Skip to content

Commit 5753d6e

Browse files
authored
Merge branch 'main' into WI365440-remove-broken-link-in-the-Discovery-doc-page
2 parents 4cd6bc2 + ed97e9b commit 5753d6e

File tree

857 files changed

+9276
-9346
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

857 files changed

+9276
-9346
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ For more information about the exception criteria and exception process, see [Mi
3939
4040
Select the total score link to review all feedback on clarity, consistency, tone, brand, terms, spelling, grammar, readability, and inclusive language. _You should fix all spelling errors regardless of your total score_. Fixing spelling errors helps maintain customer trust in overall content quality.
4141
42-
| Article | Total score<br>(Required: 80) | Words + phrases<br>(Brand, terms) | Correctness<br>(Spelling, grammar) | Clarity<br>(Readability) |
42+
| Article | Total score<br>(Required: 80) | Terminology | Spelling and Grammar| Clarity<br>(Readability) |
4343
|---------|:--------------:|:--------------------:|:------:|:---------:|
4444
"
4545

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
name: PR has no warnings or errors
2+
3+
permissions:
4+
pull-requests: write
5+
statuses: write
6+
7+
on:
8+
issue_comment:
9+
types: [created]
10+
11+
jobs:
12+
13+
build-status:
14+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-BuildValidation.yml@workflows-prod
15+
with:
16+
PayloadJson: ${{ toJSON(github) }}
17+
secrets:
18+
AccessToken: ${{ secrets.GITHUB_TOKEN }}
19+
20+
21+

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -994,6 +994,16 @@
994994
"source_path": "CloudAppSecurityDocs/what-is-cloud-app-security.md",
995995
"redirect_url": "/defender-cloud-apps/what-is-defender-for-cloud-apps",
996996
"redirect_document_id": true
997+
},
998+
{
999+
"source_path": "CloudAppSecurityDocs/tutorial-ueba.md",
1000+
"redirect_url": "/defender-cloud-apps/",
1001+
"redirect_document_id": true
1002+
},
1003+
{
1004+
"source_path": "CloudAppSecurityDocs/file-filters.md",
1005+
"redirect_url": "/defender-cloud-apps/data-protection-policies",
1006+
"redirect_document_id": false
9971007
}
9981008
]
9991009
}

.openpublishing.redirection.defender-endpoint.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,11 @@
7979
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
8080
"redirect_url": "/defender-xdr/pilot-deploy-defender-endpoint",
8181
"redirect_document_id": false
82-
}
82+
},
83+
{
84+
"source_path": "defender-endpoint/monthly-security-summary-report.md",
85+
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
86+
"redirect_document_id": true
87+
}
8388
]
8489
}

.openpublishing.redirection.defender-xdr.json

Lines changed: 86 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@
1010
"redirect_url": "/defender-for-identity/microsoft-365-security-center-mdi",
1111
"redirect_document_id": false
1212
},
13-
1413
{
1514
"source_path": "defender-xdr/eval-create-eval-environment.md",
1615
"redirect_url": "/defender-xdr/pilot-deploy-overview",
@@ -131,6 +130,11 @@
131130
"redirect_url": "/defender-xdr/entity-page-device",
132131
"redirect_document_id": true
133132
},
133+
{
134+
"source_path": "defender-xdr/unlink-alert-from-incident.md",
135+
"redirect_url": "/defender-xdr/move-alert-to-another-incident",
136+
"redirect_document_id": true
137+
},
134138
{
135139
"source_path": "defender-xdr/unified-secops-platform/defender-xdr-portal.md",
136140
"redirect_url": "/defender-xdr/",
@@ -166,6 +170,31 @@
166170
"redirect_url": "/defender-xdr/",
167171
"redirect_document_id": false
168172
},
173+
{
174+
"source_path": "defender-xdr/microsoft-threat-actor-naming.md",
175+
"redirect_url": "/unified-secops-platform/microsoft-threat-actor-naming",
176+
"redirect_document_id": false
177+
},
178+
{
179+
"source_path": "defender-xdr/malware-naming.md",
180+
"redirect_url": "/unified-secops-platform/malware-naming",
181+
"redirect_document_id": false
182+
},
183+
{
184+
"source_path": "defender-xdr/criteria.md",
185+
"redirect_url": "/unified-secops-platform/criteria",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path": "defender-xdr/submission-guide.md",
190+
"redirect_url": "/unified-secops-platform/submission-guide",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path": "defender-xdr/virus-initiative-criteria.md",
195+
"redirect_url": "/unified-secops-platform/virus-initiative-criteria",
196+
"redirect_document_id": false
197+
},
169198
{
170199
"source_path": "defender-xdr/tickets.md",
171200
"redirect_url": "/defender-xdr/troubleshoot",
@@ -175,6 +204,61 @@
175204
"source_path": "defender-xdr/portal-submission-troubleshooting.md",
176205
"redirect_url": "/defender-xdr/troubleshoot",
177206
"redirect_document_id": false
207+
},
208+
{
209+
"source_path": "defender-xdr/mto-advanced-hunting.md",
210+
"redirect_url": "/unified-secops-platform/mto-advanced-hunting",
211+
"redirect_document_id": false
212+
},
213+
{
214+
"source_path": "defender-xdr/mto-dashboard.md",
215+
"redirect_url": "/unified-secops-platform/mto-dashboard",
216+
"redirect_document_id": false
217+
},
218+
{
219+
"source_path": "defender-xdr/mto-endpoint-security-policy.md",
220+
"redirect_url": "/unified-secops-platform/mto-endpoint-security-policy",
221+
"redirect_document_id": false
222+
},
223+
{
224+
"source_path": "defender-xdr/mto-incidents-alerts.md",
225+
"redirect_url": "/unified-secops-platform/mto-incidents-alerts",
226+
"redirect_document_id": false
227+
},
228+
{
229+
"source_path": "defender-xdr/mto-overview.md",
230+
"redirect_url": "/unified-secops-platform/mto-overview",
231+
"redirect_document_id": false
232+
},
233+
{
234+
"source_path": "defender-xdr/mto-requirements.md",
235+
"redirect_url": "/unified-secops-platform/mto-requirements",
236+
"redirect_document_id": false
237+
},
238+
{
239+
"source_path": "defender-xdr/mto-tenant-devices.md",
240+
"redirect_url": "/unified-secops-platform/mto-tenant-devices",
241+
"redirect_document_id": false
242+
},
243+
{
244+
"source_path": "defender-xdr/mto-tenantgroups.md",
245+
"redirect_url": "/unified-secops-platform/mto-tenantgroups",
246+
"redirect_document_id": false
247+
},
248+
{
249+
"source_path": "defender-xdr/mto-tenants.md",
250+
"redirect_url": "/unified-secops-platform/mto-tenants",
251+
"redirect_document_id": false
252+
},
253+
{
254+
"source_path": "defender-xdr/portals.md",
255+
"redirect_url": "/unified-secops-platform/overview-plan#understand-microsoft-security-portals-and-admin-centers",
256+
"redirect_document_id": false
257+
},
258+
{
259+
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
260+
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
261+
"redirect_document_id": false
178262
}
179263
]
180-
}
264+
}

ATADocs/docfx.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,13 @@
4848
"uhfHeaderId": "MSDocsHeader-M365-IT",
4949
"searchScope": ["ATA"],
5050
"contributors_to_exclude": [
51-
"beccarobins"
51+
"beccarobins",
52+
"rjagiewich",
53+
"claydetels19",
54+
"garycentric",
55+
"padmagit77",
56+
"aditisrivastava07",
57+
"Ruchika-mittal01"
5258
]
5359
},
5460
"markdownEngineName": "markdig"

ATADocs/index.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ metadata:
88
description: Protect your enterprise using information from multiple network data-sources to learn the behavior of users and entities in your organization.
99
services: service
1010
ms.service: advanced-threat-analytics
11-
ms.subservice: ms.subservice
1211
ms.topic: landing-page
1312
ms.collection: M365-security-compliance
1413
author: batamig
-43.2 KB
Binary file not shown.

ATPDocs/deploy/active-directory-federation-services.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,9 +55,6 @@ Configure the SQL server to allow the Directory Service Account with the followi
5555
- *read*
5656
- *select*
5757

58-
> [!NOTE]
59-
> If the AD FS database runs on a dedicated SQL server instead of the local AD FS server, and you're using a group Managed Service Account (gMSA) as the Directory Service Account, make sure that you grant the SQL server the [required permissions](create-directory-service-account-gmsa.md#prerequisites-grant-permissions-to-retrieve-the-gmsa-accounts-password) to retrieve the gMSA's password.
60-
6158
### Grant access to the AD FS database
6259

6360
Grant access to the AD FS database by using SQL Server Management Studio, Transact-SQL (T-SQL), or PowerShell.

ATPDocs/deploy/deploy-defender-identity.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,8 @@ Use the following steps to prepare for deploying Defender for Identity:
5050
1. [Plan your Defender for Identity capacity](capacity-planning.md).
5151

5252
> [!TIP]
53-
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if your environment has the necessary prerequisites.
54-
>
55-
> The link to the *Test-MdiReadiness.ps1* script is also available from Microsoft Defender XDR, on the **Identities > Tools** page (Preview).
53+
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if the servers in your environment have the necessary prerequisites.
54+
> You can use the [DefenderForIdentity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/) to add the required auditing and configure the necessary settings.
5655
5756
## Deploy Defender for Identity
5857

@@ -71,12 +70,12 @@ The following procedures help you complete the deployment process:
7170

7271
- [**Enable and configure unified role-based access control (RBAC)**](../role-groups.md) for Defender for Identity.
7372

74-
- [**Configure a Directory Service account (DSA) for use with Defender for Identity**](directory-service-accounts.md). While a DSA is optional in some scenarios, we recommend that you configure a DSA for Defender for Identity for full security coverage. For example, when you have a DSA configured, the DSA is used to connect to the domain controller at startup. A DSA can also be used to query the domain controller for data on entities seen in network traffic, monitored events, and monitored ETW activities
73+
- [**Configure a Directory Service account (DSA) for use with Defender for Identity**](directory-service-accounts.md). While a DSA is optional in some scenarios, we recommend that you configure a DSA for Defender for Identity for full security coverage. For example, when you have a DSA configured, the DSA is used to connect to the domain controller at startup. A DSA can also be used to query the domain controller for data on entities seen in network traffic, monitored events, and monitored ETW activities.
7574

7675
- [**Configure remote calls to SAM**](remote-calls-sam.md) as needed. While this step is optional, we recommend that you configure remote calls to SAM-R for lateral movement path detection with Defender for Identity.
7776

7877
> [!TIP]
79-
> By default, Defender for Identity sensors query the directory using LDAP on ports 389 and 3268. To switch to LDAPS on ports 636 and 3269, please open a support case. For more information, see [Microsoft Defender for Identity support](../support.md).
78+
> By default, Defender for Identity sensors query the directory using LDAP on ports 389 and 3268. To switch to LDAPS on ports 636 and 3269, open a support case. For more information, see [Microsoft Defender for Identity support](../support.md).
8079
>
8180
8281
> [!IMPORTANT]

0 commit comments

Comments
 (0)