Skip to content

Commit 6e7df7f

Browse files
Merge pull request #4167 from MicrosoftDocs/main
[AutoPublish] main to live - 06/09 04:29 PDT | 06/09 16:59 IST
2 parents 71bc980 + d62a93f commit 6e7df7f

File tree

3 files changed

+19
-52
lines changed

3 files changed

+19
-52
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -87,44 +87,47 @@ Activate the Defender for Identity from the [Microsoft Defender portal](https://
8787

8888
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
8989

90-
:::image type="content" source="media/activate-capabilities/1.jpg" lightbox="media/activate-capabilities/1.jpg" alt-text="Screenshot that shows how to activate the new sensor.":::
90+
[![Screenshot that shows how to activate the new sensor.](media/activate-capabilities/1.jpg)](media/activate-capabilities/1.jpg#lightbox)
9191

92-
> [!NOTE]
93-
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
92+
93+
> [!NOTE]
94+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
9495
9596
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
9697

97-
:::image type="content" source="media/activate-capabilities/2.jpg" lightbox="media/activate-capabilities/2.jpg" alt-text="Screenshot that shows how to see the onboarded servers.":::
98+
99+
[![Screenshot that shows how to see the onboarded servers.](media/activate-capabilities/2.jpg)](media/activate-capabilities/2.jpg#lightbox)
98100

99101
### Customers without domain controllers onboarded to Defender for Endpoint
100102

101103
### Connectivity requirements
102104

103-
Defender for Identity capabilities directly on domain controllers use Defender for Endpoint URL endpoints for communication, including simplified URLs.
105+
Defender for Identity capabilities directly on domain controllers use Defender for Endpoint URL endpoints for communication, including streamlined URLs.
104106

105-
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).
107+
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server), [Configure connectivity using streamlined connection](/microsoft-365/security/defender-endpoint/configure-device-connectivity#option-1-configure-connectivity-using-the-simplified-domain).
106108

107109
### Onboard Defender for Identity capabilities
108110

109111
Download the Defender for Identity onboarding package from the [Microsoft Defender portal](https://security.microsoft.com)
110112

111113
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
112114

113-
1. Select Download onboarding package and save the file in a location you can access from your domain controller.
114-
115-
:::image type="content" source="media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor.png" alt-text="Screenshot that shows how to onboard the new sensor" lightbox="media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor.png":::
115+
2. Select Download onboarding package and save the file in a location you can access from your domain controller.
116116

117-
1. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOnboardingScript.cmd` script as an Administrator.
117+
118+
[![Screenshot that shows how to onboard the new sensor.](media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor.png)](media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor.png#lightbox)
119+
120+
3. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOnboardingScript.cmd` script as an Administrator.
118121

119-
<img width="474" alt="Screenshot that shows the script." src="https://github.com/user-attachments/assets/ff2d73d4-7285-403e-979a-520e05cbf1d1" />
122+
[![screenshot that shows the onboarding script.](media/activate-capabilities/screenshot-2025-06-04-170500.png)](media/activate-capabilities/screenshot-2025-06-04-170500.png#lightbox)
120123

121124
## Onboarding Confirmation
122125

123126
To confirm the sensor has been onboarded:
124127

125128
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
126129

127-
1. Check that the onboarded domain controller is listed.
130+
2. Check that the onboarded domain controller is listed.
128131

129132
> [!NOTE]
130133
> The onboarding doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
@@ -242,7 +245,7 @@ If you want to deactivate Defender for Identity capabilities on your domain cont
242245
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
243246
244247
![Screenshot that shows how to delete a sensor.](media/activate-capabilities/screenshot-that-shows-how-to-delete-a-sensor.png)
245-
248+
246249
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
247250
248251
### Customers without domain controllers onboarded to Defender for Endpoint
374 KB
Loading

CloudAppSecurityDocs/protect-workplace.md

Lines changed: 3 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Protect your Workplace environment | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your Workplace app to Defender for Cloud Apps using the API connector.
44
ms.topic: how-to
5-
ms.date: 12/08/2024
5+
ms.date: 06/09/2025
66
---
77

88
# How Defender for Cloud Apps helps protect your Workplace environment (Preview)
@@ -59,44 +59,8 @@ For more information, see:
5959

6060
## Connect Workplace to Microsoft Defender for Cloud Apps
6161

62-
This section provides instructions for connecting Microsoft Defender for Cloud Apps to your existing Workplace account using the App Connector APIs. This connection gives you visibility into and control over your organization's Workplace use.
63-
64-
> [!NOTE]
65-
> The Workplace API connector is rolling out gradually. If you don't see the connector yet in your environment and want to onboard soon, please fill the [Workplace API connector intake form](https://forms.microsoft.com/r/euj3pEmiM4).
66-
67-
**Prerequisites**:
68-
69-
- You must be signed-in as a system admin to Workplace by Meta.
70-
71-
> [!NOTE]
72-
> A Workplace account can be connected to a single instance of Defender for Cloud Apps. Please make sure that your Workplace account is not connected to any other Defender for Cloud Apps instance.
73-
74-
**To connect Workplace to Defender for Cloud Apps**:
75-
76-
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**.
77-
1. In the **App connectors** page, select **+Connect an app**, by **Workplace by Meta**.
78-
1. In the pop-up, give the connector a descriptive name, and select **Next**.
79-
![Give connector a name.](media/workplace-connector.png)
80-
81-
1. In the **External Link** page, select **Connect Workplace by Meta**:
82-
![Connect to Workplace.](media/connect-workplace.png)
83-
84-
1. You'll be redirected to Workplace by Meta page.
85-
86-
>[!NOTE]
87-
>Make sure you are logged into Workplace as System admin.
88-
89-
1. On the Workplace authorization page, make sure to choose the correct organization from the dropdown.
90-
91-
1. In the app consent page, make sure to choose **All groups** and then select **Add to Workplace.**
92-
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
93-
94-
> [!NOTE]
95-
>
96-
> - The first connection can take up to 4 hours to get all users and their activities.
97-
> - The activities that will show are the activities that were generated from the moment the connector is connected.
98-
> - After the connector's **Status** is marked as **Connected**, the connector is live and works.
99-
> - Before deleting the app in Workplace, make sure to disconnect the connector in Defender for Cloud Apps.
62+
> [!NOTE]
63+
> Due to the [planned deprecation](https://www.workplace.com/help/work/1167689491269151) by Meta of Workplace from Meta, we no longer support new connections to the Workplace from Meta API connector. If you have an existing Workplace from Meta connection, it will continue to work as expected.
10064
10165
## Next steps
10266

0 commit comments

Comments
 (0)