Skip to content

Commit 5c50701

Browse files
authored
Merge branch 'main' into protect-ot-article-in-xdr
2 parents 45654cb + 8be1f98 commit 5c50701

File tree

70 files changed

+956
-770
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

70 files changed

+956
-770
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 8 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,12 @@ ms.topic: how-to
77

88
# Activate Microsoft Defender for Identity capabilities directly on a domain controller
99

10-
Microsoft Defender for Endpoint customers, who've already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
10+
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
1111

1212
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
1313

1414
> [!IMPORTANT]
15-
> Information in this article relates to a feature that is currently in limited availablility for a select set of use cases. If you weren't directed to use the Defender for Identity **Activation** page, use our [main deployment guide](deploy-defender-identity.md) instead.
16-
>
15+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](https://learn.microsoft.com/defender-for-identity/deploy/quick-installation-guide)
1716
1817
## Prerequisites
1918

@@ -30,10 +29,8 @@ Make sure that the domain controller where you're planning to activate Defender
3029

3130
Direct Defender for Identity capabilities are supported on domain controllers only, using the one of the following operating systems:
3231

33-
- Windows Server 2019
34-
- Windows Server 2022
35-
36-
You must also have the [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) installed.
32+
- Windows Server 2019 or above
33+
- [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) or later
3734

3835
> [!IMPORTANT]
3936
>After installing the March 2024 Cumulative Update, LSASS might experience a memory leak on domain controllers when on-premises and cloud-based Active Directory Domain Controllers service Kerberos authentication requests.
@@ -122,7 +119,7 @@ In the Defender portal, check for the following details:
122119

123120
- **Device entities**: Select **Assets > Devices**, and select the machine for your new sensor. Defender for Identity events are shown on the device timeline.
124121

125-
- **User entities**. Select **Assets > Users** and check for users from a newly onboarded domain. Alternately, use the global search option to search for specific users. User details pages should include **Overview**, **Observed in organization**, and **Timeline** data.
122+
- **User entities**: Select **Assets > Users** and check for users from a newly onboarded domain. Alternately, use the global search option to search for specific users. User details pages should include **Overview**, **Observed in organization**, and **Timeline** data.
126123

127124
- **Group entities**: Use the global search to find a user group, or pivot from a user or device details page where group details are shown. Check for details of group membership, view group users, and group timeline data.
128125

@@ -148,16 +145,7 @@ IdentityQueryEvents
148145
For more information, see [Advanced hunting in the Microsoft Defender portal](/microsoft-365/security/defender/advanced-hunting-microsoft-defender).
149146

150147

151-
### Test Identity Security Posture Management (ISPM) recommendations
152-
153-
Defender for Identity capabilities on domain controllers support the following ISPM assessments:
154-
155-
- [**Install Defender for Identity Sensor on all Domain Controllers**](../security-assessment-unmonitored-domain-controller.md)
156-
- [**Microsoft LAPS usage**](../security-assessment-laps.md)
157-
- [**Resolve unsecure domain configurations**](../security-assessment-unsecure-domain-configurations.md)
158-
- **Set a honeytoken account**
159-
- [**Unsecure account attributes**](../security-assessment-unsecure-account-attributes.md)
160-
- [**Unsecure SID History attributes**](../security-assessment-unsecure-sid-history-attribute.md)
148+
## Test Identity Security Posture Management (ISPM) recommendations
161149

162150
We recommend simulating risky behavior in a test environment to trigger supported assessments and verify that they appear as expected. For example:
163151

@@ -187,37 +175,6 @@ For more information, see [Microsoft Defender for Identity's security posture as
187175
188176
### Test alert functionality
189177
190-
The following alerts are supported by Defender for Identity capabilities on domain controllers:
191-
192-
:::row:::
193-
:::column span="":::
194-
- [Account enumeration reconnaissance](../reconnaissance-discovery-alerts.md#account-enumeration-reconnaissance-external-id-2003)
195-
- [Active Directory attributes Reconnaissance using LDAP](../reconnaissance-discovery-alerts.md#active-directory-attributes-reconnaissance-ldap-external-id-2210)
196-
- [Exchange Server Remote Code Execution (CVE-2021-26855)](../lateral-movement-alerts.md#exchange-server-remote-code-execution-cve-2021-26855-external-id-2414)
197-
- [Honeytoken user attributes modified](../persistence-privilege-escalation-alerts.md#honeytoken-user-attributes-modified-external-id-2427)
198-
- [Honeytoken was queried via LDAP](../reconnaissance-discovery-alerts.md#honeytoken-was-queried-via-ldap-external-id-2429)
199-
- [Honeytoken authentication activity](../credential-access-alerts.md#honeytoken-authentication-activity-external-id-2014)
200-
- [Honeytoken group membership changed](../persistence-privilege-escalation-alerts.md#honeytoken-group-membership-changed-external-id-2428)
201-
- [Remote code execution attempt](../other-alerts.md#remote-code-execution-attempt-external-id-2019)
202-
- [Security principal reconnaissance (LDAP)](../credential-access-alerts.md#security-principal-reconnaissance-ldap-external-id-2038)
203-
- [Suspicious service creation](../other-alerts.md#suspicious-service-creation-external-id-2026)
204-
- [Suspected NTLM relay attack (Exchange account)](../lateral-movement-alerts.md#suspected-ntlm-relay-attack-exchange-account-external-id-2037)
205-
:::column-end:::
206-
:::column span="":::
207-
- [Suspicious modification of the Resource Based Constrained Delegation attribute by a machine account](../persistence-privilege-escalation-alerts.md#suspicious-modification-of-the-resource-based-constrained-delegation-attribute-by-a-machine-account--external-id-2423)
208-
- [Suspicious additions to sensitive groups](../persistence-privilege-escalation-alerts.md#suspicious-additions-to-sensitive-groups-external-id-2024)
209-
- [Suspicious modification of a dNSHostName attribute (CVE-2022-26923)](../persistence-privilege-escalation-alerts.md#suspicious-modification-of-a-dnshostname-attribute-cve-2022-26923--external-id-2421)
210-
- [Suspicious modification of a sAMNameAccount attribute (CVE-2021-42278 and CVE-2021-42287)](../credential-access-alerts.md#suspicious-modification-of-a-samnameaccount-attribute-cve-2021-42278-and-cve-2021-42287-exploitation-external-id-2419)
211-
- [Suspected DCShadow attack (domain controller promotion)](../other-alerts.md#suspected-dcshadow-attack-domain-controller-promotion-external-id-2028)
212-
- [Suspected DFSCoerce attack using Distributed File System Protocol](../credential-access-alerts.md#suspected-dfscoerce-attack-using-distributed-file-system-protocol-external-id-2426) 
213-
- [Suspected DCShadow attack (domain controller replication request)](../other-alerts.md#suspected-dcshadow-attack-domain-controller-replication-request-external-id-2029)
214-
- [Suspected account takeover using shadow credentials](../credential-access-alerts.md#suspected-account-takeover-using-shadow-credentials-external-id-2431)
215-
- [Suspected SID-History injection](../persistence-privilege-escalation-alerts.md#suspected-sid-history-injection-external-id-1106)
216-
- [Suspected AD FS DKM key read](../credential-access-alerts.md#suspected-ad-fs-dkm-key-read-external-id-2413)
217-
:::column-end:::
218-
:::row-end:::
219-
220-
221178
Test alert functionality by simulating risky activity in a test environment. For example:
222179
223180
- Tag an account as a honeytoken account, and then try signing in to the honeytoken account against the activated domain controller.
@@ -232,16 +189,12 @@ Test remediation actions on a test user. For example:
232189
233190
1. In the Defender portal, go to the user details page for a test user.
234191
235-
1. From the options menu, select any or all of the following, one at a time:
236-
237-
- **Disable user in AD**
238-
- **Enable user in AD**
239-
- **Force password reset**
192+
1. From the **Options** menu, select any of the available remediation actions.
240193
241194
1. Check Active Directory for the expected activity.
242195
243196
> [!NOTE]
244-
> The current version does not collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
197+
> The current version doesn't collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
245198
246199
247200
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).

ATPDocs/deploy/configure-windows-event-collection.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -328,7 +328,7 @@ To configure auditing on Microsoft Entra Connect servers:
328328
<a name="enable-auditing-on-an-exchange-object"></a>
329329
330330
>[!NOTE]
331-
> The configuration container audit is requried only for environments that currently have or previously had Microsoft Exchange, as these environments have an Exchange container located within the domain's Configuration section.
331+
> The configuration container audit is required only for environments that currently have or previously had Microsoft Exchange, as these environments have an Exchange container located within the domain's Configuration section.
332332
333333
**Related health issue:** [Auditing on the Configuration container is not enabled as required](../health-alerts.md#auditing-on-the-configuration-container-is-not-enabled-as-required)
334334
@@ -340,6 +340,8 @@ To configure auditing on Microsoft Entra Connect servers:
340340
341341
1. Expand the **Configuration** container to show the **Configuration** node, which begins with **"CN=Configuration,DC=..."**.
342342
343+
:::image type="content" source="../media/cn-configuration.png" alt-text="Screenshot of selections for opening properties for the CN Configuration node.":::
344+
343345
1. Right-click the **Configuration** node and select **Properties**.
344346
345347
![Screenshot of selections for opening properties for the Configuration node.](../media/configuration-properties.png)

ATPDocs/deploy/deploy-defender-identity.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,17 @@ Use the following steps to prepare for deploying Defender for Identity:
5353
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if the servers in your environment have the necessary prerequisites.
5454
> You can use the [DefenderForIdentity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/) to add the required auditing and configure the necessary settings.
5555
56-
## Deploy Defender for Identity
56+
> [!IMPORTANT]
57+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
58+
59+
## Deploy Defender for Identity classic sensor
5760

5861
After you've prepared your system, use the following steps to deploy Defender for Identity:
5962

6063
1. [Verify connectivity to the Defender for Identity service](configure-proxy.md).
61-
1. [Download the Defender for Identity sensor](download-sensor.md).
62-
1. [Install the Defender for Identity sensor](install-sensor.md).
63-
1. [Configure the Defender for Identity sensor](configure-sensor-settings.md) to start receiving data.
64+
1. [Download the Defender for Identity classic sensor](download-sensor.md).
65+
1. [Install the Defender for Identity classic sensor](install-sensor.md).
66+
1. [Configure the Defender for Identity classic sensor](configure-sensor-settings.md) to start receiving data.
6467

6568
## Post-deployment configuration
6669

ATPDocs/deploy/download-sensor.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,12 @@ ms.date: 06/13/2023
55
ms.topic: how-to
66
---
77

8-
# Download the Microsoft Defender for Identity sensor
8+
# Download the Microsoft Defender for Identity classic sensor
99

10-
This article describes how to download the Microsoft Defender for Identity sensor for your domain controllers or AD CS / AD FS servers.
10+
This article describes how to download the Microsoft Defender for Identity classic sensor for your domain controllers or AD CS / AD FS and Entra Connect servers.
11+
12+
> [!IMPORTANT]
13+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
1114
1215
## Add a sensor and download sensor software
1316

@@ -17,7 +20,7 @@ This article describes how to download the Microsoft Defender for Identity senso
1720

1821
[![Screenshot of the Sensors tab.](../media//sensor-page.png)](../media/sensor-page.png#lightbox)
1922

20-
1. Select **Add sensor**. Then, in the **Add a new sensor** pane, select **Download installer** and save the installation package locally. The downloaded zip file includes the following files:
23+
1. Select **Add sensor**. Then, in the **Add a new sensor** pane, select **Download installer**, and save the installation package locally. The downloaded zip file includes the following files:
2124

2225
- The Defender for Identity sensor installer
2326

ATPDocs/deploy/event-collection-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The following event is required for Microsoft Entra Connect servers:
5050

5151
- 4624: An account was successfully logged on
5252

53-
For more information, see [Configure auditing on Microsoft Entra Connect](../configure-windows-event-collection.md#configure-auditing-for-entra-connect).
53+
For more information, see [Configure auditing on Microsoft Entra Connect](../configure-windows-event-collection.md#configure-auditing-on-microsoft-entra-connect).
5454

5555
### Other required Windows events
5656

ATPDocs/deploy/install-sensor.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,10 @@ ms.topic: how-to
77

88
# Install a Microsoft Defender for Identity sensor
99

10-
This article describes how to install a Microsoft Defender for Identity sensor, including a standalone sensor. The default recommendation is to use the UI. However:
10+
> [!IMPORTANT]
11+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
12+
13+
This article describes how to install a Microsoft Defender for Identity classic sensor, including a standalone sensor. The default recommendation is to use the UI. However:
1114

1215
- When you're installing the sensor on Windows Server Core, or to deploy the sensor via a software deployment system, follow the steps for [silent installation](#perform-a-defender-for-identity-silent-installation) instead.
1316

@@ -29,9 +32,9 @@ Before you start, make sure that you have:
2932

3033
- Trusted root certificates on your machine. If your trusted root CA-signed certificates are missing, [you might receive a connection error](../troubleshooting-known-issues.md#proxy-authentication-problem-presents-as-a-connection-error).
3134

32-
## Install the sensor by using the UI
35+
## Install the classic sensor by using the UI
3336

34-
Perform the following steps on the domain controller, Active Directory Federation Services (AD FS) server, or Active Directory Certificate Services (AD CS) server.
37+
Perform the following steps on the domain controller, Active Directory Federation Services (AD FS) server, Active Directory Certificate Services (AD CS) server or Entra Connect server.
3538

3639
1. Verify that the machine has connectivity to the relevant [Defender for Identity cloud service endpoints](configure-proxy.md#enable-access-to-defender-for-identity-service-urls-in-the-proxy-server).
3740

ATPDocs/deploy/prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ This article lists prerequisites required for a basic installation. Additional p
121121

122122
For more information, see:
123123

124-
- [Deploying Microsoft Defender for Identity on AD FS and AD CS servers](active-directory-federation-services.md)
124+
- [Deploying Microsoft Defender for Identity on AD FS, AD CS and Entra Connect servers](active-directory-federation-services.md)
125125
- [Microsoft Defender for Identity multi-forest support](multi-forest.md)
126126
- [Microsoft Defender for Identity standalone sensor prerequisites](prerequisites-standalone.md)
127127
- [Defender for Identity architecture](../architecture.md)

ATPDocs/deploy/quick-installation-guide.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -67,16 +67,19 @@ During installation, if .NET Framework 4.7 or later isn't installed, the .NET Fr
6767

6868
When installing your sensors, consider scheduling a maintenance window for your domain controllers.
6969

70-
## Install Defender for Identity
70+
> [!IMPORTANT]
71+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
72+
73+
## Install Defender for Identity classic sensor
7174

7275

7376
This procedure describes how to install the Defender for Identity sensor on a Windows server version 2016 or higher. Make sure that your server has the [minimum system requirements](#minimum-system-requirements).
7477

7578
> [!NOTE]
76-
> Defender for Identity sensors should be installed on all domain controllers, including read-only domain controllers (RODC). If you're installing on an AD FS / AD CS farm or cluster, we recommend installing the sensor on each AD FS / AD CS server.
79+
> Defender for Identity sensors should be installed on all domain controllers, including read-only domain controllers (RODC). If you're installing on an AD FS / AD CS / Entra Connect farm or cluster, we recommend installing the sensor on each AD FS / AD CS / Entra Connect server.
7780
>
7881
79-
**To download and install the sensor**:
82+
**To download and install the classic sensor**:
8083

8184
1. Download the Defender for Identity sensor from the [Microsoft Defender portal](https://security.microsoft.com).
8285
1. Browse to **System** > **Settings** > **Identities** > **Sensors** > **Add sensor**

0 commit comments

Comments
 (0)