Skip to content

Commit 5aaf14b

Browse files
authored
Merge branch 'main' into poliveria-dex-mdc-ga-07072025
2 parents cd60f28 + a21c941 commit 5aaf14b

15 files changed

+356
-1984
lines changed

.openpublishing.redirection.ata-atp.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,31 @@
140140
"redirect_url": "manage-security-alerts",
141141
"redirect_document_id": false
142142
},
143+
{
144+
"source_path": "ATPDocs/credential-access-alerts.md",
145+
"redirect_url": "alerts-overview",
146+
"redirect_document_id": false
147+
},
148+
{
149+
"source_path": "ATPDocs/persistence-privilege-escalation-alerts.md",
150+
"redirect_url": "alerts-overview",
151+
"redirect_document_id": false
152+
},
153+
{
154+
"source_path": "ATPDocs/reconnaissance-discovery-alerts.md",
155+
"redirect_url": "alerts-overview",
156+
"redirect_document_id": false
157+
},
158+
{
159+
"source_path": "ATPDocs/lateral-movement-alerts.md",
160+
"redirect_url": "alerts-overview",
161+
"redirect_document_id": false
162+
},
163+
{
164+
"source_path": "ATPDocs/other-alerts.md",
165+
"redirect_url": "alerts-overview",
166+
"redirect_document_id": false
167+
},
143168
{
144169
"source_path": "ATPDocs/classic-activities-filtering-mcas.md",
145170
"redirect_url": "/previous-versions/defender-for-identity/classic-activities-filtering-mcas",

ATPDocs/alerts-mdi-classic.md

Lines changed: 145 additions & 0 deletions
Large diffs are not rendered by default.

ATPDocs/alerts-overview.md

Lines changed: 20 additions & 92 deletions
Large diffs are not rendered by default.

ATPDocs/alerts-xdr.md

Lines changed: 144 additions & 0 deletions
Large diffs are not rendered by default.

ATPDocs/assign-multi-factor-authentication-okta-privileged-user-accounts.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,11 @@ ms.reviewer: Himanch
1212

1313
This report lists any Okta privileged accounts that don't have any multifactor authentication (MFA) methods assigned. 
1414

15+
## Prerequisites
16+
17+
To use this security assessment, you must first connect your Okta instance in the Microsoft Defender portal.
18+
For setup instructions, see [Connect your Okta instance](/defender-for-identity/okta-integration#connect-okta-to-defender-for-identity).
19+
1520
## Why is a privileged account without MFA a security risk?
1621

1722
All privileged accounts should have multifactor authentication (MFA) enabled to strengthen security. By ensuring that privileged accounts such as Super Admin or Org Admin roles are secured with MFA, organizations can significantly reduce the risk of unauthorized access from compromised credentials. This strategy helps prevent attackers from gaining elevated access, safeguarding sensitive resources and protecting critical administrative functions from abuse.

ATPDocs/cef-format-sa.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,14 +40,14 @@ The cs2 field identifies if the alert is new or updated.
4040
The cs3 field identifies the fully qualified domain name of the source computer name.
4141

4242
> [!NOTE]
43-
> If you plan to create automation or scripts for Defender for Identity SIEM logs, we recommend using the **externalId** field to identify the alert type instead of using the alert name for this purpose. Alert names may occasionally be modified, while the **externalId** of each alert is permanent. For a list of external IDs, see [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
43+
> If you plan to create automation or scripts for Defender for Identity SIEM logs, we recommend using the **externalId** field to identify the alert type instead of using the alert name for this purpose. Alert names may occasionally be modified, while the **externalId** of each alert is permanent. For a list of external IDs, see [Security alerts](alerts-overview.md).
4444
4545
## Sample logs
4646

4747
The log examples comply with RFC 5424, but Defender for Identity also supports RFC 3164.
4848

4949
>[!NOTE]
50-
>The list below is a sample of logs sent to a SIEM. For a full list of alert details, see [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
50+
>The list below is a sample of logs sent to a SIEM. For a full list of alert details, see [Security alerts](alerts-overview.md).
5151
5252
Priorities:
5353

@@ -197,7 +197,7 @@ Priorities:
197197

198198
## See Also
199199

200-
- [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
200+
- [Security alerts](alerts-overview.md).
201201
- [Configure event collection](deploy/configure-event-collection.md)
202202
- [Configuring Windows event forwarding](deploy/configure-event-forwarding.md)
203203
- [Check out the Defender for Identity forum](https://aka.ms/MDIcommunity)

ATPDocs/credential-access-alerts.md

Lines changed: 0 additions & 453 deletions
This file was deleted.

ATPDocs/lateral-movement-alerts.md

Lines changed: 0 additions & 421 deletions
This file was deleted.

ATPDocs/other-alerts.md

Lines changed: 0 additions & 337 deletions
This file was deleted.

ATPDocs/persistence-privilege-escalation-alerts.md

Lines changed: 0 additions & 433 deletions
This file was deleted.

0 commit comments

Comments
 (0)