You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/activate-capabilities.md
+24-12Lines changed: 24 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ Microsoft Defender for Endpoint customers, who have already onboarded their doma
12
12
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
13
13
14
14
> [!IMPORTANT]
15
-
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](https://learn.microsoft.com/defender-for-identity/deploy/quick-installation-guide)
15
+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](quick-installation-guide.md).
16
16
17
17
## Prerequisites
18
18
@@ -43,7 +43,7 @@ Your domain controller must be onboarded to Microsoft Defender for Endpoint.
43
43
44
44
For more information, see [Onboard a Windows server](/microsoft-365/security/defender-endpoint/onboard-windows-server).
45
45
46
-
### Required permissions
46
+
### Permissions requirements
47
47
48
48
To access the Defender for Identity **Activation** page, you must either be a [Security Administrator](/entra/identity/role-based-access-control/permissions-reference), or have the following Unified RBAC permissions:
49
49
@@ -82,13 +82,29 @@ Set-MDIConfiguration -Mode Domain -Configuration All
82
82
83
83
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
84
84
85
-
1. In the [Defender portal](https://security.microsoft.com), select **Settings > Identities > [Activation](https://security.microsoft.com/settings/identities?tabid=onboarding)**.
85
+
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
86
86
87
-
The**Activation**page lists any detected and eligible domain controllers.
87
+
1. Navigate to **System** >**Settings**> **Identities** > **Activation**.
88
88
89
-
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
89
+
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
90
90
91
-
When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
91
+
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
92
+
93
+
> [!NOTE]
94
+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they are discovered, or manually, where you select specific domain controllers from the list of eligible servers.
95
+
96
+
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
97
+
98
+
## Onboarding Confirmation
99
+
100
+
To confirm the sensor has been onboarded:
101
+
102
+
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
103
+
104
+
2. Check that the onboarded domain controller is listed.
105
+
106
+
> [!NOTE]
107
+
> The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
92
108
93
109
## Test activated capabilities
94
110
@@ -106,9 +122,9 @@ Use the following procedures to test your environment for Defender for Identity
106
122
107
123
### Check the ITDR dashboard
108
124
109
-
In the Defender portal, select **Identities > Dashboard** and review the details shown, checking for expected results from your environment.
125
+
In the Defender portal, select **Identities** > **Dashboard**, and review the details shown, checking for expected results from your environment.
110
126
111
-
For more information, see [Work with Defender for Identity's ITDR dashboard (Preview)](../dashboard.md).
127
+
For more information, see [Work with Defender for Identity's ITDR dashboard](../dashboard.md).
112
128
113
129
114
130
### Confirm entity page details
@@ -193,10 +209,6 @@ Test remediation actions on a test user. For example:
193
209
194
210
1. Check Active Directory for the expected activity.
195
211
196
-
> [!NOTE]
197
-
> The current version doesn't collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
198
-
199
-
200
212
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
201
213
202
214
## Deactivate Defender for Identity capabilities on your domain controller
0 commit comments