Skip to content

Commit 5a4f667

Browse files
Merge pull request #4931 from DeCohen/WI486581-mdi-detection-updates-reduce-alert-noise
release note- Updates to multiple detections to reduce noise and impr…
2 parents 9767517 + f04d8a7 commit 5a4f667

File tree

1 file changed

+29
-5
lines changed

1 file changed

+29
-5
lines changed

ATPDocs/whats-new.md

Lines changed: 29 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,22 +25,46 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## September 2025
2727

28+
### Updates to multiple detections to reduce noise and improve alert accuracy
29+
30+
Several Defender for Identity detections are being updated to reduce noise and improve accuracy, making alerts more reliable and actionable. As the rollout continues, you may see a decrease in the number of alerts raised.
31+
32+
The improvements will gradually take effect across the following detections:
33+
34+
- Suspicious communication over DNS
35+
36+
- Suspected Netlogon privilege elevation attempt (CVE-2020-1472)
37+
38+
- Honeytoken authentication activity
39+
40+
- Remote code execution attempt over DNS
41+
42+
- Suspicious password reset by Microsoft Entra Connect account
43+
44+
- Data exfiltration over SMB
45+
46+
- Suspected skeleton key attack (encryption downgrade)
47+
48+
- Suspicious modification of Resource Based Constrained Delegation by a machine account
49+
50+
- Remote code execution attempt
51+
2852
### Unified connectors is now available for Okta Single Sign-On connectors (Preview)
2953

3054
Microsoft Defender for Identity supports the [Unified connectors](/azure/sentinel/unified-connector) experience, starting with the Okta Single Sign-On connector. This enables Defender for Identity to collect Okta system logs once and share them across supported Microsoft security products, reducing API usage and improving connector efficiency.
3155

32-
For more information see: [Connect Okta to Microsoft Defender for Identity (Preview)](okta-integration.md)
56+
For more information, see: [Connect Okta to Microsoft Defender for Identity (Preview)](okta-integration.md)
3357

3458

3559
## August 2025
3660

3761
### Microsoft Entra ID risk level is now available in near real time in Microsoft Defender for Identity (Preview)
3862

39-
Entra ID risk level is now available on the Identity Inventory assets page, the identity details page, and in the IdentityInfo table in Advanced Hunting, and includes the Entra ID risk score. SOC analysts can use this data to correlate risky users with sensitive or highly privileged users, create custom detections based on current or historical user risk, and improve investigation context.
63+
Microsoft Entra ID risk level is now available on the Identity Inventory assets page, the identity details page, and in the IdentityInfo table in Advanced Hunting, and includes the Microsoft Entra ID risk score. SOC analysts can use this data to correlate risky users with sensitive or highly privileged users, create custom detections based on current or historical user risk, and improve investigation context.
4064

41-
Previously, Defender for Identity tenants received Entra ID risk level in the IdentityInfo table through user and entity behavior analytics (UEBA). With this update, the Entra ID risk level is now updated in near real time through Microsoft Defender for Identity.
65+
Previously, Defender for Identity tenants received Microsoft Entra ID risk level in the IdentityInfo table through user and entity behavior analytics (UEBA). With this update, the Microsoft Entra ID risk level is now updated in near real time through Microsoft Defender for Identity.
4266

43-
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Entra ID risk level to the IdentityInfo table remains unchanged.
67+
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Microsoft Entra ID risk level to the IdentityInfo table remains unchanged.
4468

4569
### New security assessment: Remove stale service accounts (Preview)
4670

@@ -478,7 +502,7 @@ Defender for Identity added the new **Edit insecure ADCS certificate enrollment
478502

479503
Active Directory Certificate Services (AD CS) supports certificate enrollment through various methods and protocols, including enrollment via HTTP using the Certificate Enrollment Service (CES) or the Web Enrollment interface (Certsrv). Insecure configurations of the CES or Certsrv IIS endpoints might create vulnerabilities to relay attacks (ESC8).
480504

481-
The new **Edit insecure ADCS certificate enrollment IIS endpoints (ESC8)** recommendation is added to other AD CS-related recommendations recently released. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that post risks to the entire organization, together with related detections.
505+
The new **Edit insecure ADCS certificate enrollment IIS endpoints (ESC8)** recommendation is added to other AD CS-related recommendations recently released. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that pose risks to the entire organization, together with related detections.
482506

483507
For more information, see:
484508

0 commit comments

Comments
 (0)