You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/create-directory-service-account-gmsa.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,8 +11,10 @@ This article describes how to create a [group managed service account (gMSA)](/w
11
11
12
12
For more information, see [Directory Service Accounts for Microsoft Defender for Identity](../directory-service-accounts.md).
13
13
14
-
>[!TIP]
15
-
>In multi-forest, multi-domain environments, we recommend creating the gMSAs with a unique name for each forest or domain. Also, create a universal group in each domain, containing all sensors' computer accounts so that all sensors can retrieve the gMSAs' passwords, and perform the cross-domain authentications.
14
+
>[!NOTE]
15
+
>In multi-forest, multi-domain environments, the sensors that need to use the gMSA need to have their computer accounts trusted by the domain where the gMSA was created.
16
+
>We recommend creating a universal group in each domain, containing all sensors' computer accounts so that all sensors can retrieve the gMSAs' passwords, and perform the cross-domain authentications.
17
+
>We also recommend creating the gMSAs with a unique name for each forest or domain.
16
18
17
19
## Prerequisites: Grant permissions to retrieve the gMSA account's password
Copy file name to clipboardExpand all lines: ATPDocs/deploy/remote-calls-sam.md
+15-8Lines changed: 15 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,13 @@ ms.topic: how-to
9
9
10
10
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
11
11
12
+
> [!NOTE]
13
+
> This feature can potentially be exploited by an adversary to obtain the Net-NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
14
+
> The new Defender for Identity sensor is not affected by this issue as it uses different detection methods.
15
+
>
16
+
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.
17
+
> Please note that this will result in reduced data available for the [attack path feature in Exposure Management](/security-exposure-management/review-attack-paths).
18
+
12
19
This article describes the configuration changes required to allow the Defender for Identity Directory Services Account (DSA) to perform the SAM-R queries.
13
20
14
21
> [!TIP]
@@ -20,7 +27,7 @@ This article describes the configuration changes required to allow the Defender
20
27
To ensure that Windows clients and servers allow your Defender for Identity Directory Services Account (DSA) to perform SAM-R queries, you must modify the **Group Policy** and add the DSA, in **addition to the configured accounts** listed in the **Network access** policy. Make sure to apply group policies to all computers **except domain controllers**.
21
28
22
29
> [!IMPORTANT]
23
-
> Perform this procedure in [*audit mode*](/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls#audit-only-mode) first, verifying the compatibility of the proposed configuration before making the changes to your production environment.
30
+
> Perform this procedure in the [*audit mode*](/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls#audit-only-mode) first, by verifying the compatibility of the proposed configuration before making the changes to your production environment.
24
31
>
25
32
> Testing in audit mode is critical in ensuring that your environment remains secure, and any changes will not impact your application compatibility. You may observe increased SAM-R traffic, generated by the Defender for Identity sensors.
26
33
>
@@ -31,9 +38,9 @@ To ensure that Windows clients and servers allow your Defender for Identity Dire
31
38
32
39
:::image type="content" source="../media/samr-policy-location.png" alt-text="Screenshot of the Network access policy selected." lightbox="../media/samr-policy-location.png":::
33
40
34
-
1. Add the DSA to the list of approved accounts able to perform this action, together with any other account that you've discovered during audit mode
41
+
1. Add the DSA to the list of approved accounts able to perform this action, together with any other account that you've discovered during audit mode.
35
42
36
-
For more information, see [Network access: Restrict clients allowed to make remote calls to SAM](/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls).
43
+
For more information, see [Network access: Restrict clients allowed to make remote calls to SAM](/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls).
37
44
38
45
## Make sure the DSA is allowed to access computers from the network (optional)
39
46
@@ -48,10 +55,10 @@ For more information, see [Network access: Restrict clients allowed to make remo
48
55
49
56
1. Add the Defender for Identity Directory Service account to the list of approved accounts.
50
57
51
-
> [!IMPORTANT]
52
-
> When configuring user rights assignments in group policies, it's important to note that the setting *replaces* the previous one rather than adding to it. Therefore, make sure to include *all* the desired accounts in the effective group policy. By default, workstations and servers include the following accounts: Administrators, Backup Operators, Users, and Everyone
53
-
>
54
-
> The [Microsoft Security Compliance Toolkit](https://www.microsoft.com/download/details.aspx?id=55319) recommends replacing the default *Everyone* with *Authenticated Users* to prevent anonymous connections from performing network sign-ins. Review your local policy settings before managing the [Access this computer from the network](/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network) setting from a GPO, and consider including *Authenticated Users* in the GPO if needed.
58
+
> [!IMPORTANT]
59
+
> When configuring user rights assignments in group policies, it's important to note that the setting *replaces* the previous one rather than adding to it. Therefore, make sure to include *all* the desired accounts in the effective group policy. By default, workstations and servers include the following accounts: Administrators, Backup Operators, Users, and Everyone.
60
+
>
61
+
> The [Microsoft Security Compliance Toolkit](https://www.microsoft.com/download/details.aspx?id=55319) recommends replacing the default *Everyone* with *Authenticated Users* to prevent anonymous connections from performing network sign-ins. Review your local policy settings before managing the [Access this computer from the network](/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network) setting from a GPO, and consider including *Authenticated Users* in the GPO if needed.
55
62
56
63
## Configure a Device profile for Microsoft Entra hybrid joined devices only
57
64
@@ -86,7 +93,7 @@ This procedure describes how to use the [Microsoft Intune admin center](https://
86
93
87
94
1. Continue the wizard to select the **scope tags** and **assignments**, and select **Create** to create your profile.
88
95
89
-
For more information, see [Apply features and settings on your devices using device profiles in Microsoft Intune](/mem/intune/configuration/device-profiles).
96
+
For more information, see [Apply features and settings on your devices using device profiles in Microsoft Intune](/mem/intune/configuration/device-profiles).
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/api-alerts.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,6 @@ The response object defines the following properties.
53
53
| intent | list | A field that specifies the kill chain related intent behind the alert. Multiple values can be reported in this field. The **intent** enumeration values follow the [MITRE att@ck enterprise matrix model](https://attack.mitre.org/matrices/enterprise/). Further guidance on the different techniques that make up each intent can be found in MITRE's documentation.<br> Possible values include:<br/><br>**0**: UNKNOWN<br />**1**: PREATTACK<br />**2**: INITIAL_ACCESS<br />**3**: PERSISTENCE<br />**4**: PRIVILEGE_ESCALATION<br />**5**: DEFENSE_EVASION<br />**6**: CREDENTIAL_ACCESS<br />**7**: DISCOVERY<br />**8**: LATERAL_MOVEMENT<br />**9**: EXECUTION<br />**10**: COLLECTION<br />**11**: EXFILTRATION<br />**12**: COMMAND_AND_CONTROL<br />**13**: IMPACT |
54
54
| isPreview | bool | Alerts that have been recently released as GA |
55
55
| audits *(optional)*| list | List of event IDs that are related to the alert |
56
-
| threatScore | int | User investigation priority |
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-workplace.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,14 +2,14 @@
2
2
title: Protect your Workplace environment | Microsoft Defender for Cloud Apps
3
3
description: Learn how about connecting your Workplace app to Defender for Cloud Apps using the API connector.
4
4
ms.topic: how-to
5
-
ms.date: 12/06/2023
5
+
ms.date: 12/08/2024
6
6
---
7
7
8
8
# How Defender for Cloud Apps helps protect your Workplace environment (Preview)
9
9
10
10
11
11
12
-
Workplace by Meta is an online collaboration software tool developed by Meta that facilitates online groupwork, instant messaging, video conferencing, and news sharing in one place. Along with the benefits of effective collaboration in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include messages, posts, and files with potentially sensitive information, collaboration, partnership details, and more. Preventing exposure of this data requires continuous monitoring to prevent any malicious actors or security-unaware insiders from exfiltrating sensitive information.
12
+
Workplace by Meta is an online collaboration software tool developed by Meta that facilitates online group work, instant messaging, video conferencing, and news sharing in one place. Along with the benefits of effective collaboration in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include messages, posts, and files with potentially sensitive information, collaboration, partnership details, and more. Preventing exposure of this data requires continuous monitoring to prevent any malicious actors or security-unaware insiders from exfiltrating sensitive information.
13
13
14
14
Connecting Workplace by Meta to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection for anomalous behavior.
15
15
@@ -96,6 +96,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
96
96
> - The first connection can take up to 4 hours to get all users and their activities.
97
97
> - The activities that will show are the activities that were generated from the moment the connector is connected.
98
98
> - After the connector's **Status** is marked as **Connected**, the connector is live and works.
99
+
> - Before deleting the app in Workplace, make sure to disconnect the connector in the Defender for Cloud Apps portal.
0 commit comments