You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/app-governance-get-started.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,6 +64,8 @@ You must have at least one of these roles to turn on app governance:
64
64
- Compliance Admin
65
65
- Compliance Data Admin
66
66
- Cloud App Security Admin
67
+
> [!NOTE]
68
+
> The Cloud App Security Admin role grants permissions turn on app governance for Microsoft Defender for Cloud Apps. However, this role doesn't grant access to view or manage app governance capabilities. To view or manage app governance capabilities, you must also have one of the other roles listed in the table below.
67
69
68
70
The following table lists the app governance capabilities for each role.
Copy file name to clipboardExpand all lines: defender-for-identity/whats-new.md
+16-10Lines changed: 16 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: What's new | Microsoft Defender for Identity
3
3
description: This article is updated frequently to let you know what's new in the latest release of Microsoft Defender for Identity.
4
-
ms.date: 10/23/2025
4
+
ms.date: 11/12/2025
5
5
ms.topic: overview
6
6
#CustomerIntent: As a Defender for Identity customer, I want to know what's new in the latest release of Defender for Identity, so that I can take advantage of new features and functionality.
7
7
ms.reviewer: AbbyMSFT
@@ -27,9 +27,15 @@ For updates about versions and features released six months ago or earlier, see
27
27
28
28
### New security posture assessment: Change password for on-prem account with potentially leaked credentials (Preview)
29
29
30
-
The new security posture assessment lists users whose valid credentials have been leaked. For more information, see: [Change password for on-prem account with potentially leaked credentials(Preview)](/defender-for-identity/security-posture-assessments/accounts#change-password-for-on-prem-account-with-potentially-leaked-credentials-preview)
30
+
The new security posture assessment lists users whose valid credentials have been leaked. For more information, see: [Change password for on-prem account with potentially leaked credentials(Preview)](/defender-for-identity/security-posture-assessments/accounts#change-password-for-on-prem-account-with-potentially-leaked-credentials-preview)
31
31
32
-
### Expansion of identity scoping - support for Organizational units (Preview)
32
+
### Microsoft Defender for Identity sensor version updates
33
+
34
+
|Version number |Updates |
35
+
|---------|---------|
36
+
|2.250|The improved event log query method captures a broader range of unique events at scale. As a result, you might notice an increase in captured activities. This update also includes security and performance improvements.|
37
+
38
+
### Expansion of identity scoping: upport for Organizational units (Preview)
33
39
34
40
In addition to the GA release of scoping by Active Directory domains a few months ago, you can now scope by **Organizational Units (OUs)** as part of XDR User Role-Based Access Control (URBAC). This enhancement provides even more granular control over which entities and resources are included in security analysis.
35
41
For more information, see [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
@@ -595,13 +601,13 @@ Changes include:
595
601
596
602
- The previous **Sensitivity level** column is now renamed as **Threshold level**, with newly defined values. By default, all alerts are set to a **High** threshold, which represents the default behavior and a standard alert configuration.
597
603
598
-
The following table lists the mapping between the previous **Sensitivity level** values and the new **Threshold level** values:
599
-
600
-
|Sensitivity level (previous name) |Threshold level (new name) |
601
-
|---------|---------|
602
-
|**Normal**|**High**|
603
-
|**Medium**|**Medium**|
604
-
|**High**|**Low**|
604
+
The following table lists the mapping between the previous **Sensitivity level** values and the new **Threshold level** values:
605
+
606
+
|Sensitivity level (previous name) |Threshold level (new name) |
607
+
|---------|---------|
608
+
|**Normal**|**High**|
609
+
|**Medium**|**Medium**|
610
+
|**High**|**Low**|
605
611
606
612
If you had specific values defined on the **Advanced Settings** page, we transferred them to the new **Adjust alert thresholds** page as follows:
Copy file name to clipboardExpand all lines: defender-xdr/configure-asset-rules.md
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,9 +38,6 @@ You can create dynamic rules in the **Asset rule management** in the Microsoft D
38
38
39
39
A rule can be based on device name, domain, OS platform, internet facing status, onboarding status and manual device tags. You can select or create a tag that will be applied based on the conditions you've set.
40
40
41
-
> [!IMPORTANT]
42
-
> Use of [dynamic device tagging](/defender-xdr/configure-asset-rules) capabilities in Defender for Endpoint to tag devices with `MDE-Management` isn't currently supported with security settings management. Devices tagged through this capability don't successfully enroll. This is currently under investigation.
43
-
44
41
The following steps guide you on how to create a new dynamic rule in Microsoft Defender XDR:
45
42
46
43
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) as a user who can view and perform actions on all devices.
0 commit comments