Skip to content

Commit 78d9b87

Browse files
authored
Merge branch 'main' into WI397895-edit-app-governence-get-started
2 parents 3ad2f69 + 56acb1d commit 78d9b87

File tree

923 files changed

+10828
-10290
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

923 files changed

+10828
-10290
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ For more information about the exception criteria and exception process, see [Mi
3939
4040
Select the total score link to review all feedback on clarity, consistency, tone, brand, terms, spelling, grammar, readability, and inclusive language. _You should fix all spelling errors regardless of your total score_. Fixing spelling errors helps maintain customer trust in overall content quality.
4141
42-
| Article | Total score<br>(Required: 80) | Words + phrases<br>(Brand, terms) | Correctness<br>(Spelling, grammar) | Clarity<br>(Readability) |
42+
| Article | Total score<br>(Required: 80) | Terminology | Spelling and Grammar| Clarity<br>(Readability) |
4343
|---------|:--------------:|:--------------------:|:------:|:---------:|
4444
"
4545

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
name: PR has no warnings or errors
2+
3+
permissions:
4+
pull-requests: write
5+
statuses: write
6+
7+
on:
8+
issue_comment:
9+
types: [created]
10+
11+
jobs:
12+
13+
build-status:
14+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-BuildValidation.yml@workflows-prod
15+
with:
16+
PayloadJson: ${{ toJSON(github) }}
17+
secrets:
18+
AccessToken: ${{ secrets.GITHUB_TOKEN }}
19+
20+
21+

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -994,6 +994,16 @@
994994
"source_path": "CloudAppSecurityDocs/what-is-cloud-app-security.md",
995995
"redirect_url": "/defender-cloud-apps/what-is-defender-for-cloud-apps",
996996
"redirect_document_id": true
997+
},
998+
{
999+
"source_path": "CloudAppSecurityDocs/tutorial-ueba.md",
1000+
"redirect_url": "/defender-cloud-apps/",
1001+
"redirect_document_id": true
1002+
},
1003+
{
1004+
"source_path": "CloudAppSecurityDocs/file-filters.md",
1005+
"redirect_url": "/defender-cloud-apps/data-protection-policies",
1006+
"redirect_document_id": false
9971007
}
9981008
]
9991009
}

.openpublishing.redirection.defender-endpoint.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,11 @@
7979
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
8080
"redirect_url": "/defender-xdr/pilot-deploy-defender-endpoint",
8181
"redirect_document_id": false
82-
}
82+
},
83+
{
84+
"source_path": "defender-endpoint/monthly-security-summary-report.md",
85+
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
86+
"redirect_document_id": true
87+
}
8388
]
8489
}

.openpublishing.redirection.defender-xdr.json

Lines changed: 86 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@
1010
"redirect_url": "/defender-for-identity/microsoft-365-security-center-mdi",
1111
"redirect_document_id": false
1212
},
13-
1413
{
1514
"source_path": "defender-xdr/eval-create-eval-environment.md",
1615
"redirect_url": "/defender-xdr/pilot-deploy-overview",
@@ -131,6 +130,11 @@
131130
"redirect_url": "/defender-xdr/entity-page-device",
132131
"redirect_document_id": true
133132
},
133+
{
134+
"source_path": "defender-xdr/unlink-alert-from-incident.md",
135+
"redirect_url": "/defender-xdr/move-alert-to-another-incident",
136+
"redirect_document_id": true
137+
},
134138
{
135139
"source_path": "defender-xdr/unified-secops-platform/defender-xdr-portal.md",
136140
"redirect_url": "/defender-xdr/",
@@ -166,6 +170,31 @@
166170
"redirect_url": "/defender-xdr/",
167171
"redirect_document_id": false
168172
},
173+
{
174+
"source_path": "defender-xdr/microsoft-threat-actor-naming.md",
175+
"redirect_url": "/unified-secops-platform/microsoft-threat-actor-naming",
176+
"redirect_document_id": false
177+
},
178+
{
179+
"source_path": "defender-xdr/malware-naming.md",
180+
"redirect_url": "/unified-secops-platform/malware-naming",
181+
"redirect_document_id": false
182+
},
183+
{
184+
"source_path": "defender-xdr/criteria.md",
185+
"redirect_url": "/unified-secops-platform/criteria",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path": "defender-xdr/submission-guide.md",
190+
"redirect_url": "/unified-secops-platform/submission-guide",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path": "defender-xdr/virus-initiative-criteria.md",
195+
"redirect_url": "/unified-secops-platform/virus-initiative-criteria",
196+
"redirect_document_id": false
197+
},
169198
{
170199
"source_path": "defender-xdr/tickets.md",
171200
"redirect_url": "/defender-xdr/troubleshoot",
@@ -175,6 +204,61 @@
175204
"source_path": "defender-xdr/portal-submission-troubleshooting.md",
176205
"redirect_url": "/defender-xdr/troubleshoot",
177206
"redirect_document_id": false
207+
},
208+
{
209+
"source_path": "defender-xdr/mto-advanced-hunting.md",
210+
"redirect_url": "/unified-secops-platform/mto-advanced-hunting",
211+
"redirect_document_id": false
212+
},
213+
{
214+
"source_path": "defender-xdr/mto-dashboard.md",
215+
"redirect_url": "/unified-secops-platform/mto-dashboard",
216+
"redirect_document_id": false
217+
},
218+
{
219+
"source_path": "defender-xdr/mto-endpoint-security-policy.md",
220+
"redirect_url": "/unified-secops-platform/mto-endpoint-security-policy",
221+
"redirect_document_id": false
222+
},
223+
{
224+
"source_path": "defender-xdr/mto-incidents-alerts.md",
225+
"redirect_url": "/unified-secops-platform/mto-incidents-alerts",
226+
"redirect_document_id": false
227+
},
228+
{
229+
"source_path": "defender-xdr/mto-overview.md",
230+
"redirect_url": "/unified-secops-platform/mto-overview",
231+
"redirect_document_id": false
232+
},
233+
{
234+
"source_path": "defender-xdr/mto-requirements.md",
235+
"redirect_url": "/unified-secops-platform/mto-requirements",
236+
"redirect_document_id": false
237+
},
238+
{
239+
"source_path": "defender-xdr/mto-tenant-devices.md",
240+
"redirect_url": "/unified-secops-platform/mto-tenant-devices",
241+
"redirect_document_id": false
242+
},
243+
{
244+
"source_path": "defender-xdr/mto-tenantgroups.md",
245+
"redirect_url": "/unified-secops-platform/mto-tenantgroups",
246+
"redirect_document_id": false
247+
},
248+
{
249+
"source_path": "defender-xdr/mto-tenants.md",
250+
"redirect_url": "/unified-secops-platform/mto-tenants",
251+
"redirect_document_id": false
252+
},
253+
{
254+
"source_path": "defender-xdr/portals.md",
255+
"redirect_url": "/unified-secops-platform/overview-plan#understand-microsoft-security-portals-and-admin-centers",
256+
"redirect_document_id": false
257+
},
258+
{
259+
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
260+
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
261+
"redirect_document_id": false
178262
}
179263
]
180-
}
264+
}

ATADocs/docfx.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,13 @@
4848
"uhfHeaderId": "MSDocsHeader-M365-IT",
4949
"searchScope": ["ATA"],
5050
"contributors_to_exclude": [
51-
"beccarobins"
51+
"beccarobins",
52+
"rjagiewich",
53+
"claydetels19",
54+
"garycentric",
55+
"padmagit77",
56+
"aditisrivastava07",
57+
"Ruchika-mittal01"
5258
]
5359
},
5460
"markdownEngineName": "markdig"

ATADocs/index.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ metadata:
88
description: Protect your enterprise using information from multiple network data-sources to learn the behavior of users and entities in your organization.
99
services: service
1010
ms.service: advanced-threat-analytics
11-
ms.subservice: ms.subservice
1211
ms.topic: landing-page
1312
ms.collection: M365-security-compliance
1413
author: batamig
-43.2 KB
Binary file not shown.

ATPDocs/deploy/activate-capabilities.md

Lines changed: 8 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,12 @@ ms.topic: how-to
77

88
# Activate Microsoft Defender for Identity capabilities directly on a domain controller
99

10-
Microsoft Defender for Endpoint customers, who've already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
10+
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
1111

1212
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
1313

1414
> [!IMPORTANT]
15-
> Information in this article relates to a feature that is currently in limited availablility for a select set of use cases. If you weren't directed to use the Defender for Identity **Activation** page, use our [main deployment guide](deploy-defender-identity.md) instead.
16-
>
15+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor.
1716
1817
## Prerequisites
1918

@@ -30,10 +29,8 @@ Make sure that the domain controller where you're planning to activate Defender
3029

3130
Direct Defender for Identity capabilities are supported on domain controllers only, using the one of the following operating systems:
3231

33-
- Windows Server 2019
34-
- Windows Server 2022
35-
36-
You must also have the [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) installed.
32+
- Windows Server 2019 or above
33+
- [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) or later
3734

3835
> [!IMPORTANT]
3936
>After installing the March 2024 Cumulative Update, LSASS might experience a memory leak on domain controllers when on-premises and cloud-based Active Directory Domain Controllers service Kerberos authentication requests.
@@ -122,7 +119,7 @@ In the Defender portal, check for the following details:
122119

123120
- **Device entities**: Select **Assets > Devices**, and select the machine for your new sensor. Defender for Identity events are shown on the device timeline.
124121

125-
- **User entities**. Select **Assets > Users** and check for users from a newly onboarded domain. Alternately, use the global search option to search for specific users. User details pages should include **Overview**, **Observed in organization**, and **Timeline** data.
122+
- **User entities**: Select **Assets > Users** and check for users from a newly onboarded domain. Alternately, use the global search option to search for specific users. User details pages should include **Overview**, **Observed in organization**, and **Timeline** data.
126123

127124
- **Group entities**: Use the global search to find a user group, or pivot from a user or device details page where group details are shown. Check for details of group membership, view group users, and group timeline data.
128125

@@ -148,16 +145,7 @@ IdentityQueryEvents
148145
For more information, see [Advanced hunting in the Microsoft Defender portal](/microsoft-365/security/defender/advanced-hunting-microsoft-defender).
149146

150147

151-
### Test Identity Security Posture Management (ISPM) recommendations
152-
153-
Defender for Identity capabilities on domain controllers support the following ISPM assessments:
154-
155-
- [**Install Defender for Identity Sensor on all Domain Controllers**](../security-assessment-unmonitored-domain-controller.md)
156-
- [**Microsoft LAPS usage**](../security-assessment-laps.md)
157-
- [**Resolve unsecure domain configurations**](../security-assessment-unsecure-domain-configurations.md)
158-
- **Set a honeytoken account**
159-
- [**Unsecure account attributes**](../security-assessment-unsecure-account-attributes.md)
160-
- [**Unsecure SID History attributes**](../security-assessment-unsecure-sid-history-attribute.md)
148+
## Test Identity Security Posture Management (ISPM) recommendations
161149

162150
We recommend simulating risky behavior in a test environment to trigger supported assessments and verify that they appear as expected. For example:
163151

@@ -187,37 +175,6 @@ For more information, see [Microsoft Defender for Identity's security posture as
187175
188176
### Test alert functionality
189177
190-
The following alerts are supported by Defender for Identity capabilities on domain controllers:
191-
192-
:::row:::
193-
:::column span="":::
194-
- [Account enumeration reconnaissance](../reconnaissance-discovery-alerts.md#account-enumeration-reconnaissance-external-id-2003)
195-
- [Active Directory attributes Reconnaissance using LDAP](../reconnaissance-discovery-alerts.md#active-directory-attributes-reconnaissance-ldap-external-id-2210)
196-
- [Exchange Server Remote Code Execution (CVE-2021-26855)](../lateral-movement-alerts.md#exchange-server-remote-code-execution-cve-2021-26855-external-id-2414)
197-
- [Honeytoken user attributes modified](../persistence-privilege-escalation-alerts.md#honeytoken-user-attributes-modified-external-id-2427)
198-
- [Honeytoken was queried via LDAP](../reconnaissance-discovery-alerts.md#honeytoken-was-queried-via-ldap-external-id-2429)
199-
- [Honeytoken authentication activity](../credential-access-alerts.md#honeytoken-authentication-activity-external-id-2014)
200-
- [Honeytoken group membership changed](../persistence-privilege-escalation-alerts.md#honeytoken-group-membership-changed-external-id-2428)
201-
- [Remote code execution attempt](../other-alerts.md#remote-code-execution-attempt-external-id-2019)
202-
- [Security principal reconnaissance (LDAP)](../credential-access-alerts.md#security-principal-reconnaissance-ldap-external-id-2038)
203-
- [Suspicious service creation](../other-alerts.md#suspicious-service-creation-external-id-2026)
204-
- [Suspected NTLM relay attack (Exchange account)](../lateral-movement-alerts.md#suspected-ntlm-relay-attack-exchange-account-external-id-2037)
205-
:::column-end:::
206-
:::column span="":::
207-
- [Suspicious modification of the Resource Based Constrained Delegation attribute by a machine account](../persistence-privilege-escalation-alerts.md#suspicious-modification-of-the-resource-based-constrained-delegation-attribute-by-a-machine-account--external-id-2423)
208-
- [Suspicious additions to sensitive groups](../persistence-privilege-escalation-alerts.md#suspicious-additions-to-sensitive-groups-external-id-2024)
209-
- [Suspicious modification of a dNSHostName attribute (CVE-2022-26923)](../persistence-privilege-escalation-alerts.md#suspicious-modification-of-a-dnshostname-attribute-cve-2022-26923--external-id-2421)
210-
- [Suspicious modification of a sAMNameAccount attribute (CVE-2021-42278 and CVE-2021-42287)](../credential-access-alerts.md#suspicious-modification-of-a-samnameaccount-attribute-cve-2021-42278-and-cve-2021-42287-exploitation-external-id-2419)
211-
- [Suspected DCShadow attack (domain controller promotion)](../other-alerts.md#suspected-dcshadow-attack-domain-controller-promotion-external-id-2028)
212-
- [Suspected DFSCoerce attack using Distributed File System Protocol](../credential-access-alerts.md#suspected-dfscoerce-attack-using-distributed-file-system-protocol-external-id-2426) 
213-
- [Suspected DCShadow attack (domain controller replication request)](../other-alerts.md#suspected-dcshadow-attack-domain-controller-replication-request-external-id-2029)
214-
- [Suspected account takeover using shadow credentials](../credential-access-alerts.md#suspected-account-takeover-using-shadow-credentials-external-id-2431)
215-
- [Suspected SID-History injection](../persistence-privilege-escalation-alerts.md#suspected-sid-history-injection-external-id-1106)
216-
- [Suspected AD FS DKM key read](../credential-access-alerts.md#suspected-ad-fs-dkm-key-read-external-id-2413)
217-
:::column-end:::
218-
:::row-end:::
219-
220-
221178
Test alert functionality by simulating risky activity in a test environment. For example:
222179
223180
- Tag an account as a honeytoken account, and then try signing in to the honeytoken account against the activated domain controller.
@@ -232,16 +189,12 @@ Test remediation actions on a test user. For example:
232189
233190
1. In the Defender portal, go to the user details page for a test user.
234191
235-
1. From the options menu, select any or all of the following, one at a time:
236-
237-
- **Disable user in AD**
238-
- **Enable user in AD**
239-
- **Force password reset**
192+
1. From the **Options** menu, select any of the available remediation actions.
240193
241194
1. Check Active Directory for the expected activity.
242195
243196
> [!NOTE]
244-
> The current version does not collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
197+
> The current version doesn't collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
245198
246199
247200
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).

ATPDocs/deploy/active-directory-federation-services.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,9 +55,6 @@ Configure the SQL server to allow the Directory Service Account with the followi
5555
- *read*
5656
- *select*
5757

58-
> [!NOTE]
59-
> If the AD FS database runs on a dedicated SQL server instead of the local AD FS server, and you're using a group Managed Service Account (gMSA) as the Directory Service Account, make sure that you grant the SQL server the [required permissions](create-directory-service-account-gmsa.md#prerequisites-grant-permissions-to-retrieve-the-gmsa-accounts-password) to retrieve the gMSA's password.
60-
6158
### Grant access to the AD FS database
6259

6360
Grant access to the AD FS database by using SQL Server Management Studio, Transact-SQL (T-SQL), or PowerShell.

0 commit comments

Comments
 (0)