You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/assign-multi-factor-authentication-okta-privileged-user-accounts.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,6 +12,11 @@ ms.reviewer: Himanch
12
12
13
13
This report lists any Okta privileged accounts that don't have any multifactor authentication (MFA) methods assigned.
14
14
15
+
## Prerequisites
16
+
17
+
To use this security assessment, you must first connect your Okta instance in the Microsoft Defender portal.
18
+
For setup instructions, see [Connect your Okta instance](/defender-for-identity/okta-integration#connect-okta-to-defender-for-identity).
19
+
15
20
## Why is a privileged account without MFA a security risk?
16
21
17
22
All privileged accounts should have multifactor authentication (MFA) enabled to strengthen security. By ensuring that privileged accounts such as Super Admin or Org Admin roles are secured with MFA, organizations can significantly reduce the risk of unauthorized access from compromised credentials. This strategy helps prevent attackers from gaining elevated access, safeguarding sensitive resources and protecting critical administrative functions from abuse.
Copy file name to clipboardExpand all lines: ATPDocs/change-okta-password-privileged-user-accounts.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,11 @@ ms.reviewer: Himanch
11
11
12
12
This recommendation lists any Okta privileged accounts that use outdated passwords that were last set over 180 days ago.
13
13
14
+
## Prerequisites
15
+
16
+
To use this security assessment, you must first connect your Okta instance in the Microsoft Defender portal.
17
+
For setup instructions, see [Connect your Okta instance](/defender-for-identity/okta-integration#connect-okta-to-defender-for-identity).
18
+
14
19
## Why is a privileged account with an old password a security risk?
15
20
16
21
Privileged accounts with old passwords create a significant security risk, as older credentials are more likely to be exposed through data breaches or other attack vectors. Enforcing regular password updates for privileged accounts reduces the likelihood of unauthorized access and strengthens overall security. Applying stringent password policies to accounts with elevated privileges protects sensitive resources and lowers the risk of exploitation.
Copy file name to clipboardExpand all lines: ATPDocs/deploy/deploy-defender-identity.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,10 +23,10 @@ Identify your architecture and your requirements, and then use the table below t
23
23
|Server configuration |Server Operating System |Recommended deployment |
24
24
|---------|---------|---------|---------|
25
25
|Domain controller | Windows Server 2019 or later with the [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) or later.<br> * **See Note**.|[Defender for Identity sensor v3.x (Preview)](prerequisites-sensor-version-3.md)<br> * **See Note**. |
26
-
|Domain controller |Windows Server 2016 or earlier|[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
27
-
|[Active Directory Federation Services (AD FS)](active-directory-federation-services.md)|NA|[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
28
-
|[Active Directory Certificate Services (AD CS)](active-directory-federation-services.md)|NA|[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
29
-
|[Entra Connect](active-directory-federation-services.md)|NA|[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
26
+
|Domain controller |Windows Server 2016 or later|[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
27
+
|[Active Directory Federation Services (AD FS)](active-directory-federation-services.md)|Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
28
+
|[Active Directory Certificate Services (AD CS)](active-directory-federation-services.md)|Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
29
+
|[Entra Connect](active-directory-federation-services.md)|Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md)|
30
30
31
31
> [!NOTE]
32
32
> The Defender for Identity sensor version 3.x is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
Copy file name to clipboardExpand all lines: ATPDocs/high-number-of-okta-accounts-with-privileged-role-assigned.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,6 +14,12 @@ This article describes the security risks associated with having a high number o
14
14
> [!NOTE]
15
15
> This report lists Okta accounts with administrator roles - excluding Super Administrator, where the number of accounts assigned to these roles is greater than 25.
16
16
17
+
## Prerequisites
18
+
19
+
To use this security assessment, you must first connect your Okta instance in the Microsoft Defender portal.
20
+
For setup instructions, see [Connect your Okta instance](/defender-for-identity/okta-integration#connect-okta-to-defender-for-identity).
21
+
22
+
17
23
## Why is a high number of Okta accounts with privileged roles considered a security risk?
18
24
19
25
A high number of users with privileged roles increases the risk of misuse or unauthorized access to critical systems. By reducing the number of users assigned to roles such as Super Admin or Org Admin, organizations can better limit access to sensitive resources and reduce the attack surface. Maintaining a smaller, set of privileged accounts ensures more effective governance and minimizes potential security vulnerabilities.
Copy file name to clipboardExpand all lines: ATPDocs/highly-privileged-okta-api-token.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,12 @@ ms.reviewer: Himanch
11
11
12
12
This article describes the security risks associated with highly privileged Okta API tokens and provides recommendations for mitigating these risks.
13
13
14
+
## Prerequisites
15
+
16
+
To use this security assessment, you must first connect your Okta instance in the Microsoft Defender portal.
17
+
For setup instructions, see [Connect your Okta instance](/defender-for-identity/okta-integration#connect-okta-to-defender-for-identity).
18
+
19
+
14
20
## Why is a highly privileged Okta API token a security risk?
15
21
16
22
Okta’s API tokens inherit the permissions of the user who creates them. If a user with sensitive permissions generates an API token, it carries those permissions. Any API token created by a Super Admin has the same level of access as the Super Admin account. This can expose sensitive data and functionality to unauthorized users. If the token is stolen, it can grant the attacker access equivalent to the original user.
Copy file name to clipboardExpand all lines: ATPDocs/limit-number-okta-super-admin-accounts.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,12 @@ ms.reviewer: Himanch
11
11
12
12
This report lists Okta accounts with Super Administrator role, where the number of users assigned to this role is greater than 5.
13
13
14
+
## Prerequisites
15
+
16
+
To use this security assessment, you must first connect your Okta instance in the Microsoft Defender portal.
17
+
For setup instructions, see [Connect your Okta instance](/defender-for-identity/okta-integration#connect-okta-to-defender-for-identity).
18
+
19
+
14
20
## Why is having too many Super Admin accounts a security risk?
15
21
16
22
A high number of users with privileged roles increases the risk of misuse or unauthorized access to critical systems. By reducing the number of users assigned to roles such as Super Admin or Org Admin, organizations can better limit access to sensitive resources and reduce the attack surface. Maintaining a smaller, set of privileged accounts ensures more effective governance and minimizes potential security vulnerabilities.
Copy file name to clipboardExpand all lines: ATPDocs/remove-dormant-okta-privileged-accounts.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,12 @@ ms.reviewer: Himanch
11
11
12
12
This article describes the security risks associated with dormant Okta privileged accounts and provides recommendations for mitigating these risks.
13
13
14
+
## Prerequisites
15
+
16
+
To use this security assessment, you must first connect your Okta instance in the Microsoft Defender portal.
17
+
For setup instructions, see [Connect your Okta instance](/defender-for-identity/okta-integration#connect-okta-to-defender-for-identity).
18
+
19
+
14
20
## Why is a dormant privileged account a security risk?
15
21
16
22
Dormant privileged accounts represent a significant security risk, as they can become targets for unauthorized access or misuse without detection. Deactivating or removing unused privileged accounts ensures that only active, monitored users have access to critical administrative capabilities.
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+14-7Lines changed: 14 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,14 @@ For updates about versions and features released six months ago or earlier, see
25
25
26
26
## August 2025
27
27
28
-
**Suspected Brute Force attack (Kerberos, NTLM):** Improved detection logic now includes scenarios where accounts were locked during the attacks - note that the number of triggered alerts may increase.
28
+
### Sensor version 2.246
29
+
30
+
This version includes bug fixes and stability improvements for the Microsoft Defender for Identity sensor.
31
+
32
+
### Detection update: Suspected Brute Force attack (Kerberos, NTLM)
33
+
34
+
Improved detection logic to include scenarios where accounts were locked during attacks. As a result, the number of triggered alerts might increase.
35
+
29
36
30
37
## July 2025
31
38
@@ -37,17 +44,17 @@ For more information, see [Configure scoped access for Microsoft Defender for Id
37
44
38
45
### New security posture assessments for unmonitored identity servers
39
46
40
-
Microsoft Defender for Identity now includes three security posture assessments that detect when Microsoft Entra Connect, Active Directory Federation Services (ADFS), or Active Directory Certificate Services (ADCS) servers are present in your environment but aren't monitored.
47
+
Microsoft Defender for Identity three new security posture assessments detect when Microsoft Entra Connect, Active Directory Federation Services (ADFS), or Active Directory Certificate Services (ADCS) servers are present in your environment but aren't monitored.
41
48
42
49
Use these assessments to improve monitoring coverage and strengthen your hybrid identity security posture.
[Security Assessment: Unmonitored Microsoft Entra Connect servers](unmonitored-entra-connect-servers.md)
51
58
52
59
53
60
@@ -65,7 +72,7 @@ Scoping by Active Directory domains helps:
65
72
66
73
- Support operational boundaries: Align access for SOC analysts, identity administrators, and regional teams.
67
74
68
-
For more information see: [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
75
+
For more information, see: [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
69
76
70
77
71
78
### Okta integration is now available in Microsoft Defender for Identity
@@ -106,7 +113,7 @@ Defender for Identity now supports deploying its new sensor on Domain Controller
106
113
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify noneligible servers and take action to update and onboard them for enhanced identity protection.
107
114
108
115
109
-
### Local administrators collection (using SAM-R queries) feature will be disabled
116
+
### Local administrators collection (using SAM-R queries) feature is disabled
110
117
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change occurs automatically by the specified date, and no administrative action is required.
111
118
112
119
### New Health Issue
@@ -152,7 +159,7 @@ For more information, see: [Investigate and protect Service Accounts | Microsoft
152
159
153
160
### Enhanced Identity Inventory
154
161
155
-
The Identities page under *Assets*has been updated to provide better visibility and management of identities across your environment.
162
+
The Identities page under *Assets*was updated to provide better visibility and management of identities across your environment.
156
163
The updated Identities Inventory page now includes the following tabs:
157
164
158
165
- Identities: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/discovered-apps.md
+21-12Lines changed: 21 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ This procedure describes how to get an initial, general picture of your cloud di
23
23
24
24
For example:
25
25
26
-
:::image type="content" source="media/cloud-discovery-dashboard.png" alt-text="Screenshot of the Cloud discovery dashboard":::
26
+
:::image type="content" source="media/cloud-discovery-dashboard.png" alt-text="Screenshot of the Cloud discovery dashboard" lightbox="media/cloud-discovery-dashboard.png":::
27
27
28
28
Supported apps include Windows and macOS apps, which are both listed under the **Defender - managed endpoints** stream.
29
29
@@ -57,7 +57,8 @@ For example, if you want to identify commonly used, risky cloud storage and coll
57
57
58
58
1. Set the **Security risk factor** for **Data at rest encryption** equals **Not supported**. Then set **Risk score** equals 6 or lower.
59
59
60
-

60
+
61
+
:::image type="content" source="media/discovered-app-filters.png" alt-text="Screenshot of discovered app filters." lightbox="media/discovered-app-filters.png":::
61
62
62
63
After the results are filtered, [unsanction and block](governance-discovery.md) them by using the bulk action checkbox to unsanction them all in one action. Once they're unsanctioned, use a blocking script to block them from being used in your environment.
63
64
@@ -66,10 +67,13 @@ You also might want to identify specific app instances that are in use by invest
> Deep dives into discovered apps are supported only in firewalls and proxies that contain target URL data. For more information, see [Supported firewalls and proxies](set-up-cloud-discovery.md#supported-firewalls-and-proxies).
70
+
> The feature of discovered subdomains will be deprecated by Sep 31st, 2025. Post this, no support for discovery subdomains will be provided.
71
+
>
72
+
> Deep dives into discovered apps are supported only in firewalls and proxies that contain target URL data. For more information, see [Supported firewalls and proxies](set-up-cloud-discovery.md#supported-firewalls-and-proxies).
70
73
>
71
74
> If Defender for Cloud Apps can't match the subdomain detected in the traffic logs with the data stored in the app catalog, the subdomain is tagged as **Other**.
72
75
76
+
73
77
## Discover resources and custom apps
74
78
75
79
Cloud discovery also enables you to dive into your IaaS and PaaS resources. Discover activity across your resource-hosting platforms, viewing access to data across your self-hosted apps and resources including storage accounts, infrastructure and custom apps hosted on Azure, Google Cloud Platform, and AWS. Not only can you see overall usage in your IaaS solutions, but you can get visibility into the specific resources that are hosted on each, and the overall usage of the resources, to help mitigate risk per resource.
@@ -83,11 +87,13 @@ For example, if a large amount of data is uploaded, discover what resource it's
83
87
84
88
1. In the Microsoft Defender portal, under **Cloud Apps**, select **Cloud discovery**. Then choose the **Discovered resources** tab.
85
89
86
-

90
+
:::image type="content" source="media/discovered-resources-menu.png" alt-text="Screenshot that shows the discovered resources menu." lightbox="media/discovered-resources-menu.png":::
87
91
88
92
1. In the **Discovered resources** page, drill down into each resource to see what kinds of transactions occurred, who accessed it, and then drill down to investigate the users even further.
89
93
90
-

94
+
95
+
:::image type="content" source="media/discovery-resources.png" alt-text="Screenshot that shows a list of discovered resources.":::
96
+
91
97
92
98
1. For custom apps, select the options menu at the end of the row and then select **Add new custom app**. This opens the **Add this app** dialog, where you can name and identify the app so it can be included in the cloud discovery dashboard.
93
99
@@ -104,7 +110,7 @@ The best way to get an overview of Shadow IT use across your organization is by
104
110
1. Optionally, change the report name, and then select **Generate**.
105
111
106
112
> [!NOTE]
107
-
> The executive summary report is revamped to a 6-pager report with a goal to provide a clear, concise & actionable overview while preserving the depth and integrity of the original analysis.
113
+
> The executive summary report is revamped to a six-pager report with a goal to provide a clear, concise & actionable overview while preserving the depth and integrity of the original analysis.
108
114
109
115
## Exclude entities
110
116
@@ -118,10 +124,12 @@ If you have system users, IP addresses, or devices that are noisy but uninterest
118
124
119
125
1. Add a user alias, IP address, or device name. We recommend adding information about why the exclusion was made.
120
126
121
-

127
+
:::image type="content" source="media/exclude-user.png" alt-text="Screenshot that shows the option to exclude users from the Cloud Discovery report." lightbox="media/exclude-user.png":::
128
+
122
129
123
130
>[!NOTE]
124
-
>All entity exclusions apply to newly received data only. Historical data of the excluded entities remains through the retention period (90 days).
131
+
> - All entity exclusions apply to newly received data only. Historical data of the excluded entities remains through the retention period (90 days).
132
+
> - Entity exclusion is only supported for the Global report stream. Entities from Microsoft Defender for Endpoint and the Cloud App Security proxy stream aren't supported for exclusion.
125
133
126
134
## Manage continuous reports
127
135
@@ -141,10 +149,11 @@ Custom continuous reports provide you with more granularity when monitoring your
141
149
142
150
1. Set the filters you want on the data. These filters can be **User groups**, **IP address tags**, or **IP address ranges**. For more information on working with IP address tags and IP address ranges, see [Organize the data according to your needs](ip-tags.md).
143
151
144
-

152
+
153
+
:::image type="content" source="media/create-custom-continuous-report.png" alt-text="Screenshot that shows how to create a continuous report.":::
145
154
146
155
> [!NOTE]
147
-
> All custom reports are limited to a maximum of 1 GB of uncompressed data. If there is more than 1 GB of data, the first 1 GB of data will be exported into the report.
156
+
> All custom reports are limited to a maximum of 1 GB of uncompressed data. If there's more than 1 GB of data, the first 1 GB of data will be exported into the report.
148
157
149
158
## Deleting cloud discovery data
150
159
@@ -166,10 +175,10 @@ We recommend deleting cloud discovery data in the following cases:
166
175
167
176
1. Select the **Delete** button.
168
177
169
-

178
+
:::image type="content" source="media/delete-data.png" alt-text="Screenshot of deleting cloud discovery data." lightbox="media/delete-data.png":::
170
179
171
180
> [!NOTE]
172
-
> The deletion process takes a few minutes and is not immediate.
181
+
> The deletion process takes a few minutes and isn't immediate.
0 commit comments