You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/troubleshoot-performance-issues.md
-6Lines changed: 0 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,12 +75,6 @@ If you can readily identify the software affecting system performance, go to the
75
75
76
76
We recommend that software vendors follow the various guidelines in [Partnering with the industry to minimize false positives](https://www.microsoft.com/security/blog/2018/08/16/partnering-with-the-industry-to-minimize-false-positives/). The vendor can submit their software through the [Microsoft Security Intelligence portal](https://www.microsoft.com/wdsi/filesubmission?persona=SoftwareDeveloper).
77
77
78
-
## What if I still have an issue?
79
-
80
-
You can submit a ticket to [Microsoft support](/defender-endpoint/contact-support).
81
-
82
-
Follow the steps in [Collect Microsoft Defender Antivirus diagnostic data](collect-diagnostic-data.md).
83
-
84
78
## See also
85
79
86
80
-[Collect Microsoft Defender Antivirus diagnostic data](collect-diagnostic-data.md)
Copy file name to clipboardExpand all lines: defender-for-identity/whats-new.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,9 +25,15 @@ For updates about versions and features released six months ago or earlier, see
25
25
26
26
## September 2025
27
27
28
+
### Identity posture recommendations view on the identity page (preview)
29
+
30
+
We've added a new tab on the Identity profile page that contains all active identity-related identity security posture assessments (ISPMs). This feature consolidates all identity-specific security posture assessments into a single contextual view, helping security teams quickly spot weaknesses and take targeted actions.
31
+
For more information, see [Investigate users in Microsoft Defender XDR](/microsoft-365/security/defender/investigate-users).
32
+
28
33
### New Regional Availability: United Arab Emirates
29
34
Defender for Identity data centers are now also deployed in the United Arab Emirates, North and Central regions. For the most current list of regional deployments, see [Defender for Identity data locations](/defender-for-identity/privacy-compliance/#data-location).
30
35
36
+
31
37
### New API support for unified agent
32
38
We are excited to announce the availability of a new Graph-based API for managing unified agent server actions in Microsoft Defender for Identity.
33
39
This capability is currently in preview and available in API Beta version.
@@ -39,7 +45,7 @@ This API allows customers to:
39
45
* Activate or deactivate the agent on eligible servers
40
46
41
47
42
-
For more information, see [Managing unified agent actions through Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta).
48
+
For more information, see [Managing unified agent actions through Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true).
43
49
44
50
### Microsoft Defender for Identity sensor version updates
The user page shows the Microsoft Entra organization as well as groups, helping you understand the groups and permissions associated with a user.
54
54
@@ -86,12 +86,12 @@ Microsoft Defender for Identity pulls tags out of Active Directory to give you a
86
86
|-----|-------------|
87
87
|**New**| Indicates that the entity was created less than 30 days ago. |
88
88
|**Deleted**| Indicates that the entity was permanently deleted from Active Directory. |
89
-
|**Disabled**| Indicates that the entity is currently disabled in Active Directory. The *disabled* attribute is an Active Directory flag that's available for user accounts, computer accounts, and other objects to indicate that the object is not currently in use. <br><br>When an object is disabled, it can't be used to sign in or perform actions in the domain.|
89
+
|**Disabled**| Indicates that the entity is currently disabled in Active Directory. The *disabled* attribute is an Active Directory flag that's available for user accounts, computer accounts, and other objects to indicate that the object isn't currently in use. <br><br>When an object is disabled, it can't be used to sign in or perform actions in the domain.|
90
90
|**Enabled**| Indicates that the entity is currently enabled in Active Directory, indicating that the entity is currently in use, and can be used to sign in or perform actions in the domain. |
91
-
|**Expired**| Indicates that the entity is expired in Active Directory. When a user account is expired, the user is no longer able to log in to the domain or access any network resources. The expired account is essentially treated as if it were disabled, but with an explicit expiration date set. <br><br>Any services or applications that the user was authorized to access may also be affected, depending on how they are configured. |
91
+
|**Expired**| Indicates that the entity is expired in Active Directory. When a user account is expired, the user is no longer able to log in to the domain or access any network resources. The expired account is treated as if it were disabled, but with an explicit expiration date set. <br><br>Any services or applications that the user was authorized to access might also be affected, depending on how they're configured. |
92
92
|**Honeytoken**| Indicates that the entity is manually tagged as a honeytoken. |
93
93
|**Locked**| Indicates that the entity supplied the wrong password too many times, and is now locked. |
94
-
|**Partial**| Indicates that the user, device, or group is not in synch with the domain, and is partially resolved via a global catalog. In this case, some attributes aren't available. |
94
+
|**Partial**| Indicates that the user, device, or group isn't in synch with the domain, and is partially resolved via a global catalog. In this case, some attributes aren't available. |
95
95
|**Unresolved**| Indicates that the device doesn't resolve to a valid identity in the Active Directory forest. No directory information is available. |
96
96
|**Sensitive**| Indicates that the entity is considered as sensitive. |
97
97
@@ -141,16 +141,16 @@ The lateral movement path report, which can be viewed by date, is always availab
141
141
142
142
The timeline displays user activities and alerts observed from a user's identity in the last 180 days. It unifies the user's identity entries across Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint workloads. By using the timeline, you can focus on activities a user performed or were performed on them in specific timeframes.
143
143
144
-
For users of the unified SOC platform to see alerts from Microsoft Sentinel based on data sources other than the ones in the previous paragraph, they can find these alerts and other information in the **Sentinel events** tab, [described below](#sentinel-events).
144
+
For users of the unified SOC platform to see alerts from Microsoft Sentinel based on data sources other than the ones in the previous paragraph, they can find these alerts and other information in the **Microsoft Sentinel events** tab, [described below](#microsoft-sentinel-events).
145
145
146
146
-**Custom time range picker:** You can choose a timeframe to focus your investigation on the last 24 hours, the last 3 days and so on. Or you can choose a specific timeframe by clicking on **Custom range**. Filtered data older than 30 days is displayed in seven-day intervals.
147
147
For example:
148
148
149
149
:::image type="content" source="/defender/media/image.png" alt-text="Screenshot that shows how to choose time frame." lightbox="/defender/media/image.png":::
150
150
151
-
-**Timeline filters:** In order to improve your investigation experience, you can use the timeline filters: Type (Alerts and/or user's related activities), Alert severity, Activity type, App, Location, Protocol. Each filter depends on the others, and the options in each filter (drop-down) only contains the data that is relevant for the specific user.
151
+
-**Timeline filters:** In order to improve your investigation experience, you can use the timeline filters: Type (Alerts and/or user's related activities), Alert severity, Activity type, App, Location, Protocol. Each filter depends on the others, and the options in each filter (drop-down) only contains the data that's relevant for the specific user.
152
152
153
-
-**Export button:** You can export the timeline to a CSV file. Export is limited to the first 5000 records and contains the data as it displays in the UI (same filters and columns).
153
+
-**Export button:** You can export the timeline to a CSV file. Export is limited to the first 5,000 records and contains the data as it displays in the UI (same filters and columns).
154
154
155
155
-**Customized columns:** You can choose which columns to expose in the timeline by selecting the **Customize columns** button. For example:
156
156
@@ -186,11 +186,21 @@ For example:
186
186
:::image type="content" source="/defender/media/investigate-users/user-incident-timeline.png" alt-text="Screenshot of the Timeline tab." lightbox="/defender/media/investigate-users/user-incident-timeline.png":::
187
187
188
188
> [!NOTE]
189
-
> Microsoft Defender XDR can display date and time information using either your local time zone or UTC. The selected time zone will apply to all date and time information shown in the Identity timeline.
189
+
> Microsoft Defender XDR can display date and time information using either your local time zone or UTC. The selected time zone applies to all date and time information shown in the Identity timeline.
190
190
>
191
191
> To set the time zone for these features, go to **Settings**\>**Security center**\>**Time zone**.
192
192
193
-
## Sentinel events
193
+
## Security recommendations
194
+
195
+
This tab displays all active security posture assessments (ISPMs) associated with an identity account. It includes Defender for Identity recommendations across available identity providers such as Active Directory, Okta, and others. Selecting an ISPM pivots you to the recommendation page in Microsoft Secure Score for additional details.
196
+
197
+
:::image type="content" source="media/screenshot-of-posture-recommendations.png" alt-text="Screenshot that shows the security posture recommendation." lightbox="media/screenshot-of-posture-recommendations.png":::
198
+
199
+
## Attack paths
200
+
201
+
This tab provides visibility into potential attack paths leading to a critical identity or involving it within the path, helping assess security risks. For more information, see [Overview of attack path within Exposure Management.](/security-exposure-management/work-attack-paths-overview)
202
+
203
+
## Microsoft Sentinel events
194
204
195
205
If your organization onboarded Microsoft Sentinel to the Defender portal, this additional tab is on the user entity page. This tab imports the [Account entity page from Microsoft Sentinel](/azure/sentinel/entity-pages).
0 commit comments