Skip to content

Commit 5889ed3

Browse files
authored
Merge branch 'main' into 1c4245c1-ab45-4c2b-bb00-c5e57dc43c42_39
2 parents 509a6a4 + 08004d5 commit 5889ed3

File tree

49 files changed

+134
-105
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+134
-105
lines changed

ATPDocs/alerts-overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,6 @@ The following table lists the mapping between alert names, their corresponding u
9898
| [Suspicious modifications to the AD CS security permissions/settings](persistence-privilege-escalation-alerts.md#suspicious-modifications-to-the-ad-cs-security-permissionssettings--external-id-2435) | 2435 | Medium | Privilege escalation |
9999
| [Account Enumeration reconnaissance (LDAP)](reconnaissance-discovery-alerts.md#account-enumeration-reconnaissance-ldap-external-id-2437-preview) (Preview) | 2437 | Medium | Account Discovery, Domain Account |
100100
| [Directory Services Restore Mode Password Change](other-alerts.md#directory-services-restore-mode-password-change-external-id-2438) | 2438 | Medium | Persistence, Account Manipulation |
101-
| [Honeytoken was queried via SAM-R](reconnaissance-discovery-alerts.md#honeytoken-was-queried-via-sam-r-external-id-2439) | 2439 | Low | Discovery |
102101
|[Group Policy Tampering ](/defender-for-identity/other-alerts)|2440|Medium|Defense evasion|
103102

104103
> [!NOTE]

ATPDocs/deploy/configure-windows-event-collection.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Configure audit policies for Windows event logs | Microsoft Defender for Identity
33
description: This article describes how to configure audit policies for Windows event logs as part of deploying a Microsoft Defender for Identity sensor.
4-
ms.date: 01/16/2024
4+
ms.date: 06/04/2025
55
ms.topic: how-to
66
ms.reviewer: rlitinsky
77
---
@@ -240,6 +240,7 @@ To configure domain object auditing:
240240
- **Descendant Computer Objects**
241241
- **Descendant msDS-GroupManagedServiceAccount Objects**
242242
- **Descendant msDS-ManagedServiceAccount Objects**
243+
- **Descendant msDS-DelegatedManagedServiceAccount Objects**
243244

244245
> [!NOTE]
245246
> Assigning the auditing permissions on **All descendant objects** would also work, but you need only the object types detailed in the last step.

ATPDocs/privacy-compliance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Your data is kept and is available to you while the license is under grace perio
4646

4747
## Data sharing
4848

49-
Defender for Identity shares data, including customer data, among any of the following Microsoft products that are also licensed by the customer:
49+
Defender for Identity shares data, including customer data, among any of the following Microsoft products that are also licensed by the customer. For customers in the Government Community Cloud (GCC), data sharing between government and commercial cloud environments may occur, depending on the location of the service offering.
5050

5151
- Microsoft Defender XDR
5252
- Microsoft Defender for Cloud Apps

ATPDocs/reconnaissance-discovery-alerts.md

Lines changed: 0 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -173,25 +173,6 @@ None
173173
|MITRE attack technique | [Account Discovery (T1087)](https://attack.mitre.org/techniques/T1087/), [Indirect Command Execution (T1202)](https://attack.mitre.org/techniques/T1202/), [Permission Groups Discovery (T1069)](https://attack.mitre.org/techniques/T1069/) |
174174
|MITRE attack sub-technique | [Domain Account (T1087.002)](https://attack.mitre.org/techniques/T1087/002/), [Domain Groups (T1069.002)](https://attack.mitre.org/techniques/T1069/002/) |
175175

176-
## Honeytoken was queried via SAM-R (external ID 2439)
177-
178-
**Severity**: Low
179-
180-
**Description**:
181-
182-
User reconnaissance is used by attackers to map the directory structure and target privileged accounts for later steps in their attack. The Security Account Manager Remote (SAM-R) protocol is one of the methods used to query the directory to perform this type of mapping.
183-
In this detection, Microsoft Defender for Identity will trigger this alert for any reconnaissance activities against a pre-configured [honeytoken user](entity-tags.md)
184-
185-
**Learning period**:
186-
187-
None
188-
189-
**MITRE**:
190-
191-
|Primary MITRE tactic |[Discovery (TA0007)](https://attack.mitre.org/tactics/TA0007/) |
192-
|---------|---------|
193-
|MITRE attack technique | [Account Discovery (T1087)](https://attack.mitre.org/techniques/T1087/)|
194-
|MITRE attack sub-technique | [Domain Account (T1087.002)](https://attack.mitre.org/techniques/T1087/002/)|
195176

196177
## Honeytoken was queried via LDAP (external ID 2429)
197178

ATPDocs/remediation-actions.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,24 @@ The following Defender for Identity actions can be performed directly on your on
3939

4040
- **Reset user password** – This will prompt the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts.
4141

42+
- **Mark User Compromised** - The user’s risk level is set to High
43+
44+
- **Suspend User in Entra ID** - Block new sign-ins and access to cloud resources
45+
46+
- **Require User to Sign In Again** - Revoke a user’s active sessions
47+
4248
Depending on your Microsoft Entra ID roles, you might see additional Microsoft Entra ID actions, such as requiring users to sign in again and confirming a user as compromised. For more information, see [Remediate risks and unblock users](/entra/id-protection/howto-identity-protection-remediate-unblock).
4349

50+
## Roles and Permissions
51+
52+
| Action | XDR RBAC permissions |
53+
| ------------------------------------- | ------------------------------------------------------------ |
54+
|Mark User Compromised | - Global Administrator <br> - Security Administrator|
55+
|Suspend User in Entra ID | - Global Administrator |
56+
|Require User to Sign In Again | - Global Administrator <br>|
57+
| Disable/Enable User in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
58+
| Force Password Reset in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
59+
4460

4561
## Related videos
4662

ATPDocs/whats-new.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,23 @@ For more information, see also:
2323

2424
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2525

26+
## June 2025
27+
28+
### DefenderForIdentity PowerShell module updates (version 1.0.0.4)
29+
30+
New Features and Improvements:
31+
- Added remote domain functionality
32+
- Added SensorType parameter to Test-MDISensorApiConnection to inform endpoint URL.
33+
- Added ability to Get/Set/Test the Deleted Objects container permissions.
34+
- Added auditing for Delegated Managed Service Accounts (dMSA) in the DomainObjectAuditing configuration.
35+
36+
Bug Fixes:
37+
- Fixed audit verification checks for non-English operating systems.
38+
- Fixed DomainObjectAuditing identity redundant parameter bug.
39+
- Fixed Domain Controller detection logic to confirm AD Web Services is running on the server.
40+
- Fixed issue with Test-MDIDSA not parsing Deleted Object permissions.
41+
- Other reliability fixes.
42+
2643
## May 2025
2744

2845
### Expanded New Sensor Deployment Support for Domain Controllers (Preview)

CloudAppSecurityDocs/cas-compliance-trust.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Your data is kept and is available to you while the license is under grace perio
6262

6363
## Data sharing for Microsoft Defender for Cloud Apps
6464

65-
Defender for Cloud Apps shares data, including customer data, among the following Microsoft products also licensed by the customer:
65+
Defender for Cloud Apps shares data, including customer data, among the following Microsoft products also licensed by the customer. For customers in the Government Community Cloud (GCC), data sharing between government and commercial cloud environments may occur, depending on the location of the service offering.
6666

6767
- Microsoft Defender XDR
6868
- Microsoft Defender for Cloud

CloudAppSecurityDocs/editions-cloud-app-security-o365.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,8 @@ Office 365 Cloud App Security includes threat detection based on user activity l
2626

2727
|Capability|Feature|Microsoft Defender for Cloud Apps|Office 365 Cloud App Security|
2828
|----|----|----|----|
29-
|Cloud discovery|Discovered apps |31,000 + cloud apps |750+ cloud apps with similar functionality to Office 365|
29+
|App Governance|App Governance|Yes||
30+
|Cloud discovery|Discovered apps |34,000 + cloud apps |750+ cloud apps with similar functionality to Office 365|
3031
||Deployment for discovery analysis|<li> Manual upload <br> <li> Automated upload - Log collector and API <br> <li> Native Defender for Endpoint integration |Manual log upload|
3132
||Log anonymization for user privacy|Yes||
3233
||Access to full cloud app catalog|Yes||
@@ -52,3 +53,4 @@ Office 365 Cloud App Security includes threat detection based on user activity l
5253
Read about the basics in [Getting started with Defender for Cloud Apps](./get-started.md).
5354

5455
[!INCLUDE [Open support ticket](includes/support.md)]
56+
"

defender-endpoint/api/collect-investigation-package.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,19 +15,19 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 03/21/2025
18+
ms.date: 06/03/2025
1919
---
2020

2121
# Collect investigation package API
2222

2323
[!INCLUDE [Microsoft Defender XDR rebranding](../../includes/microsoft-defender.md)]
2424

2525
**Applies to:**
26+
2627
- [Microsoft Defender for Endpoint Plan 1](../microsoft-defender-endpoint.md)
2728
- [Microsoft Defender for Endpoint](../microsoft-defender-endpoint.md)
2829
- [Microsoft Defender XDR](/defender-xdr)
2930

30-
3131
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3232
3333
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
@@ -40,11 +40,7 @@ Collect investigation package from a device.
4040

4141
## Limitations
4242

43-
1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
44-
45-
> [!IMPORTANT]
46-
>
47-
> - These response actions are only available for devices on Windows 10, version 1703 or later, and on Windows 11.
43+
- Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
4844

4945
## Permissions
5046

defender-endpoint/configure-machines-asr.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
- mde-asr
1414
ms.custom: admindeeplinkDEFENDER
15-
ms.topic: conceptual
15+
ms.topic: article
1616
ms.subservice: asr
1717
search.appverid: met150
1818
ms.date: 03/27/2025

0 commit comments

Comments
 (0)