Skip to content

Commit 5c5a568

Browse files
authored
Merge branch 'main' into public-146
2 parents ea45e37 + 354b54e commit 5c5a568

File tree

121 files changed

+2270
-1358
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

121 files changed

+2270
-1358
lines changed

ATPDocs/deploy/capacity-planning.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This article describes how to use the Microsoft Defender for Identity sizing too
1111

1212
While domain controller performance may not be affected if the server doesn't have required resources, the Defender for Identity sensor may not operate as expected. For more information, see [Microsoft Defender for Identity prerequisites](prerequisites.md).
1313

14-
The sizing tool measures the capacity needed for domain controllers only. There is no need to run it against AD FS / AD CS servers, as the performance impact on AD FS / AD CS servers is extremely minimal to not existent.
14+
The sizing tool measures the capacity needed for domain controllers only. There is no need to run it against AD FS / AD CS / Entra Connect servers, as the performance impact on these servers is extremely minimal to not existent.
1515

1616
> [!TIP]
1717
> By default, Defender for Identity supports up to 350 sensors. To install more sensors, contact Defender for Identity support.
@@ -47,17 +47,17 @@ Common results include:
4747

4848
|Result |Description |
4949
|---------|---------|
50-
|**Yes** | The sensor is supported on your server |
50+
|**Yes** | The sensor is supported on your server. |
5151
|**Yes, but additional resources required** | The sensor is supported on your server as long you add any specified missing resources. |
52-
|**Maybe** | The current **Busy Packets/Second** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
53-
|**Maybe, but additional resources required** |The sensor may be supported on your server as long you add any specified missing resources, or the **Busy packets / Second** may be above 60K |
54-
|**No** | The sensor isn't supported on your server. <br><br>The current **Busy Packets/Second** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
55-
|**Missing OS Data** | There was an issue reading the operating system data. Make sure the connection to your server is able to query WMI remotely. |
56-
|**Missing Traffic Data** | There was an issue reading the traffic data. Make sure the connection to your server is able to query performance counters remotely. |
57-
|**Missing RAM data** | There was an issue reading the RAM data. Make sure the connection to your server is able to query WMI remotely. |
52+
|**Maybe** | The current **Busy Packets/sec** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
53+
|**Maybe, but additional resources required** |The sensor may be supported on your server as long you add any specified missing resources, or the **Busy packets/sec** may be above 60K. |
54+
|**No** | The sensor isn't supported on your server. <br><br>The current **Busy Packets/sec** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
55+
|**Missing OS Data** | There was an issue reading the operating system data. Make sure the connection to your server is able to query WMI remotely. |
56+
|**Missing Traffic Data** | There was an issue reading the traffic data. Make sure the connection to your server is able to query performance counters remotely. |
57+
|**Missing RAM data** | There was an issue reading the RAM data. Make sure the connection to your server is able to query WMI remotely. |
5858
|**Missing core data** | There was an issue reading the core data. Make sure the connection to your server is able to query WMI remotely. |
5959

60-
For example, the following image shows a set of results where the **Maybe** indicates that the **Busy Packets/Second** value is significantly higher at that point than average. Note that the **Display DC Times as UTC/Local** is set to *Local DC Time*. This setting helps highlight the fact that the values were taken at around 3:30 AM.
60+
For example, the following image shows a set of results where the **Maybe** indicates that the **Busy Packets/sec** value is significantly higher at that point than average. Note that the **Display DC Times as UTC/Local** is set to *Local DC Time*. This setting helps highlight the fact that the values were taken at around 3:30 AM.
6161

6262
:::image type="content" source="../media/capacity-tool-maybe.png" alt-text="Screenshot of a capacity tool results showing Maybe values." lightbox="../media/capacity-tool-maybe.png":::
6363

ATPDocs/deploy/quick-installation-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Watch the following video for a step-by-step demo and to learn about:
1616
- Finding potential sensor and configuration health issues
1717
- Viewing identity-related posture assessments in Microsoft Secure Score
1818

19-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RW16oLB]
19+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=de930a92-f552-4c09-92dc-1ab03c2e1131]
2020
2121
## Prerequisites
2222

ATPDocs/remediation-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Depending on your Microsoft Entra ID roles, you might see additional Microsoft E
4444

4545
## Related videos
4646

47-
[Remediation actions in Defender for Identity](https://www.microsoft.com/videoplayer/embed/RE4U7Pe)
47+
[Remediation actions in Defender for Identity](https://learn-video.azurefd.net/vod/player?id=adc6068b-225c-457d-b053-db6b64dedb79)
4848

4949
## See also
5050

ATPDocs/troubleshooting-using-logs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
99

1010
The Defender for Identity logs provide insight into what each component of Microsoft Defender for Identity sensor is doing at any given point in time.
1111

12-
The Defender for Identity logs are located in a subfolder called **Logs** where Defender for Identity is installed; the default location is: **C:\Program Files\Azure Advanced Threat Protection Sensor\\**. In the default installation location, it can be found at: **C:\Program Files\Azure Advanced Threat Protection Sensor\version number\Logs**.
12+
The Defender for Identity logs are located in a subfolder called **Logs** where Defender for Identity is installed; the default location is: `C:\Program Files\Azure Advanced Threat Protection Sensor`. In the default installation location, it can be found at: `C:\Program Files\Azure Advanced Threat Protection Sensor\version number\Logs`.
1313

1414
## Defender for Identity sensor logs
1515

@@ -28,7 +28,7 @@ The Defender for Identity sensor has the following logs:
2828
2929
## Defender for Identity deployment logs
3030

31-
The Defender for Identity deployment logs are located in the temp directory of the user who installed the product. It will usually be found at **%USERPROFILE%\AppData\Local\Temp**. If it was deployed by a service, it might be found at **C:\Windows\Temp**.
31+
The Defender for Identity deployment logs are located in the temp directory of the user who installed the product. Typically, you can find these logs at `%USERPROFILE%\AppData\Local\Temp`. If the deployment was performed by a service, the logs might be located in `C:\Windows\Temp` or `C:\Windows\SystemTemp`, depending on your Windows version and patch level.
3232

3333
Defender for Identity sensor deployment logs:
3434

ATPDocs/understand-lateral-movement-paths.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Watch the following video to learn more about reducing lateral movement paths wi
2222

2323
<br>
2424

25-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWAOfW]
25+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=d216a20e-b9a9-4ebc-b309-7b1eae97742a]
2626
2727
## Where can I find Defender for Identity LMPs?
2828

ATPDocs/whats-new.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,22 @@ For more information, see also:
2222

2323
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2424

25+
## December 2024
26+
27+
### New security posture assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
28+
29+
Defender for Identity has added the new **Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)** recommendation in Microsoft Secure Score.
30+
31+
This recommendation directly addresses the recently published [CVE-2024-49019](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49019), which highlights security risks associated with vulnerable AD CS configurations. This security posture assessment lists all vulnerable certificate templates found in customer environments due to unpatched AD CS servers.
32+
33+
The new recommendation is added to other AD CS-related recommendations. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that post risks to the entire organization, together with related detections.
34+
35+
For more information, see:
36+
37+
- [Security assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)](https://go.microsoft.com/fwlink/?linkid=2296922)
38+
39+
- [Microsoft Defender for Identity's security posture assessments](security-assessment.md)
40+
2541
## October 2024
2642

2743
### MDI is expanding coverage with new 10 Identity posture recommendations (preview)
@@ -532,6 +548,7 @@ This version includes improvements and bug fixes for cloud services and the Defe
532548

533549
- [What is Microsoft Defender for Identity?](what-is.md)
534550
- [Frequently asked questions](technical-faq.yml)
551+
535552
- [Defender for Identity prerequisites](prerequisites.md)
536553
- [Defender for Identity capacity planning](capacity-planning.md)
537554
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)

CloudAppSecurityDocs/anomaly-detection-policy.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -141,10 +141,6 @@ These policies look for activities within a single session with respect to the b
141141

142142
* This detection identifies users that failed multiple login attempts in a single session with respect to the baseline learned, which could indicate on a breach attempt.
143143

144-
### Data exfiltration to unsanctioned apps
145-
146-
* This policy is automatically enabled to alert you when a user or IP address uses an app that is not sanctioned to perform an activity that resembles an attempt to exfiltrate information from your organization.
147-
148144
### Multiple delete VM activities
149145

150146
* This policy profiles your environment and triggers alerts when users delete multiple VMs in a single session, relative to the baseline in your organization. This might indicate an attempted breach.

CloudAppSecurityDocs/api-entities.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Entities API
33
description: This article provides information about using the Entities API.
4-
ms.date: 01/29/2023
4+
ms.date: 11/28/2024
55
ms.topic: reference
66
---
77
# Entities API
@@ -32,7 +32,7 @@ The following table describes the supported filters:
3232
| entity | entity pk | eq, neq | Filter entities with specific entities pks. If a user is selected, this filter also returns all of the user's accounts. Example: `[{ "id": "entity-id", "inst": 0 }]` |
3333
| userGroups |string | eq, neq | Filter entities by their associated group IDs |
3434
| app | integer | eq, neq | Filter entities using services with the specified SaaS ID for example: 11770 |
35-
| instance | integer | eq, neq | Filter entities using services with the specified Appstances (SaaS ID and Instance ID), for example: 11770, 1059065 |
35+
| instance | integer | eq, neq | Filter entities using services with the specified app instances (SaaS ID and Instance ID). For example: 11770, 1059065 |
3636
| isExternal | boolean | eq | The entity's affiliation. Possible values include:<br /><br />**true**: External<br />**false**: Internal<br />**null**: No value |
3737
| domain | string | eq, neq, isset, isnotset | The entity's related domain |
3838
| organization | string | eq, neq, isset, isnotset | Filter entities with the specified organization unit |

CloudAppSecurityDocs/caac-known-issues.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,7 @@ In the following applications, we encountered scenarios where browsing to a link
7272
- Workplace from Meta
7373
- ServiceNow
7474
- Workday
75+
- Box
7576

7677
### File upload limitations
7778

CloudAppSecurityDocs/file-filters.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,15 @@ To provide data protection, Microsoft Defender for Cloud Apps gives you visibili
1111

1212
> [!IMPORTANT]
1313
> Starting **September 1, 2024**, we'll be phasing out the **Files** **page** from Microsoft Defender for Cloud Apps. Core functionalities of the Files page will be available on the **Cloud apps > Policies > Policy Management** page. We recommend using the Policy Management page to investigate files and to create, modify, and filter Information Protection policies and Malware files. For more information, see [File policies in Microsoft Defender for Cloud Apps](data-protection-policies.md).
14+
>
15+
16+
>[!NOTE]
17+
> **Query Size Limitation in Files Policy Filters and "Edit and Preview Results"**
18+
>
19+
> - When creating or editing a file policy, or when using the "Edit and preview results" option, there is a query size limitation. This limitation ensures optimal performance and prevents system overload.
20+
> - If your query exceeds the allowed size, you may need to refine your criteria or use other filters to fit within the acceptable limits. For example, if the policy involves "collaborators" criteria that includes the group "everyone" or "everyone except external users" it may cause a failure due to query size limitation.
21+
> - Please note that if the query exceeds the size limitation, the system will not specify which filter caused the failure.
22+
1423
## Enable file monitoring
1524

1625
To enable file monitoring for Defender for Cloud Apps, first turn on file monitoring in the **Settings** area. In the Microsoft Defender portal, select **Settings** > **Cloud Apps** > **Information Protection** > **Files** > **Enable file monitoring** > **Save**.

0 commit comments

Comments
 (0)