You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .acrolinx-config.edn
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ For more information about the exception criteria and exception process, see [Mi
39
39
40
40
Select the total score link to review all feedback on clarity, consistency, tone, brand, terms, spelling, grammar, readability, and inclusive language. _You should fix all spelling errors regardless of your total score_. Fixing spelling errors helps maintain customer trust in overall content quality.
41
41
42
-
| Article | Total score<br>(Required: 80) | Words + phrases<br>(Brand, terms) | Correctness<br>(Spelling, grammar) | Clarity<br>(Readability) |
42
+
| Article | Total score<br>(Required: 80) | Terminology | Spelling and Grammar| Clarity<br>(Readability) |
Copy file name to clipboardExpand all lines: ATADocs/index.yml
-1Lines changed: 0 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,6 @@ metadata:
8
8
description: Protect your enterprise using information from multiple network data-sources to learn the behavior of users and entities in your organization.
Copy file name to clipboardExpand all lines: ATPDocs/deploy/remote-calls-sam.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ Microsoft Defender for Identity mapping for [potential lateral movement paths](/
11
11
12
12
> [!NOTE]
13
13
> This feature can potentially be exploited by an adversary to obtain the Net-NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
14
-
> The new Defender for Identity sensor is not affected by this issue as it uses different detection methods.
14
+
> The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods.
15
15
>
16
16
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.
17
17
> Please note that this will result in reduced data available for the [attack path feature in Exposure Management](/security-exposure-management/review-attack-paths).
Copy file name to clipboardExpand all lines: ATPDocs/index.yml
+1-2Lines changed: 1 addition & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -6,8 +6,7 @@ metadata:
6
6
title: Microsoft Defender for Identity documentation
7
7
description: Microsoft Defender for Identity cloud service helps protect your enterprise hybrid environments from multiple types of advanced targeted cyber attacks and insider threats.
Copy file name to clipboardExpand all lines: ATPDocs/monitored-activities.md
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,18 +14,20 @@ In the case of a valid threat, or **true positive**, Defender for Identity enabl
14
14
The information monitored by Defender for Identity is presented in the form of activities. Defender for Identity currently supports monitoring of the following activity types:
15
15
16
16
> [!NOTE]
17
-
>
18
17
> - This article is relevant for all Defender for Identity sensor types.
19
18
> - Defender for Identity monitored activities appear on both the user and machine profile page.
20
-
> - Defender for Identity monitored activities are also available in Microsoft Defender XDR's [Advanced Hunting](https://security.microsoft.com/advanced-hunting) page.
19
+
> - Defender for Identity monitored activities are also available in [Microsoft Defender XDR's Advanced Hunting](/defender-xdr/advanced-hunting-overview) page.
20
+
21
+
> [!TIP]
22
+
> For detailed information on all supported event types (`ActionType` values) in Advanced Hunting Identity-related tables, use the built-in schema reference available in Microsoft Defender XDR.
21
23
22
24
## Monitored user activities: User account AD attribute changes
23
25
24
26
|Monitored activity|Description|
25
27
|---------------------|------------------|
26
28
|Account Constrained Delegation State Changed|The account state is now enabled or disabled for delegation.|
27
29
|Account Constrained Delegation SPNs Changed|Constrained delegation restricts the services to which the specified server can act on behalf of the user.|
28
-
|Account Delegation Changed | Changes to the account delegation settings |
30
+
|Account Delegation Changed | Changes to the account delegation settings.|
29
31
|Account Disabled Changed|Indicates whether an account is disabled or enabled.|
30
32
|Account Expired|Date when the account expires.|
31
33
|Account Expiry Time Changed|Change to the date when the account expires.|
@@ -35,9 +37,9 @@ The information monitored by Defender for Identity is presented in the form of a
35
37
|Account Password Never Expires Changed|User's password changed to never expire.|
36
38
|Account Password Not Required Changed|User account was changed to allow logging in with a blank password.|
37
39
|Account Smartcard Required Changed|Account changes to require users to log on to a device using a smart card.|
0 commit comments