You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/capacity-planning.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ This article describes how to use the Microsoft Defender for Identity sizing too
11
11
12
12
While domain controller performance may not be affected if the server doesn't have required resources, the Defender for Identity sensor may not operate as expected. For more information, see [Microsoft Defender for Identity prerequisites](prerequisites.md).
13
13
14
-
The sizing tool measures the capacity needed for domain controllers only. There is no need to run it against AD FS / AD CS servers, as the performance impact on AD FS / AD CS servers is extremely minimal to not existent.
14
+
The sizing tool measures the capacity needed for domain controllers only. There is no need to run it against AD FS / AD CS / Entra Connect servers, as the performance impact on these servers is extremely minimal to not existent.
15
15
16
16
> [!TIP]
17
17
> By default, Defender for Identity supports up to 350 sensors. To install more sensors, contact Defender for Identity support.
@@ -47,17 +47,17 @@ Common results include:
47
47
48
48
|Result |Description |
49
49
|---------|---------|
50
-
|**Yes**| The sensor is supported on your server |
50
+
|**Yes**| The sensor is supported on your server.|
51
51
|**Yes, but additional resources required**| The sensor is supported on your server as long you add any specified missing resources. |
52
-
|**Maybe**| The current **Busy Packets/Second** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
53
-
|**Maybe, but additional resources required**|The sensor may be supported on your server as long you add any specified missing resources, or the **Busy packets / Second** may be above 60K |
54
-
|**No**| The sensor isn't supported on your server. <br><br>The current **Busy Packets/Second** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
55
-
|**Missing OS Data**| There was an issue reading the operating system data. Make sure the connection to your server is able to query WMI remotely. |
56
-
|**Missing Traffic Data**| There was an issue reading the traffic data. Make sure the connection to your server is able to query performance counters remotely. |
57
-
|**Missing RAM data**| There was an issue reading the RAM data. Make sure the connection to your server is able to query WMI remotely. |
52
+
|**Maybe**| The current **Busy Packets/sec** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
53
+
|**Maybe, but additional resources required**|The sensor may be supported on your server as long you add any specified missing resources, or the **Busy packets/sec** may be above 60K.|
54
+
|**No**| The sensor isn't supported on your server. <br><br>The current **Busy Packets/sec** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
55
+
|**Missing OS Data**| There was an issue reading the operating system data. Make sure the connection to your server is able to query WMI remotely. |
56
+
|**Missing Traffic Data**| There was an issue reading the traffic data. Make sure the connection to your server is able to query performance counters remotely. |
57
+
|**Missing RAM data**| There was an issue reading the RAM data. Make sure the connection to your server is able to query WMI remotely. |
58
58
|**Missing core data**| There was an issue reading the core data. Make sure the connection to your server is able to query WMI remotely. |
59
59
60
-
For example, the following image shows a set of results where the **Maybe** indicates that the **Busy Packets/Second** value is significantly higher at that point than average. Note that the **Display DC Times as UTC/Local** is set to *Local DC Time*. This setting helps highlight the fact that the values were taken at around 3:30 AM.
60
+
For example, the following image shows a set of results where the **Maybe** indicates that the **Busy Packets/sec** value is significantly higher at that point than average. Note that the **Display DC Times as UTC/Local** is set to *Local DC Time*. This setting helps highlight the fact that the values were taken at around 3:30 AM.
61
61
62
62
:::image type="content" source="../media/capacity-tool-maybe.png" alt-text="Screenshot of a capacity tool results showing Maybe values." lightbox="../media/capacity-tool-maybe.png":::
Copy file name to clipboardExpand all lines: ATPDocs/troubleshooting-using-logs.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
9
9
10
10
The Defender for Identity logs provide insight into what each component of Microsoft Defender for Identity sensor is doing at any given point in time.
11
11
12
-
The Defender for Identity logs are located in a subfolder called **Logs** where Defender for Identity is installed; the default location is: **C:\Program Files\Azure Advanced Threat Protection Sensor\\**. In the default installation location, it can be found at: **C:\Program Files\Azure Advanced Threat Protection Sensor\version number\Logs**.
12
+
The Defender for Identity logs are located in a subfolder called **Logs** where Defender for Identity is installed; the default location is: `C:\Program Files\Azure Advanced Threat Protection Sensor`. In the default installation location, it can be found at: `C:\Program Files\Azure Advanced Threat Protection Sensor\version number\Logs`.
13
13
14
14
## Defender for Identity sensor logs
15
15
@@ -28,7 +28,7 @@ The Defender for Identity sensor has the following logs:
28
28
29
29
## Defender for Identity deployment logs
30
30
31
-
The Defender for Identity deployment logs are located in the temp directory of the user who installed the product. It will usually be found at **%USERPROFILE%\AppData\Local\Temp**. If it was deployed by a service, it might be found at **C:\Windows\Temp**.
31
+
The Defender for Identity deployment logs are located in the temp directory of the user who installed the product. Typically, you can find these logs at `%USERPROFILE%\AppData\Local\Temp`. If the deployment was performed by a service, the logs might be located in `C:\Windows\Temp` or `C:\Windows\SystemTemp`, depending on your Windows version and patch level.
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+17Lines changed: 17 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,22 @@ For more information, see also:
22
22
23
23
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
24
24
25
+
## December 2024
26
+
27
+
### New security posture assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
28
+
29
+
Defender for Identity has added the new **Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)** recommendation in Microsoft Secure Score.
30
+
31
+
This recommendation directly addresses the recently published [CVE-2024-49019](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49019), which highlights security risks associated with vulnerable AD CS configurations. This security posture assessment lists all vulnerable certificate templates found in customer environments due to unpatched AD CS servers.
32
+
33
+
The new recommendation is added to other AD CS-related recommendations. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that post risks to the entire organization, together with related detections.
34
+
35
+
For more information, see:
36
+
37
+
-[Security assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)](https://go.microsoft.com/fwlink/?linkid=2296922)
38
+
39
+
-[Microsoft Defender for Identity's security posture assessments](security-assessment.md)
40
+
25
41
## October 2024
26
42
27
43
### MDI is expanding coverage with new 10 Identity posture recommendations (preview)
@@ -532,6 +548,7 @@ This version includes improvements and bug fixes for cloud services and the Defe
532
548
533
549
-[What is Microsoft Defender for Identity?](what-is.md)
534
550
-[Frequently asked questions](technical-faq.yml)
551
+
535
552
-[Defender for Identity prerequisites](prerequisites.md)
536
553
-[Defender for Identity capacity planning](capacity-planning.md)
537
554
-[Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/anomaly-detection-policy.md
-4Lines changed: 0 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -141,10 +141,6 @@ These policies look for activities within a single session with respect to the b
141
141
142
142
* This detection identifies users that failed multiple login attempts in a single session with respect to the baseline learned, which could indicate on a breach attempt.
143
143
144
-
### Data exfiltration to unsanctioned apps
145
-
146
-
* This policy is automatically enabled to alert you when a user or IP address uses an app that is not sanctioned to perform an activity that resembles an attempt to exfiltrate information from your organization.
147
-
148
144
### Multiple delete VM activities
149
145
150
146
* This policy profiles your environment and triggers alerts when users delete multiple VMs in a single session, relative to the baseline in your organization. This might indicate an attempted breach.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/api-entities.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Entities API
3
3
description: This article provides information about using the Entities API.
4
-
ms.date: 01/29/2023
4
+
ms.date: 11/28/2024
5
5
ms.topic: reference
6
6
---
7
7
# Entities API
@@ -32,7 +32,7 @@ The following table describes the supported filters:
32
32
| entity | entity pk | eq, neq | Filter entities with specific entities pks. If a user is selected, this filter also returns all of the user's accounts. Example: `[{ "id": "entity-id", "inst": 0 }]`|
33
33
| userGroups |string | eq, neq | Filter entities by their associated group IDs |
34
34
| app | integer | eq, neq | Filter entities using services with the specified SaaS ID for example: 11770 |
35
-
| instance | integer | eq, neq | Filter entities using services with the specified Appstances (SaaS ID and Instance ID), for example: 11770, 1059065 |
35
+
| instance | integer | eq, neq | Filter entities using services with the specified app instances (SaaS ID and Instance ID). For example: 11770, 1059065 |
36
36
| isExternal | boolean | eq | The entity's affiliation. Possible values include:<br /><br />**true**: External<br />**false**: Internal<br />**null**: No value |
37
37
| domain | string | eq, neq, isset, isnotset | The entity's related domain |
38
38
| organization | string | eq, neq, isset, isnotset | Filter entities with the specified organization unit |
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/file-filters.md
+9Lines changed: 9 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,15 @@ To provide data protection, Microsoft Defender for Cloud Apps gives you visibili
11
11
12
12
> [!IMPORTANT]
13
13
> Starting **September 1, 2024**, we'll be phasing out the **Files****page** from Microsoft Defender for Cloud Apps. Core functionalities of the Files page will be available on the **Cloud apps > Policies > Policy Management** page. We recommend using the Policy Management page to investigate files and to create, modify, and filter Information Protection policies and Malware files. For more information, see [File policies in Microsoft Defender for Cloud Apps](data-protection-policies.md).
14
+
>
15
+
16
+
>[!NOTE]
17
+
> **Query Size Limitation in Files Policy Filters and "Edit and Preview Results"**
18
+
>
19
+
> - When creating or editing a file policy, or when using the "Edit and preview results" option, there is a query size limitation. This limitation ensures optimal performance and prevents system overload.
20
+
> - If your query exceeds the allowed size, you may need to refine your criteria or use other filters to fit within the acceptable limits. For example, if the policy involves "collaborators" criteria that includes the group "everyone" or "everyone except external users" it may cause a failure due to query size limitation.
21
+
> - Please note that if the query exceeds the size limitation, the system will not specify which filter caused the failure.
22
+
14
23
## Enable file monitoring
15
24
16
25
To enable file monitoring for Defender for Cloud Apps, first turn on file monitoring in the **Settings** area. In the Microsoft Defender portal, select **Settings** > **Cloud Apps** > **Information Protection** > **Files** > **Enable file monitoring** > **Save**.
0 commit comments