Skip to content

Commit 6d5e390

Browse files
committed
Fixed image syntax and alignment
1 parent 69364c5 commit 6d5e390

File tree

1 file changed

+23
-18
lines changed

1 file changed

+23
-18
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 23 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -83,14 +83,14 @@ Activate the Defender for Identity from the [Microsoft Defender portal](https://
8383

8484
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
8585

86-
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the activation of the new Defender for Identity sensor. For each server you can find its activation state.
86+
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the activation of the new Defender for Identity sensor. For each server you can find its activation state.
8787

8888
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
8989

9090
:::image type="content" source="media/activate-capabilities/1.jpg" lightbox="media/activate-capabilities/1.jpg" alt-text="Screenshot that shows how to activate the new sensor.":::
9191

92-
> [!NOTE]
93-
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
92+
> [!NOTE]
93+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
9494
9595
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
9696

@@ -104,16 +104,19 @@ Defender for Identity capabilities directly on domain controllers use Defender f
104104

105105
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).
106106

107-
### Onboard Defender for Identity capabilities
108-
Download the Defender for Identity onboarding package from the [Microsoft Defender portal] (https://security.microsoft.com)
107+
### Onboard Defender for Identity capabilities
108+
109+
Download the Defender for Identity onboarding package from the [Microsoft Defender portal](https://security.microsoft.com)
109110

110-
1. Navigate to **System** > **Settings** > **Identities** > **Activation**
111+
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
111112

112113
1. Select Download onboarding package and save the file in a location you can access from your domain controller.
113-
::: image type="content" source="media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor..png" alt-text="Screenshot that shows how to onboard the new sensor" lightbox="media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor..png" :::
114114

115-
1. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOnboardingScript.cmd` script as an Administrator.
116-
::: image type="content" source="media/activate-capabilities/screenshot-that-shows-the-script..png" alt-text="Screenshot that shows the script." lightbox="media/activate-capabilities/screenshot-that-shows-the-script..png":::
115+
:::image type="content" source="media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor..png" alt-text="Screenshot that shows how to onboard the new sensor" lightbox="media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor..png":::
116+
117+
1. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOnboardingScript.cmd` script as an Administrator.
118+
119+
:::image type="content" source="media/activate-capabilities/screenshot-that-shows-the-script..png" alt-text="Screenshot that shows the script." lightbox="media/activate-capabilities/screenshot-that-shows-the-script..png":::
117120

118121
## Onboarding Confirmation
119122

@@ -123,11 +126,12 @@ To confirm the sensor has been onboarded:
123126

124127
1. Check that the onboarded domain controller is listed.
125128

126-
> [!NOTE]
127-
> The onboarding doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
129+
> [!NOTE]
130+
> The onboarding doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
128131
129-
To check the onboarding on the local server you can also review the event log under **Applications and Services Logs** > **Microsoft** > **Windows** > **Sense** > **Operational**. You should receive an onboarding event:
130-
::: image type="content" source="media/activate-capabilities/screenshot-that-shows-the-eventlog..png" alt-text="Screenshot that shows the eventlog" lightbox="media/activate-capabilities/screenshot-that-shows-the-eventlog..png" :::
132+
To check the onboarding on the local server you can also review the event log under **Applications and Services Logs** > **Microsoft** > **Windows** > **Sense** > **Operational**. You should receive an onboarding event:
133+
134+
:::image type="content" source="media/activate-capabilities/screenshot-that-shows-the-eventlog..png" alt-text="Screenshot that shows the eventlog" lightbox="media/activate-capabilities/screenshot-that-shows-the-eventlog..png":::
131135

132136
**Test activated capabilities**
133137

@@ -159,7 +163,7 @@ In the Defender portal, check for the following details:
159163

160164
- **Group entities**: Use the global search to find a user group, or pivot from a user or device details page where group details are shown. Check for details of group membership, view group users, and group timeline data.
161165

162-
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
166+
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
163167

164168
For more information, see [Investigate assets](../investigate-assets.md).
165169

@@ -238,10 +242,10 @@ For more information, see [Remediation actions in Microsoft Defender for Identit
238242
239243
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
240244
241-
1. Navigate to **Settings** > **Identities** > **Sensors**
242-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
243-
![Screenshot that shows how to delete a sensor.](media/activate-capabilities/screenshot-that-shows-how-to-delete-a-sensor..png)
245+
1. Navigate to **Settings** > **Identities** > **Sensors**.
246+
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
244247
248+
![Screenshot that shows how to delete a sensor.](media/activate-capabilities/screenshot-that-shows-how-to-delete-a-sensor..png)
245249
246250
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
247251
@@ -255,7 +259,8 @@ Download the Defender for Identity offboarding package from the [Microsoft Defen
255259
1. Select Download offboarding package and save the file in a location you can access from your domain controller.
256260
![Screenshot that shows how to offboard the new sensor.](media/activate-capabilities/screenshot-that-shows-how-to-offboard-the-new-sensor..png)
257261
1. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOffboardingScript_valid_until_YYYY-MM-DD.cmd` script as an Administrator.
258-
1. To fully remove the sensor, navigate to **Settings** > **Identities** > **Sensors**, select the server and click Delete.
262+
1. To fully remove the sensor, navigate to **Settings** > **Identities** > **Sensors**, select the server and click **Delete**.
263+
259264
:::image type="content" source="media/activate-capabilities/screenshot-that-shows-how-to-delete-a-sensor..png" alt-text="Screenshot that shows how to delete a sensor" lightbox="media/activate-capabilities/screenshot-that-shows-how-to-delete-a-sensor..png":::
260265
261266

0 commit comments

Comments
 (0)