Skip to content

Commit 71b119d

Browse files
Merge branch 'public' into patch-2
2 parents b99185c + aada4fa commit 71b119d

File tree

95 files changed

+1284
-1649
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+1284
-1649
lines changed

.openpublishing.redirection.ata-atp.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,21 @@
1515
"redirect_url": "deploy/active-directory-federation-services",
1616
"redirect_document_id": false
1717
},
18+
{
19+
"source_path": "ATPDocs/deploy/quick-installation-guide.md",
20+
"redirect_url": "deploy/deploy-defender-identity",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "ATPDocs/deploy/prerequisites.md",
25+
"redirect_url": "deploy/prerequisites-sensor-version-2",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "ATPDocs/deploy/activate-capabilities.md",
30+
"redirect_url": "deploy/activate-sensor",
31+
"redirect_document_id": false
32+
},
1833
{
1934
"source_path": "ATPDocs/configure-event-collection.md",
2035
"redirect_url": "deploy/configure-event-collection",

ATPDocs/deploy/activate-capabilities.md

Lines changed: 0 additions & 268 deletions
This file was deleted.

ATPDocs/deploy/activate-sensor.md

Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
---
2+
title: Activate the Defender for Identity sensor v3.x on a domain controller
3+
description: Learn about how to activate the Microsoft Defender for Identity sensor on domain controllers.
4+
ms.date: 06/30/2025
5+
ms.topic: how-to
6+
ms.reviewer: rlitinsky
7+
---
8+
9+
# Activate the Defender for Identity sensor v3.x on a domain controller (Preview)
10+
11+
For complete protection of your on-premises deployment, we recommend activating the Defender for Identity sensor on all applicable servers. This article describes onboarding for new domain controllers running Windows Server 2019 or later. For domain controllers running older operating systems, we recommend [deploying the classic Defender for Identity sensor](install-sensor.md).
12+
13+
## Prerequisites
14+
See [Microsoft Defender for Identity sensor v3.x prerequisites](prerequisites-sensor-version-3.md) for all system requirements before proceeding with activating the sensor.
15+
16+
## The Activation page
17+
18+
The **Activation** page displays all servers from your device inventory. Defender for Identity detects all of your servers and their configuration. The server's activation state lets you know what you need to do to onboard the domain controller to Defender for Identity.
19+
20+
You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, by selecting specific domain controllers from the list of eligible servers.
21+
22+
[![Screenshot that shows the Defender for Identity sensor activation page.](media/activate-capabilities/activation-page.png)](media/activate-capabilities/activation-page.png#lightbox)
23+
24+
|Activation State |Next steps |
25+
|---------|---------|
26+
|Activate new sensor |The domain controller is already onboarded to Defender for Endpoint. [Activate the sensor](#activate-the-defender-for-identity-sensor).|
27+
|Install classic sensor|[Deploy the classic Defender for Identity sensor](install-sensor.md) from the **Sensors page**.|
28+
|OS update is required |This domain controller is running an unsupported operating system version for the new sensor. Update the server to Windows Server 2019 or later to use the new sensor. |
29+
30+
<!--|Download onboarding package |[Onboard the domain controller to Defender for Endpoint](#onboard-the-domain-controller).|-->
31+
32+
<!--## The Activation process
33+
The process for activating the sensor depends on your configuration.
34+
- If you have a Defender for Endpoint deployment, simply [activate the sensor](#activate-the-defender-for-identity-sensor).
35+
- If the domain controller is not onboarded to Defender for Endpoint, [onboard the domain controller](#onboard-the-domain-controller) by configuring Defender for Endpoint streamlined URLs, and then downloading and running the onboarding package.-->
36+
37+
## Activate the Defender for Identity sensor
38+
39+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Identities** > **Activation**.
40+
1. Select the domain controller where you want to activate Defender for Identity, and select **Activate**. Confirm your selection when prompted.
41+
42+
[![Screenshot that shows how to activate the new sensor.](media/activate-capabilities/activate.png)](media/activate-capabilities/activate.png#lightbox)
43+
44+
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers**. This takes you to the **Sensors** page, where you can check your sensor health.
45+
46+
[![Screenshot that shows how to see the onboarded servers.](media/activate-capabilities/successfully-activated.png)](media/activate-capabilities/successfully-activated.png#lightbox)
47+
48+
<!--## Onboard the domain controller
49+
50+
If the domain controller has not been onboarded to Defender for Endpoint for Servers, follow these steps to activate the sensor.
51+
52+
1. [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server) using [streamlined URLs](/microsoft-365/security/defender-endpoint/configure-device-connectivity#option-1-configure-connectivity-using-the-simplified-domain).
53+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Identities** > **Activation**.
54+
1. Select **Download onboarding package**, and save the file in a location you can access from your domain controller.
55+
56+
[![Screenshot that shows how to onboard the new sensor.](media/activate-capabilities/download-on-boarding.png)](media/activate-capabilities/download-on-boarding.png#lightbox)
57+
58+
1. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal.
59+
1. Run the `DefenderForIdentityOnlyOnboardingScript.cmd` script as an administrator.
60+
61+
[![screenshot that shows the onboarding script.](media/activate-capabilities/screenshot-2025-06-04-170500.png)](media/activate-capabilities/screenshot-2025-06-04-170500.png#lightbox)
62+
63+
!-->
64+
65+
## Confirm sensor activation
66+
67+
To confirm the sensor is working:
68+
69+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Identities** > **Sensors**.
70+
1. Check that the activated domain controller is listed.
71+
72+
> [!NOTE]
73+
> The first time you activate the Defender for Identity sensor on your domain controller, it might take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes. The activation doesn't require a restart/reboot.
74+
75+
## Next steps
76+
- [Manage and update Microsoft Defender for Identity sensors](../sensor-settings.md).

ATPDocs/deploy/active-directory-federation-services.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ These considerations apply:
1818

1919
## Prerequisites
2020

21-
Prerequisites for installing Defender for Identity sensors on AD FS, AD CS, or Microsoft Entra Connect servers are the same as for installing sensors on domain controllers. For more information, see [Microsoft Defender for Identity prerequisites](prerequisites.md).
21+
Prerequisites for installing Defender for Identity sensors on AD FS, AD CS, or Microsoft Entra Connect servers are the same as for installing sensors on domain controllers. For more information, see [Microsoft Defender for Identity prerequisites](prerequisites-sensor-version-2.md).
2222

2323
A sensor installed on an AD FS, AD CS, or Microsoft Entra Connect server can't use the local service account to connect to the domain. Instead, you need to configure a [Directory Service Account](directory-service-accounts.md).
2424

@@ -188,5 +188,5 @@ To validate that you successfully deployed a Defender for Identity sensor on an
188188
189189
For more information, see:
190190
191-
- [Microsoft Defender for Identity prerequisites](prerequisites.md)
191+
- [Microsoft Defender for Identity prerequisites](prerequisites-sensor-version-2.md)
192192
- [Install the Microsoft Defender for Identity sensor](install-sensor.md)

ATPDocs/deploy/capacity-planning.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ ms.reviewer: rlitinsky
1010

1111
This article describes how to use the Microsoft Defender for Identity sizing tool to determine whether your domain controller servers have enough resources for a Microsoft Defender for Identity sensor.
1212

13-
While domain controller performance may not be affected if the server doesn't have required resources, the Defender for Identity sensor may not operate as expected. For more information, see [Microsoft Defender for Identity prerequisites](prerequisites.md).
13+
While domain controller performance may not be affected if the server doesn't have required resources, the Defender for Identity sensor may not operate as expected. For more information, see [Microsoft Defender for Identity prerequisites](prerequisites-sensor-version-2.md).
1414

15-
The sizing tool measures the capacity needed for domain controllers only. There is no need to run it against AD FS / AD CS / Entra Connect servers, as the performance impact on these servers is extremely minimal to not existent.
15+
The sizing tool measures the capacity needed for domain controllers only. There is no need to run it against servers that are only AD FS, AD CS, or Entra Connect (unless those servers also function as a domain controller), as the performance impact on these servers is extremely minimal to not existent.
1616

1717
> [!TIP]
1818
> By default, Defender for Identity supports up to 350 sensors. To install more sensors, contact Defender for Identity support.
@@ -22,7 +22,7 @@ The sizing tool measures the capacity needed for domain controllers only. There
2222

2323
- Download the [Defender for Identity sizing tool](<https://aka.ms/mdi/sizingtool>).
2424
- Review the [Defender for Identity architecture](../architecture.md) article.
25-
- Review the [Defender for Identity prerequisites](prerequisites.md) article.
25+
- Review the [Defender for Identity prerequisites](prerequisites-sensor-version-2.md) article.
2626

2727
To ensure accurate results, only run the sizing tool *before* you've installed any Defender for Identity sensors in your environment.
2828

@@ -120,6 +120,10 @@ Various tools can help you discover the average packet/second counter for your d
120120
> [!NOTE]
121121
> By default, Defender for Identity supports up to 350 sensors. If you want to install more sensors, contact Defender for Identity support.
122122
123+
> [!IMPORTANT]
124+
> If your domain controller runs low on available memory, a corresponding health issue will appear in the Defender for Identity portal to alert you of this condition. Learn more about [health issues](../health-alerts.md).
125+
126+
123127
## Next step
124128

125129

ATPDocs/deploy/configure-proxy.md

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,27 @@
11
---
2-
title: Verify connectivity to the Defender for Identity service | Microsoft Defender for Identity
2+
title: Connect to the Defender for Identity service | Microsoft Defender for Identity
33
description: Learn how to set up your firewall or proxy to allow communication between the Microsoft Defender for Identity cloud service and Microsoft Defender for Identity sensors.
44
ms.date: 02/12/2024
55
ms.topic: how-to
66
ms.reviewer: rlitinsky
77
---
88

9-
# Configure endpoint proxy and internet connectivity settings
9+
# Connect to the Defender for Identity service
1010

1111
Each Microsoft Defender for Identity sensor requires internet connectivity to the Defender for Identity cloud service to report sensor data and operate successfully.
1212

1313
In some organizations, the domain controllers aren't directly connected to the internet, but are connected through a web proxy connection, and SSL inspection and intercepting proxies are not supported for security reasons. In such cases, your proxy server must allow the data to directly pass from the Defender for Identity sensors to the relevant URLs without interception.
1414

1515
> [!IMPORTANT]
1616
> Microsoft does not provide a proxy server. This article describes how to ensure that the required URLs are accessible via a proxy server that you configure.
17-
>
1817
1918
## Enable access to Defender for Identity service URLs in the proxy server
2019

2120
To ensure maximal security and data privacy, Defender for Identity uses certificate-based, mutual authentication between each Defender for Identity sensor and the Defender for Identity cloud back-end. SSL inspection and interception are not supported, as they interfere in the authentication process.
2221

2322
To enable access to Defender for Identity, make sure to allow traffic to the sensor URL, using the following syntax: `<your-workspace-name>sensorapi.atp.azure.com`. For example, `contoso-corpsensorapi.atp.azure.com`.
2423

24+
- To get your workspace name, see the [About page](https://security.microsoft.com/settings/identities) in the portal.
2525
- If your proxy or firewall uses explicit allowlists, we also recommend ensuring that the following URLs are allowed:
2626

2727
- `crl.microsoft.com`
@@ -128,13 +128,6 @@ To configure your proxy, copy your proxy configuration in user context to the **
128128

129129
Make sure to paste the value from the `Current_User`'s `DefaultConnectionSettings` registry key as `REG_BINARY`.
130130

131-
## Related content
132-
133-
For more information, see:
134-
135-
- [Run a silent installation with a proxy configuration](install-sensor.md#command-for-running-a-silent-installation-with-a-proxy-configuration)
136-
- [Test Microsoft Defender for Identity connectivity](test-connectivity.md)
137-
138131
## Next step
139132

140133
> [!div class="step-by-step"]

ATPDocs/deploy/configure-sensor-settings.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ After the Defender for Identity sensor is installed, do the following to view an
5959
|Name |Description |
6060
|---------|---------|
6161
|**Description** | Optional. Enter a description for the Defender for Identity sensor. |
62-
|**Domain Controllers (FQDN)** | Required for the Defender for Identity [standalone sensors](prerequisites-standalone.md) and [sensors installed on AD FS / AD CS servers](active-directory-federation-services.md), and cannot be modified for the Defender for Identity sensor. <br><br>Enter the complete FQDN of your domain controller and select the plus sign to add it to the list. For example, **DC1.domain1.test.local**. <br><br>For any servers you define in the **Domain Controllers** list: <br><br> - All domain controllers whose traffic is being monitored via port mirroring by the Defender for Identity standalone sensor must be listed in the **Domain Controllers** list. If a domain controller isn't listed in the **Domain Controllers** list, detection of suspicious activities might not function as expected. <br><br> - At least one domain controller in the list should be a global catalog. This enables Defender for Identity to resolve computer and user objects in other domains in the forest. |
62+
|**Domain Controllers (FQDN)** | Required for the Defender for Identity [standalone sensors](prerequisites-standalone.md) and [sensors installed on AD FS / AD CS servers](active-directory-federation-services.md), and can't be modified for the Defender for Identity sensor. <br><br>Enter the complete FQDN of your domain controller and select the plus sign to add it to the list. For example, **DC1.domain1.test.local**. <br><br>For any servers you define in the **Domain Controllers** list: <br><br> - All domain controllers whose traffic is being monitored via port mirroring by the Defender for Identity standalone sensor must be listed in the **Domain Controllers** list. If a domain controller isn't listed in the **Domain Controllers** list, detection of suspicious activities might not function as expected. <br><br> - At least one domain controller in the list should be a global catalog. This enables Defender for Identity to resolve computer and user objects in other domains in the forest. |
6363
|**Capture Network adapters** | Required. <br><br> - For Defender for Identity sensors, all network adapters that are used for communication with other computers in your organization.<br><br> - For Defender for Identity standalone sensor on a dedicated server, select the network adapters that are configured as the destination mirror port. These network adapters receive the mirrored domain controller traffic. |
6464

6565
1. On the **Sensors** page, select **Export** to export a list of your sensors to a **.csv** file. For example:
@@ -71,11 +71,9 @@ After the Defender for Identity sensor is installed, do the following to view an
7171
Use the following procedures to validate your Defender for Identity sensor installation.
7272

7373
> [!NOTE]
74-
> If you're installing on an AD FS or AD CS server, you'll use a different set of validations. For more information, see [Validate successful deployment on AD FS / AD CS servers](active-directory-federation-services.md#validate-successful-deployment).
74+
> If you're installing on an AD FS or AD CS server, you use a different set of validations. For more information, see [Validate successful deployment on AD FS / AD CS servers](active-directory-federation-services.md#validate-successful-deployment).
7575
>
7676
77-
78-
7977
### Validate successful deployment
8078

8179
To validate that the Defender for Identity sensor has been successfully deployed:

0 commit comments

Comments
 (0)