You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/deploy-defender-identity.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,9 +50,8 @@ Use the following steps to prepare for deploying Defender for Identity:
50
50
1.[Plan your Defender for Identity capacity](capacity-planning.md).
51
51
52
52
> [!TIP]
53
-
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if your environment has the necessary prerequisites.
54
-
>
55
-
> The link to the *Test-MdiReadiness.ps1* script is also available from Microsoft Defender XDR, on the **Identities > Tools** page (Preview).
53
+
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if the servers in your environment have the necessary prerequisites.
54
+
> You can use the [DefenderForIdentity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/) to add the required auditing and configure the necessary settings.
56
55
57
56
## Deploy Defender for Identity
58
57
@@ -71,12 +70,12 @@ The following procedures help you complete the deployment process:
71
70
72
71
-[**Enable and configure unified role-based access control (RBAC)**](../role-groups.md) for Defender for Identity.
73
72
74
-
-[**Configure a Directory Service account (DSA) for use with Defender for Identity**](directory-service-accounts.md). While a DSA is optional in some scenarios, we recommend that you configure a DSA for Defender for Identity for full security coverage. For example, when you have a DSA configured, the DSA is used to connect to the domain controller at startup. A DSA can also be used to query the domain controller for data on entities seen in network traffic, monitored events, and monitored ETW activities
73
+
-[**Configure a Directory Service account (DSA) for use with Defender for Identity**](directory-service-accounts.md). While a DSA is optional in some scenarios, we recommend that you configure a DSA for Defender for Identity for full security coverage. For example, when you have a DSA configured, the DSA is used to connect to the domain controller at startup. A DSA can also be used to query the domain controller for data on entities seen in network traffic, monitored events, and monitored ETW activities.
75
74
76
75
-[**Configure remote calls to SAM**](remote-calls-sam.md) as needed. While this step is optional, we recommend that you configure remote calls to SAM-R for lateral movement path detection with Defender for Identity.
77
76
78
77
> [!TIP]
79
-
> By default, Defender for Identity sensors query the directory using LDAP on ports 389 and 3268. To switch to LDAPS on ports 636 and 3269, please open a support case. For more information, see [Microsoft Defender for Identity support](../support.md).
78
+
> By default, Defender for Identity sensors query the directory using LDAP on ports 389 and 3268. To switch to LDAPS on ports 636 and 3269, open a support case. For more information, see [Microsoft Defender for Identity support](../support.md).
-[View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
166
+
-[View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
167
167
-[View your app details with app governance](../app-governance-visibility-insights-view-apps.md)
168
168
-[Getting detailed information on an app](../app-governance-visibility-insights-view-apps.md#getting-detailed-information-on-an-app)
169
169
@@ -199,7 +199,7 @@ By default, there's no access or session policies deployed, and therefore no rel
199
199
200
200
For more information, see:
201
201
202
-
-[View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
202
+
-[View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
203
203
-[Protect apps with Microsoft Defender for Cloud Apps Conditional Access app control](../proxy-intro-aad.md)
204
204
-[Block and protect download of sensitive data to unmanaged or risky devices](../best-practices.md#block-and-protect-download-of-sensitive-data-to-unmanaged-or-risky-devices)
205
205
-[Secure collaboration with external users by enforcing real-time session controls](../best-practices.md#secure-collaboration-with-external-users-by-enforcing-real-time-session-controls)
@@ -231,7 +231,7 @@ Create app discovery policies to start alerting and tagging newly discovered app
231
231
232
232
For more information, see:
233
233
234
-
-[View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
234
+
-[View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
Copy file name to clipboardExpand all lines: defender-endpoint/address-unwanted-behaviors-mde.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -116,7 +116,7 @@ In this scenario, a legitimate app is blocked from writing to folders that are p
116
116
117
117
In this scenario, a third-party app that isn't a threat is detected and identified as malicious by Microsoft Defender Antivirus.
118
118
119
-
**How to address**: Submit the app to Microsoft for analysis. See [How to submit a file to Microsoft for analysis](/defender-xdr/submission-guide#how-do-i-submit-a-file-to-microsoft-for-analysis).
119
+
**How to address**: Submit the app to Microsoft for analysis. See [How to submit a file to Microsoft for analysis](/unified-secops-platform/submission-guide#how-do-i-submit-a-file-to-microsoft-for-analysis).
120
120
121
121
### An app is incorrectly detected and identified as malicious by Defender for Endpoint
Copy file name to clipboardExpand all lines: defender-endpoint/defender-endpoint-false-positives-negatives.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -322,7 +322,7 @@ You can submit entities, such as files and fileless detections, to Microsoft for
322
322
323
323
If you have a file that was either wrongly detected as malicious or was missed, follow these steps to submit the file for analysis.
324
324
325
-
1. Review the guidelines here: [Submit files for analysis](/windows/security/threat-protection/intelligence/submission-guide).
325
+
1. Review the guidelines here: [Submit files for analysis](/unified-secops-platform/submission-guide).
326
326
327
327
2. [Submit files in Defender for Endpoint](admin-submissions-mde.md) or visit the [Microsoft Security Intelligence submission site](https://www.microsoft.com/wdsi/filesubmission/) and submit your files.
328
328
@@ -336,7 +336,7 @@ If something was detected as malware based on behavior, and you don't have a fil
336
336
337
337
A .cab file is generated that contains various diagnostic logs. The location of the file is specified in the output of the command prompt. By default, the location is `C:\ProgramData\Microsoft\Microsoft Defender\Support\MpSupportFiles.cab`.
338
338
339
-
3. Review the guidelines here: [Submit files for analysis](/windows/security/threat-protection/intelligence/submission-guide).
339
+
3. Review the guidelines here: [Submit files for analysis](/unified-secops-platform/submission-guide).
340
340
341
341
4. Visit the [Microsoft Security Intelligence submission site](https://www.microsoft.com/wdsi/filesubmission) (https://www.microsoft.com/wdsi/filesubmission), and submit your .cab files.
342
342
@@ -353,7 +353,7 @@ For submissions that weren't already processed, they're prioritized for analysis
353
353
To check for updates regarding your submission, sign in at the [Microsoft Security Intelligence submission site](https://www.microsoft.com/wdsi/filesubmission).
354
354
355
355
> [!TIP]
356
-
> To learn more, see [Submit files for analysis](/windows/security/threat-protection/intelligence/submission-guide#how-does-microsoft-prioritize-submissions).
356
+
> To learn more, see [Submit files for analysis](/unified-secops-platform/submission-guide#how-does-microsoft-prioritize-submissions).
357
357
358
358
## Part 5: Review and adjust your threat protection settings
Copy file name to clipboardExpand all lines: defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ Here are some examples:
58
58
-**Evasion software** that actively tries to evade detection by security products, including software that behaves differently in the presence of security products.
59
59
60
60
> [!TIP]
61
-
> For more examples and a discussion of the criteria we use to label applications for special attention from security features, see [How Microsoft identifies malware and potentially unwanted applications](/windows/security/threat-protection/intelligence/criteria).
61
+
> For more examples and a discussion of the criteria we use to label applications for special attention from security features, see [How Microsoft identifies malware and potentially unwanted applications](/unified-secops-platform/criteria).
62
62
63
63
Potentially unwanted applications can increase the risk of your network being infected with actual malware, make malware infections harder to identify, or cost your IT and security teams time and effort to clean them up. If your organization's subscription includes [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), you can also set Microsoft Defender Antivirus PUA to block, in order to block apps that are considered to be PUA on Windows devices.
Copy file name to clipboardExpand all lines: defender-endpoint/evaluate-mda-using-mde-security-settings-management.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ In Windows 10 or later, and in Windows Server 2016 or later, you can use next-ge
26
26
27
27
This article outlines the configuration options available in Windows 10 and later versions, as well as in Windows Server 2016 and later versions. It provides step-by-step guidance on how to activate and test the key protection features in Microsoft Defender Antivirus (MDAV) and Microsoft Defender for Endpoint (EG).
28
28
29
-
If you have any questions about a detection that MDAV makes, or you discover a missed detection, you can submit a file to us at our [sample submission help site](/defender-xdr/submission-guide).
29
+
If you have any questions about a detection that MDAV makes, or you discover a missed detection, you can submit a file to us at our [sample submission help site](/unified-secops-platform/submission-guide).
30
30
31
31
## Use Microsoft Defender Endpoint Security Settings Management (Endpoint security policies) to enable the features
32
32
@@ -244,4 +244,4 @@ If yo find that your settings aren't taking effect, you might have a conflict. F
244
244
To information on how to make False Negatives (FNs) submissions, see:
245
245
246
246
-[Submit files in Microsoft Defender for Endpoint](admin-submissions-mde.md) if you have Microsoft XDR, Microsoft Defender for Endpoint P2/P1, or Microsoft Defender for Business.
247
-
-[Submit files for analysis](/defender-xdr/submission-guide) if you have Microsoft Defender Antivirus.
247
+
-[Submit files for analysis](/unified-secops-platform/submission-guide) if you have Microsoft Defender Antivirus.
Copy file name to clipboardExpand all lines: defender-endpoint/find-defender-malware-name.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ ms.date: 06/26/2023
25
25
26
26
As malware naming schemes vary depending on who is first to report it, how it's referred to in the media, and how some companies use specific naming conventions, it can be confusing to understand how Defender for Endpoint detects specific malware families.
27
27
28
-
Microsoft names specific malware according to the [Computer Antivirus Research Organization (CARO)](/microsoft-365/security/intelligence/malware-naming). For example, Microsoft detects the Sunburst cyberattack as **Trojan:MSIL/Solorigate.BR!dha**.
28
+
Microsoft names specific malware according to the [Computer Antivirus Research Organization (CARO)](/unified-secops-platform/malware-naming). For example, Microsoft detects the Sunburst cyberattack as **Trojan:MSIL/Solorigate.BR!dha**.
29
29
30
30
To understand how Microsoft Defender for Endpoint detects specific malware families, you can follow the steps in [Find the detection name for a malware family](#find-the-detection-name-for-a-malware-family).
31
31
@@ -35,11 +35,11 @@ To find the detection name of a malware family, you need to search the internet
35
35
36
36
1. Get the name of the malware family
37
37
2. Search the web for *malware family* + **cyberattack + hash** to find the hash
38
-
3. Look up the hash in [Virus Total](https://www.virustotal.com/)
38
+
3. Look up the hash in [VirusTotal](https://www.virustotal.com/)
39
39
4. Find the Microsoft row and how we name the malware
40
-
5. Look up the malware name in the [Microsoft Defender Security Intelligence website](https://www.microsoft.com/en-us/wdsi/threats). You should see Microsoft information and guidance specific to that malware.
40
+
5. Look up the malware name in the [Microsoft Defender Security Intelligence website](https://www.microsoft.com/wdsi/threats). You should see Microsoft information and guidance specific to that malware.
41
41
42
-
For example, search for the "Sunburst cyberattack hash". One of the websites returned in the search results should have the hash. In this example, the hash is **a25cadd48d70f6ea0c4a241d99c5241269e6faccb4054e62d16784640f8e53bc**. Then, look up this hash in [Virus Total](https://www.virustotal.com/).
42
+
For example, search for the "Sunburst cyberattack hash". One of the websites returned in the search results should have the hash. In this example, the hash is **a25cadd48d70f6ea0c4a241d99c5241269e6faccb4054e62d16784640f8e53bc**. Then, look up this hash in [VirusTotal](https://www.virustotal.com/).
43
43
44
44
The results show the Microsoft row detects this malware as **Trojan:MSIL/Solorigate.BR!dha**. When you look up this malware name in the Microsoft Defender Security Intelligence website, you find information specific to that malware, including technical details and mitigation steps.
0 commit comments