Skip to content

Commit 6b0ce3d

Browse files
authored
Merge branch 'main' into docs-editor/run-advanced-query-api-1754003746
2 parents 4c995ef + 530c46b commit 6b0ce3d

File tree

370 files changed

+2578
-1273
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

370 files changed

+2578
-1273
lines changed

.acrolinx-config.edn

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ If you need a scoring exception for content in this PR, add the *Sign off* and t
3535
- Escalate the exception request to the Acrolinx Review Team for review.
3636
- Approve the exception and work with the GitHub Admin Team to merge the PR to the default branch.
3737
38-
For more information about the exception criteria and exception process, see [Minimum Acrolinx topic scores for publishing](https://review.docs.microsoft.com/en-us/office-authoring-guide/acrolinx-min-score?branch=main).
38+
For more information about the exception criteria and exception process, see [Minimum Acrolinx topic scores for publishing](https://review.learn.microsoft.com/en-us/office-authoring-guide/acrolinx-min-score?branch=main).
3939
4040
Select the total score link to review all feedback on clarity, consistency, tone, brand, terms, spelling, grammar, readability, and inclusive language. _You should fix all spelling errors regardless of your total score_. Fixing spelling errors helps maintain customer trust in overall content quality.
4141
@@ -54,7 +54,7 @@ Select the total score link to review all feedback on clarity, consistency, tone
5454
- [Install Acrolinx locally for VSCode for Magic](https://review.learn.microsoft.com/office-authoring-guide/acrolinx-vscode?branch=main)
5555
- [False positives or issues](https://aka.ms/acrolinxbug)
5656
- [Request a new Acrolinx term](https://microsoft.sharepoint.com/teams/M365Dev2/SitePages/M365-terminology.aspx)
57-
- [Troubleshooting issues with Acrolinx](https://review.learn.microsoft.com/help/platform/acrolinx-troubleshoot?branch)
57+
- [Troubleshooting issues with Acrolinx](https://review.learn.microsoft.com/help/platform/acrolinx-troubleshoot?branch=main)
5858
5959
"
6060
}

.github/workflows/TierManagement.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,15 @@ name: Tier management
22

33
permissions:
44
pull-requests: write
5-
contents: read
5+
contents: write
66

77
on:
88
issue_comment:
99
types: [created, edited]
1010

11+
pull_request_target:
12+
types: [opened, reopened]
13+
1114
jobs:
1215

1316
tier-mgmt:

.openpublishing.publish.config.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
"build_output_subfolder": "ATA-Docs",
77
"locale": "en-us",
88
"monikers": [],
9-
"open_to_public_contributors": true,
9+
"open_to_public_contributors": false,
1010
"type_mapping": {
1111
"Conceptual": "Content"
1212
},
@@ -191,6 +191,8 @@
191191
".openpublishing.redirection.defender-cloud-apps.json",
192192
".openpublishing.redirection.defender-endpoint.json",
193193
".openpublishing.redirection.defender-office-365.json",
194-
".openpublishing.redirection.defender-xdr.json"
194+
".openpublishing.redirection.defender-xdr.json",
195+
".openpublishing.redirection.unified-secops.json"
196+
195197
]
196198
}

.openpublishing.redirection.ata-atp.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,17 +17,17 @@
1717
},
1818
{
1919
"source_path": "ATPDocs/deploy/quick-installation-guide.md",
20-
"redirect_url": "deploy/deploy-defender-identity",
20+
"redirect_url": "deploy-defender-identity",
2121
"redirect_document_id": false
2222
},
2323
{
2424
"source_path": "ATPDocs/deploy/prerequisites.md",
25-
"redirect_url": "deploy/prerequisites-sensor-version-2",
25+
"redirect_url": "prerequisites-sensor-version-2",
2626
"redirect_document_id": false
2727
},
2828
{
2929
"source_path": "ATPDocs/deploy/activate-capabilities.md",
30-
"redirect_url": "deploy/activate-sensor",
30+
"redirect_url": "activate-sensor",
3131
"redirect_document_id": false
3232
},
3333
{
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path": "unified-secops-platform/mto-tenantgroups.md",
5+
"redirect_url": "mto-distribution-profiles",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

ATPDocs/advanced-settings.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Adjust alert thresholds | Microsoft Defender for Identity
33
description: Learn how to configure the number of Microsoft Defender for Identity alerts triggered of specific alert types by adjusting alert thresholds.
4-
ms.date: 02/11/2024
4+
ms.date: 08/03/2025
55
ms.topic: how-to
66
#CustomerIntent: As a Microsoft Defender for Identity customer, I want to reduce the number of false positives by adjusting thresholds for specific alerts.
77
ms.reviewer: rlitinsky
@@ -15,7 +15,7 @@ Some Defender for Identity alerts rely on *learning periods* to build a profile
1515

1616
Use the **Adjust alert thresholds** page to customize the threshold level for specific alerts to influence their alert volume. For example, if you're running comprehensive testing, you might want to lower alert thresholds to trigger as many alerts as possible.
1717

18-
Alerts are always triggered immediately if the **Recommended test mode** option is selected, or if a threshold level is set to **Medium** or **Low**, regardless of whether the alert's learning period has already completed.
18+
Alerts are triggered immediately if the **Recommended test mode** option is selected, or if a threshold level is set to **Medium** or **Low**, regardless of whether the alert's learning period has already completed.
1919

2020
> [!NOTE]
2121
> The **Adjust alert thresholds** page was previously named **Advanced settings**. For details about this transition and how any previous settings were retained, see our [What's New announcement](whats-new.md#enhanced-user-experience-for-adjusting-alert-thresholds-preview).
@@ -46,24 +46,27 @@ For example, if you have NAT or VPN, we recommend that you consider any changes
4646
When you select **Medium** or **Low**, details are bolded in the **Information** column to help you understand how the change affects the alert behavior.
4747

4848
1. Select **Apply changes** to save changes.
49+
1. Select **Revert to default** and then **Apply changes** to reset all alerts to the default threshold (**High**). Reverting to default is irreversible and any changes made to your threshold levels are lost.
4950

50-
Select **Revert to default** and then **Apply changes** to reset all alerts to the default threshold (**High**). Reverting to default is irreversible and any changes made to your threshold levels are lost.
51-
52-
## Switch to test mode
51+
## Switch to Recommended test mode
5352

5453
The **Recommended test mode** option is designed to help you understand all Defender for Identity alerts, including some related to legitimate traffic and activities so that you can thoroughly evaluate Defender for Identity as efficiently as possible.
5554

5655
If you recently deployed Defender for Identity and want to test it, select the **Recommended test mode** option to switch all alert thresholds to **Low** and increase the number of alerts triggered.
5756

58-
Threshold levels are read-only when the **Recommended test mode** option is selected. When you're finished testing, toggle the **Recommended test mode** option back off to return to your previous settings.
57+
Threshold levels are read-only when the **Recommended test mode** option is selected.
58+
59+
> [!NOTE]
60+
> Test mode is time-limited to a maximum of 60 days.
61+
> When turning on Recommended test mode, you must specify an end time. The selected end time is displayed next to the toggle for as long as test mode is enabled.
5962
60-
Select **Apply changes** to save changes.
63+
When you're finished testing, toggle the Recommended test mode option back off to return to your previous settings. Select **Apply changes** to save changes.
6164

6265
## Supported detections for threshold configurations
6366

6467
The following table describes the types of detections that support adjustments for threshold levels, including the effects of **Medium** and **Low** thresholds.
6568

66-
Cells marked with N/A indicate that the threshold level is not supported for the detection
69+
Cells marked with N/A indicate that the threshold level isn't supported for the detection.
6770

6871
| Detection | Medium | Low |
6972
| --- | --- | --- |

ATPDocs/alerts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ For example, there are categories for:
3636

3737
For detailed information about each alert see:
3838
- [Microsoft Defender for Identity classic alerts](alerts-mdi-classic.md)
39-
- [Microsoft Defender for XDR alerts](alerts-xdr.md)
39+
- [Microsoft Defender for Identity XDR alerts](alerts-xdr.md)
4040

4141

4242
## See Also
456 KB
Loading
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
---
2+
title: 'Security Assessment: Remove Discoverable Passwords in Active Directory Account Attributes (Preview)'
3+
description: Learn how to identify and address discoverable passwords in Active Directory account attributes to mitigate security risks and improve your organization's security posture.
4+
ms.date: 08/12/2025
5+
ms.topic: how-to
6+
---
7+
8+
# Security Assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
9+
10+
11+
## Why do discoverable passwords in Active Directory account attributes pose a risk?
12+
13+
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges.
14+
15+
Attackers seek low-friction paths to expand access. Exposed passwords in these attributes represent an easy win because:
16+
17+
- The attributes aren't access-restricted.
18+
19+
- They aren't monitored by default.
20+
21+
- They provide context attackers can exploit for lateral movement and privilege escalation.
22+
23+
Removing exposed credentials from these attributes reduces the risk of identity compromise and strengthens your organization’s security posture.
24+
25+
26+
## How does Microsoft Defender for Identity detect discoverable passwords?
27+
28+
> [!NOTE]
29+
> Findings can include false positives. Always validate the results before taking action.
30+
31+
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse.
32+
This recommendation uses GenAI-powered analysis of Active directory attributes to detect:
33+
34+
- Plaintext passwords or variations. For example, '`Password=Summer2025!'`
35+
36+
- Credential patterns, reset hints, or sensitive account information.
37+
38+
- Other indicators suggesting operational misuse of directory fields.
39+
40+
Detected matches are surfaced in **Secure Score** and the **Security Assessment report** for review and remediation.
41+
42+
43+
## Remediation steps
44+
45+
To address this security assessment, follow these steps:
46+
47+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for Remove discoverable passwords in Active Directory account attributes.
48+
1. Review the exposed entries in the security report. Identify any field content that includes:
49+
50+
- Cleartext passwords
51+
52+
- Reset instructions or credential clues
53+
54+
- Sensitive business or system information
55+
56+
1. Remove sensitive information from the listed attribute fields using standard directory management tools (for example, PowerShell or ADSI Edit).
57+
1. Fully remove the sensitive information. Don’t just mask the value. Partial obfuscation (for example, P@ssw***) can still offer useful clues to attackers.
58+
59+
> [!NOTE]
60+
> Assessments are updated in near real time. Scores and statuses are updated every 24 hours. The list of impacted entities is updated within a few minutes of you implementing the recommendations. The status might take time until it's marked as **Completed**.
61+
62+
## Related articles
63+
64+
- [Learn more about Microsoft Secure Score](/defender-xdr/microsoft-secure-score)
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: 'Security Assessment: Remove Inactive Service Account (Preview)'
3+
description: Learn how to identify and address inactive Active Directory service accounts to mitigate security risks and improve your organization's security posture.
4+
ms.date: 08/17/2025
5+
ms.topic: how-to
6+
#customer intent: As a security administrator, I want to improve security posture in my organization by removing inactive service accounts
7+
---
8+
9+
# Security Assessment: Remove Inactive Service Accounts (Preview)
10+
11+
This recommendation lists Active Directory service accounts detected as inactive (stale) within the past 180 days.
12+
13+
## Why do inactive service accounts pose a risk?
14+
15+
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Dormant service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
16+
17+
This exposure creates several risks:
18+
19+
- Unauthorized access to sensitive applications and data.
20+
21+
- Lateral movement across the network without detection.
22+
23+
24+
## How do I use this security assessment to improve my organizational security posture?
25+
26+
To use this security assessment effectively, follow these steps:
27+
28+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions ) for Remove inactive service account.
29+
1. Review the list of exposed entities to discover which of your service account is inactive.
30+
31+
:::image type="content" source="media/okta-integration/remove-inactive-service-accounts.png" alt-text="Screenshot that shows the recommendation action to remove inactive service accounts." lightbox="media/okta-integration/remove-inactive-service-accounts.png":::
32+
33+
1. Take appropriate actions on those entities by removing the service account. For example:
34+
35+
- **Disable the account:** Prevent any usage by disabling the account identified as exposed.
36+
37+
- **Monitor for impact:** Wait several weeks and monitor for operational issues, such as service disruptions or errors.
38+
39+
- **Delete the account:** If no issues are observed, delete the account and fully remove its access.
40+
41+
> [!NOTE]
42+
> Assessments are updated in near real time, and scores and statuses are updated every 24 hours. The list of impacted entities is updated within a few minutes of your implementing the recommendations. The status might take time until it's marked as **Completed**.
43+
44+
## Related articles
45+
46+
- [Learn more about Microsoft Secure Score](/defender-xdr/microsoft-secure-score)

0 commit comments

Comments
 (0)