Skip to content

Commit 6950803

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into painbar-custom-install-path
2 parents 924f39a + d19bfca commit 6950803

13 files changed

+195
-34
lines changed

.github/workflows/TierManagement.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,15 @@ name: Tier management
22

33
permissions:
44
pull-requests: write
5-
contents: read
5+
contents: write
66

77
on:
88
issue_comment:
99
types: [created, edited]
1010

11+
pull_request_target:
12+
types: [opened, reopened]
13+
1114
jobs:
1215

1316
tier-mgmt:
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
---
2+
title: 'Security Assessment: Remove Discoverable Passwords in Active Directory Account Attributes (Preview)'
3+
description: Learn how to identify and address discoverable passwords in Active Directory account attributes to mitigate security risks and improve your organization's security posture.
4+
ms.date: 08/04/2025
5+
ms.topic: how-to
6+
---
7+
8+
# Security Assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
9+
10+
11+
## Why do discoverable passwords in Active Directory account attributes pose a risk?
12+
13+
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges—often without triggering traditional alerts.
14+
15+
Attackers seek low-friction paths to expand access. Exposed passwords in these attributes represent an easy win because:
16+
17+
- The attributes aren't access-restricted.
18+
19+
- They aren't monitored by default.
20+
21+
- They provide context attackers can exploit for lateral movement and privilege escalation.
22+
23+
Removing exposed credentials from these attributes reduces the risk of identity compromise and strengthens your organization’s security posture.
24+
25+
26+
## How does Microsoft Defender for Identity detect discoverable passwords?
27+
28+
> [!NOTE]
29+
> This security recommendation is part of Microsoft Defender for Identity and is powered by AI-based analysis of free-text attributes in Active Directory.
30+
> Findings can include false positives. Always validate the results before taking action.
31+
32+
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse. Microsoft Defender for Identity detects indicators such as:
33+
34+
- Plaintext passwords or variations. For example, '`Password=Summer2024!'`
35+
36+
- Credential patterns, reset hints, or sensitive account information.
37+
38+
- Other indicators suggesting operational misuse of directory fields.
39+
40+
Detected matches are surfaced in **Secure Score** and the **Security Assessment report** for review and remediation.
41+
42+
43+
## Remediation steps
44+
45+
To address this security assessment, follow these steps:
46+
47+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for Remove discoverable passwords in Active Directory account attributes.
48+
1. Review the exposed entries in the security report. Identify any field content that includes:
49+
50+
- Cleartext passwords
51+
52+
- Reset instructions or credential clues
53+
54+
- Sensitive business or system information
55+
56+
1. Remove sensitive information from the listed attribute fields using standard directory management tools (for example, PowerShell or ADSI Edit).
57+
1. Fully remove the sensitive information. Don’t just mask the value. Partial obfuscation (for example, P@ssw***) can still offer useful clues to attackers.
58+
59+
> [!NOTE]
60+
> Assessments are updated in near real time. Scores and statuses are updated every 24 hours. The list of impacted entities is updated within a few minutes of you implementing the recommendations. The status might take time until it's marked as **Completed**.
61+
62+
## Related articles
63+
64+
- [Learn more about Microsoft Secure Score](/defender-xdr/microsoft-secure-score)

ATPDocs/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -251,6 +251,8 @@ items:
251251
href: security-assessment-laps.md
252252
- name: Riskiest lateral movement paths
253253
href: security-assessment-riskiest-lmp.md
254+
- name: Remove discoverable passwords in Active Directory account attributes
255+
href: remove-discoverable-passwords-active-directory-account-attributes.md
254256
- name: Unsecure Kerberos delegation assessment
255257
href: security-assessment-unconstrained-kerberos.md
256258
- name: Unsecure SID History attributes

ATPDocs/whats-new.md

Lines changed: 31 additions & 21 deletions
Large diffs are not rendered by default.

defender-endpoint/ios-whatsnew.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.reviewer: sunasing; denishdonga
88
ms.localizationpriority: medium
9-
ms.date: 05/15/2025
9+
ms.date: 08/12/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -125,7 +125,7 @@ Defender for Endpoint is ending support for iOS/iPadOS 15 on January 31, 2025. M
125125

126126
**How does this affect you or your users?**
127127

128-
New users won't be able to install the Microsoft Defender app on devices running iOS/iPadOS 15 and earlier versions. Similarly, existing users won't be to upgrade to the latest version of the app.
128+
New users won't be able to install the Microsoft Defender app on devices running iOS/iPadOS 15 and earlier versions. Similarly, existing users will be able to upgrade till April-Mid Release version (1.1.64030101) of the app and not beyond it.
129129

130130
To check which devices support iOS 16 or iPadOS 16 (if applicable), see the following Apple documentation:
131131

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -313,6 +313,8 @@
313313
href: advanced-hunting-graphapiauditevents-table.md
314314
- name: IdentityDirectoryEvents
315315
href: advanced-hunting-identitydirectoryevents-table.md
316+
- name: IdentityEvents
317+
href: advanced-hunting-identityevents-table.md
316318
- name: IdentityInfo
317319
href: advanced-hunting-identityinfo-table.md
318320
- name: IdentityLogonEvents

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.custom:
2323
appliesto:
2424
- Microsoft Defender XDR
2525
- Microsoft Sentinel in the Microsoft Defender portal
26-
ms.date: 03/28/2025
26+
ms.date: 07/28/2025
2727
---
2828

2929
# Use Microsoft Sentinel functions, saved queries, and custom rules
@@ -61,14 +61,17 @@ For example, to get the first 10 rows of data from the `StormEvents` table store
6161
> [!NOTE]
6262
> The `adx()` operator isn't supported for custom detections.
6363
64-
6564
### Use arg() operator for Azure Resource Graph queries
66-
The `arg()` operator can be used to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like.
65+
66+
The `arg()` operator can be used to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like.
6767

6868
This feature was previously only available in the Logs feature in Microsoft Sentinel. In the Microsoft Defender portal, the `arg()` operator works to combine Azure Resource Graph (arg) queries with Microsoft Sentinel tables (that is, Defender XDR tables aren't supported). This allows users to make the cross-service query in advanced hunting without manually opening a Microsoft Sentinel window.
6969

7070
For more information, see [Query data in Azure Resource Graph by using arg()](/azure/azure-monitor/logs/azure-monitor-data-explorer-proxy#query-data-in-azure-resource-graph-by-using-arg-preview).
7171

72+
>[!NOTE]
73+
> The `arg()` operator isn't supported for analytics rules.
74+
7275
In the query editor, enter *arg("").* followed by the Azure Resource Graph table name.
7376

7477
For example:
@@ -86,7 +89,6 @@ BehaviorAnalytics
8689
) on $left.name == $right.SourceDevice
8790
```
8891

89-
9092
## Use saved queries
9193

9294
To use a saved query from Microsoft Sentinel, go to the **Queries** tab and scroll until you find the query that you want. Double-click the query name to load the query in the query editor. For more options, select the vertical ellipses ( ![kebab icon](/defender/media/ah-kebab.png) ) to the right of the query. From here, you can perform the following actions:
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
---
2+
title: IdentityEvents table in the advanced hunting schema
3+
description: Learn about the IdentityEvents table in the advanced hunting schema, which contains information about identity events obtained from other cloud identity service providers.
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: pauloliveria
10+
author: poliveria
11+
ms.localizationpriority: medium
12+
manager: orspodek
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
ms.custom:
18+
- cx-ti
19+
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
23+
ms.topic: reference
24+
ms.date: 08/07/2025
25+
---
26+
27+
# IdentityEvents (Preview)
28+
29+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
30+
31+
The `IdentityEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about identity events obtained from other cloud identity service providers. Use this reference to construct queries that return information from this table.
32+
33+
> [!IMPORTANT]
34+
> Some information relates to prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
35+
36+
This advanced hunting table is populated by records from Microsoft Defender for Identity. If your organization hasn’t deployed the service in Microsoft Defender XDR, queries that use the table aren’t going to work or return any results. For more information about how to deploy Defender for Identity in Defender XDR, read [Deploy supported services](deploy-supported-services.md).
37+
38+
>[!NOTE]
39+
>This advanced hunting table is populated only when other identity services like Okta are connected to Defender for Identity.
40+
41+
42+
For information on other tables in the advanced hunting schema, see the [advanced hunting reference](advanced-hunting-schema-tables.md).
43+
44+
| Column name | Data type | Description |
45+
|-------------|-----------|-------------|
46+
| `Timestamp ` | `datetime` | Date and time when the record was generated |
47+
| `ReportId ` | `string` | Unique identifier for the event |
48+
| `AccountId ` | `string` | Unique identifier for the account in the source application |
49+
| `AccountType` | `string` | Type of user account, indicating its general role like User, SystemPrincipal |
50+
| `AccountDisplayName` | `string` | Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user. |
51+
| `AccountUpn` | `string` | Alternate ID, email, or name for the account in the source application |
52+
| `ActionType` | `string` | Type of activity that triggered the event in the raw format received from the source application |
53+
| `ActionResult` | `string` | Result of the action |
54+
| `ActionFailureReason` | `string` | Information explaining why the recorded action failed |
55+
| `IPAddress` | `string` | IP address assigned to the device and used during related network communications |
56+
| `UserAgent` | `string` | User agent information from the web browser or other client application |
57+
| `TargetObjects` | `dynamic` | List of the target objects of this activity. Target object can be user, group, role, domain, application, and more. |
58+
| `Application` | `string` | The source application where this event was received from |
59+
| `ApplicationInstanceId` | `string` | Domain of the source application |
60+
| `ApplicationEventId` | `string` | Raw event ID provided by the source application |
61+
| `ApplicationSessionId` | `string` | Raw session ID provided by the source application |
62+
| `RawEventData` | `dynamic` | Full raw event information from the source application in JSON format |
63+
| `AdditionalFields` | `dynamic` | Additional information about the entity or event |
64+
65+
66+
## Related topics
67+
68+
- [Advanced hunting overview](advanced-hunting-overview.md)
69+
- [Learn the query language](advanced-hunting-query-language.md)
70+
- [Use shared queries](advanced-hunting-shared-queries.md)
71+
- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)
72+
- [Understand the schema](advanced-hunting-schema-tables.md)
73+
- [Apply query best practices](advanced-hunting-best-practices.md)
74+
75+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/advanced-hunting-schema-tables.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,7 @@ The following reference lists all the tables in the schema. Each table name link
100100
| **[ExposureGraphNodes](advanced-hunting-exposuregraphnodes-table.md)** | Microsoft Security Exposure Management exposure graph node information, about organizational entities and their properties |
101101
| **[GraphApiAuditEvents](advanced-hunting-graphapiauditevents-table.md)** (Preview) | Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant |
102102
| **[IdentityDirectoryEvents](advanced-hunting-identitydirectoryevents-table.md)** | Events involving an on-premises domain controller running Active Directory (AD). This table covers a range of identity-related events and system events on the domain controller. |
103+
| **[IdentityEvents](advanced-hunting-identityevents-table.md)** (Preview) | Information about identity events obtained from other cloud identity service providers |
103104
| **[IdentityInfo](advanced-hunting-identityinfo-table.md)** | Account information from various sources, including Microsoft Entra ID |
104105
| **[IdentityLogonEvents](advanced-hunting-identitylogonevents-table.md)** | Authentication events on Active Directory and Microsoft online services |
105106
| **[IdentityQueryEvents](advanced-hunting-identityqueryevents-table.md)** | Queries for Active Directory objects, such as users, groups, devices, and domains |

defender-xdr/whats-new.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,16 +33,18 @@ For more information on what's new with other Microsoft Defender security produc
3333
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3434

3535
## August 2025
36+
- (Preview) The following advanced hunting schema tables are now available for preview:
37+
- The [`CloudStorageAggregatedEvents`](advanced-hunting-cloudstorageaggregatedevents-table.md) table contains information about storage activity and related events
38+
- The [`IdentityEvents`](advanced-hunting-identityevents-table.md) table contains information about identity events obtained from other cloud identity service providers
39+
- (Preview) Advanced hunting now lets you investigate Microsoft Defender for Cloud behaviors. For more information, see [Investigate behaviors with advanced hunting](/defender-cloud-apps/behaviors).
40+
- (Preview) In advanced hunting, the number of [query results](advanced-hunting-query-results.md) displayed in the Microsoft Defender portal has been increased to 100,000.
3641
- (GA) [Microsoft Defender Experts for XDR](dex-xdr-overview.md) and [Microsoft Defender Experts for Hunting](defender-experts-for-hunting.md) customers can now expand their service coverage to include server and cloud workloads protected by Microsoft Defender for Cloud through the respective add-ons, **Microsoft Defender Experts for Servers** and **Microsoft Defender Experts for Hunting - Servers**. [Learn more](faq-cloud-coverage-defender-experts.md)
3742
- (GA) Defender Experts for XDR customers can now [incorporate third-party network signals](third-party-enrichment-defender-experts.md) for enrichment, which could allow our security analysts to not only gain a more comprehensive view of an attack's path that allows for faster and more thorough detection and response, but also provide customers with a more holistic view of the threat in their environments.
3843
- (GA) In advanced hunting, you can now [view all your user-defined rules](custom-detection-manage.md)—both custom detection rules and analytics rules—in the **Detection rules** page. This feature also brings the following improvements:
3944
- You can now filter for *every* column (in addition to **Frequency** and **Organizational scope**).
4045
- For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
4146
- You can now view the details pane even for analytics rules.
4247
- You can now perform the following actions on analytics rules: Turn on/off, Delete, Edit.
43-
- (Preview) In advanced hunting, the number of [query results](advanced-hunting-query-results.md) displayed in the Microsoft Defender portal has been increased to 100,000.
44-
- (Preview) The [`CloudStorageAggregatedEvents`](advanced-hunting-cloudstorageaggregatedevents-table.md) table in advanced hunting is now available for preview. This table contains information about storage activity and related events.
45-
- (Preview) Advanced hunting now lets you investigate Microsoft Defender for Cloud behaviors. For more information, see [Investigate behaviors with advanced hunting](/defender-cloud-apps/behaviors).
4648

4749
## July 2025
4850
- (Preview) The [`GraphApiAuditEvents`](advanced-hunting-graphapiauditevents-table.md) table in advanced hunting is now available for preview. This table contains information about Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant.

0 commit comments

Comments
 (0)