Skip to content

Commit 69a13c5

Browse files
committed
Learn Editor: Update whats-new.md
1 parent b26b5d5 commit 69a13c5

File tree

1 file changed

+11
-5
lines changed

1 file changed

+11
-5
lines changed

ATPDocs/whats-new.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,15 +26,21 @@ For updates about versions and features released six months ago or earlier, see
2626
## August 2025
2727

2828

29-
## New Graph-based API for Response Actions (Preview)
29+
### New Graph based API for response actions (preview)
3030

3131
We’re excited to announce a new Graph-based API for initiating and managing remediation actions in Microsoft Defender for Identity.
3232

3333
This capability is currently in preview and available in API Beta version.
3434

35-
For more information, see Managing response actions through Graph API.
35+
For more information, see [Managing response actions through Graph API](/graph/api/resources/security-identityaccounts?view=graph-rest-beta).
3636

37-
## New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
37+
### Identity scoping is now generally available (GA)
38+
39+
Identity scoping is now generally available across all environments. Organizations can now define and refine the scope of MDI monitoring and gain granular control over which entities and resources are included in security analysis.
40+
41+
For more information, see [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
42+
43+
### New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
3844

3945
The new security posture assessment highlights unsecured Active Directory attributes that contain passwords or credential clues and recommends steps to remove them, helping reduce the risk of identity compromise.
4046

@@ -55,11 +61,11 @@ Improved detection logic to include scenarios where accounts were locked during
5561

5662
## July 2025
5763

58-
**Expanded coverage in ITDR deployment health widget**
64+
### Expanded coverage in ITDR deployment health widget
5965

6066
The Identity Threat Detection and Response (ITDR) deployment health widget now provides visibility into the deployment status of additional server types. Previously, it only reflected the status for Active Directory domain controllers. With this update, the widget also includes deployment status for ADFS, ADCS, and Microsoft Entra Connect servers - making it easier to track and ensure full sensor coverage across all supported identity infrastructure.
6167

62-
**Time limit added to Recommended test mode**
68+
### Time limit added to Recommended test mode
6369

6470
Recommended test mode configuration on the [Adjust alert thresholds page](/defender-for-identity/advanced-settings), now requires you to set an expiration time (up to 60 days) when enabling it. The end time is shown next to the toggle while test mode is active. For customers who already have Recommended test mode enabled, a 60-day expiration is automatically applied.
6571

0 commit comments

Comments
 (0)