+
58+
2859
### Unified connectors is now available for Okta Single Sign-On connectors (Preview)
2960

3061
Microsoft Defender for Identity supports the [Unified connectors](/azure/sentinel/unified-connector) experience, starting with the Okta Single Sign-On connector. This enables Defender for Identity to collect Okta system logs once and share them across supported Microsoft security products, reducing API usage and improving connector efficiency.
3162

32-
For more information see: [Connect Okta to Microsoft Defender for Identity (Preview)](okta-integration.md)
63+
For more information, see: [Connect Okta to Microsoft Defender for Identity (Preview)](okta-integration.md)
3364

3465

3566
## August 2025
3667

3768
### Microsoft Entra ID risk level is now available in near real time in Microsoft Defender for Identity (Preview)
3869

39-
Entra ID risk level is now available on the Identity Inventory assets page, the identity details page, and in the IdentityInfo table in Advanced Hunting, and includes the Entra ID risk score. SOC analysts can use this data to correlate risky users with sensitive or highly privileged users, create custom detections based on current or historical user risk, and improve investigation context.
70+
Microsoft Entra ID risk level is now available on the Identity Inventory assets page, the identity details page, and in the IdentityInfo table in Advanced Hunting, and includes the Microsoft Entra ID risk score. SOC analysts can use this data to correlate risky users with sensitive or highly privileged users, create custom detections based on current or historical user risk, and improve investigation context.
4071

41-
Previously, Defender for Identity tenants received Entra ID risk level in the IdentityInfo table through user and entity behavior analytics (UEBA). With this update, the Entra ID risk level is now updated in near real time through Microsoft Defender for Identity.
72+
Previously, Defender for Identity tenants received Microsoft Entra ID risk level in the IdentityInfo table through user and entity behavior analytics (UEBA). With this update, the Microsoft Entra ID risk level is now updated in near real time through Microsoft Defender for Identity.
4273

43-
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Entra ID risk level to the IdentityInfo table remains unchanged.
74+
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Microsoft Entra ID risk level to the IdentityInfo table remains unchanged.
4475

4576
### New security assessment: Remove stale service accounts (Preview)
4677

@@ -478,7 +509,7 @@ Defender for Identity added the new **Edit insecure ADCS certificate enrollment
478509

479510
Active Directory Certificate Services (AD CS) supports certificate enrollment through various methods and protocols, including enrollment via HTTP using the Certificate Enrollment Service (CES) or the Web Enrollment interface (Certsrv). Insecure configurations of the CES or Certsrv IIS endpoints might create vulnerabilities to relay attacks (ESC8).
480511

481-
The new **Edit insecure ADCS certificate enrollment IIS endpoints (ESC8)** recommendation is added to other AD CS-related recommendations recently released. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that post risks to the entire organization, together with related detections.
512+
The new **Edit insecure ADCS certificate enrollment IIS endpoints (ESC8)** recommendation is added to other AD CS-related recommendations recently released. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that pose risks to the entire organization, together with related detections.
482513

483514
For more information, see:
484515

CloudAppSecurityDocs/app-governance-app-policies-get-started.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Get started with app governance policies | Microsoft Defender for Cloud Apps
3-
ms.date: 05/28/2023
3+
ms.date: 08/31/2025
44
ms.topic: how-to
55
description: Get started learning about app governance policies with Microsoft Defender for Cloud Apps in Microsoft Defender XDR
6+
ms.reviewer: shragar456
67
---
78

89
# Get started with app policies
@@ -23,22 +24,21 @@ To see your list of current app policies, go to the **Microsoft Defender XDR > A
2324

2425
For example:
2526

26-
![Screenshot of the app governance policies summary page in Microsoft Defender XDR.](media/app-governance-app-policies-get-started/azure-ad-policies.jpg)
27+
:::image type="content" source="media/app-governance-app-policies-get-started/app-governance-app-policies.png" alt-text="Screenshot that shows the app governance app polcies." lightbox="media/app-governance-app-policies-get-started/app-governance-app-policies.png":::
2728

2829
> [!NOTE]
2930
> Built-in threat detection policies aren't listed on the **Policies** tab. For more information, see [Investigate threat detection alerts](app-governance-anomaly-detection-alerts.md).
3031
>
3132
3233
## What’s available on the app policies dashboard
3334

34-
The **App governance** > **Policies** tab shows the number of active, inactive, and audit mode policies, and the following information for each policy:
35+
The **App governance** > **Policies** tab shows the number of active and disabled policies, and the following information for each policy:
3536

3637
- **Policy name**
3738
- **Status**
3839

3940
- **Active**: All policy evaluation and actions are active.
40-
- **Inactive**: All policy evaluation and actions are disabled.
41-
- **Audit mode**: Policy evaluation is active (alerts will trigger) but policy actions are disabled.
41+
- **Disabled**: All policy evaluation and actions are disabled.
4242

4343
- **Severity**: Severity level set on any alerts triggered because of this policy being evaluated as true, which is part of the configuration of the policy.
4444
- **Active alerts**: Number of alerts generated by the policy that have an **In Progress** or **New** status.
@@ -74,22 +74,24 @@ You can also:
7474

7575
1. Select **Edit**.
7676

77-
While you can't change the name of the policy once created, but you can change the description and policy severity as needed. When you're done, select **Next**.
77+
While you can't change the name of the policy once created, you can change the description and policy severity as needed. When you're done, select **Next**.
7878

7979
1. Choose whether you want to continue with the existing policy settings or customize them. Select **No, I'll customize the policy** to make changes, and then select **Next**.
8080

81-
1. Choose whether this policy applies to all apps, specific apps, or all apps except the apps you select. Select **Choose apps** to select which apps to apply the policy to, and then select **Next**.
81+
1. Choose whether this policy applies to all apps, specific apps, or all apps except the apps you select.
82+
83+
1. Select **Choose apps** to select which apps to apply the policy to, and then select **Next**.
8284

8385
1. Choose whether to modify the existing conditions of the policy.
8486

8587
- If you choose to modify the conditions, select **Edit or modify existing conditions for the policy** and choose which policy conditions to apply.
8688
- Otherwise, select **Use existing conditions of the policy**.
8789

88-
When you're done, select **Next**.
90+
1. When you're done, select **Next**.
8991

9092
1. Choose whether to disable the app if it triggers the policy conditions and then select **Next**.
9193

92-
1. Set the policy status to **Audit** mode, **Active**, or **Inactive**, as needed, and then select **Next**.
94+
1. Set the policy status to **Active**, or **Disabled**, as needed, and then select **Next**.
9395

9496
1. Review your setting choices for the policy and if everything is the way you want it, select **Submit**.
9597

CloudAppSecurityDocs/app-governance-app-policies-manage.md

Lines changed: 14 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Manage app policies
3-
ms.date: 05/21/2023
3+
ms.date: 09/08/2025
44
ms.topic: how-to
55
description: Manage your app governance policies.
6+
ms.reviewer: shragar456
67
---
78

89
# Manage app policies
@@ -12,55 +13,35 @@ Use app governance to manage OAuth policies for Microsoft 365, Google Workspace,
1213
You might need to manage your app policies as follows to keep up-to-date with your organization's apps, respond to new app-based attacks, and for ongoing changes to your app compliance needs:
1314

1415
- Create new policies targeted at new apps
15-
- Change the status of an existing policy (active, inactive, audit mode)
16+
- Change the status of an existing policy (active or disable)
1617
- Change the conditions of an existing policy
1718
- Change the actions of an existing policy for auto-remediation of alerts
1819

19-
<a name='manage-oauth-app-policies-for-azure-ad'></a>
2020

21-
## Manage OAuth app policies for Microsoft Entra ID
22-
23-
Here's an example of a process for managing an existing policy for Microsoft Entra apps:
24-
25-
1. Edit the policy:
26-
27-
- Change the settings of the policy.
28-
- If needed, change the status to **Audit mode** for testing.
29-
30-
1. Check for expected behavior, such as alerts generated.
31-
1. If the behavior isn't expected, go back to step 1.
32-
1. If the behavior is expected, edit the policy and change its status to active (if needed).
33-
34-
For example:
35-
36-
:::image type="content" source="media/app-governance/mapg-manage-policy-process.png" alt-text="Diagram of the manage app policy workflow." lightbox="media/app-governance/mapg-manage-policy-process.png" border="false":::
21+
## Editing an app policy configuration
3722

38-
> [!NOTE]
39-
> Following the change in the **Activity type** filter, policies with the previous filter will have a "LEGACY" label attached to the filter and if the policies are edited or deleted the filter can't be restored.
23+
To change the configuration of a user defined app policy:
4024

41-
## Editing an app policy configuration
25+
1. Select the policy in the policy list, and then select **Edit** on the app policy pane.
4226

43-
To change the configuration of an existing app policy:
27+
1. In the **Edit policy** page, you can make the following changes:
4428

45-
- Select the policy in the policy list, and then select **Edit** on the app policy pane.
46-
- Select the vertical ellipses for the policy in the list, and then select **Edit**.
29+
- **Description**: Change the description to make it easier to understand the policy's purpose.
30+
- **Severity** : Change the severity for your app policy to low, medium, or high.
31+
- **Policy settings**: Change the set of apps to which the policy applies. You can also choose to use the existing conditions or modify the conditions
32+
- **Actions**: Change the autoremediation action for alerts generated by the policy.
33+
- **Status**: Change the policy status.
4734

48-
For the **Edit policy** page, step through the pages and make the appropriate changes:
35+
:::image type="content" source="media/app-governance-app-policies-manage/edit-user-defined-policy.png" alt-text="Screenshot that shows how to edit a user defined policy in the Defender portal. " lightbox="media/app-governance-app-policies-manage/edit-user-defined-policy.png":::
4936

50-
- **Description**: Change the description to make it easier to understand the policy's purpose.
51-
- **Severity**
52-
- **Policy settings**: Change the set of apps to which the policy applies. You can also choose to use the existing conditions or modify the conditions
53-
- **Actions**: Change the autoremediation action for alerts generated by the policy.
54-
- **Status**: Change the policy status.
5537

5638
## Deleting an app policy
5739

5840
To delete an app policy, you can:
5941

6042
- Select the policy in the policy list, and then select **Delete** on the app policy pane.
61-
- Select the vertical ellipses for the policy in the list, and then select **Delete**.
6243

63-
An alternative to deleting an app policy is to change its status to inactive. Once inactive, the policy doesn't generate alerts. For example, rather than deleting an app policy for an app with a specific set of conditions that are useful for a future policy, rename the app policy to indicate its usefulness and set its status to inactive. You can later return to the policy and modify it for a similar app and set its status to audit mode or inactive.
44+
An alternative to deleting an app policy is to change its status to disabled. Once disabled, the policy doesn't generate alerts. For example, rather than deleting an app policy for an app with a specific set of conditions that are useful for a future policy, rename the app policy to indicate its usefulness and set its status to disabled.
6445

6546
## Next steps
6647

CloudAppSecurityDocs/app-governance-detect-remediate-get-started.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Get started with app governance threat detection and remediation | Microsoft Defender for Cloud Apps
3-
ms.date: 05/28/2023
3+
ms.date: 08/31/2025
44
ms.topic: overview
55
description: Get started with app governance threat detection and remediation in Microsoft Defender XDR with Microsoft Defender for Cloud Apps.
6+
ms.reviewer: shragar456
67
---
78

89
# Get started with app threat detection and remediation
@@ -13,7 +14,8 @@ To view the latest incidents associated with these alerts, go to the **App gover
1314

1415
For example:
1516

16-
:::image type="content" source="media/app-governance/mapg-cc-overview-alerts.png" alt-text="Screenshot of the App governance > Overview tab with the Latest alerts section highlighted." lightbox="media/app-governance/mapg-cc-overview-alerts.png":::
17+
:::image type="content" source="media/app-governance/app-governance-overview.png" alt-text="Screenshot that shows the App Governance overview tab." lightbox="media/app-governance/app-governance-overview.png":::
18+
1719

1820
On the **Overview** tab, the **Latest alerts** section lists the most recent alerts. You can use these recent alerts to quickly see the current app alert activity for your tenant.
1921

CloudAppSecurityDocs/app-governance-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ You must have at least one of these roles to turn on app governance:
6363
- Security Admin          
6464
- Compliance Admin  
6565
- Compliance Data Admin
66-
- Cloud App Security admin
66+
- Cloud App Security Admin
6767

6868
The following table lists the app governance capabilities for each role.
6969

0 commit comments

Comments
 (0)