Skip to content

Commit 79abf34

Browse files
Merge pull request #5580 from MicrosoftDocs/main
[AutoPublish] main to live - 11/12 07:34 PST | 11/12 21:04 IST
2 parents e8996a5 + c082704 commit 79abf34

File tree

3 files changed

+18
-13
lines changed

3 files changed

+18
-13
lines changed

defender-for-cloud-apps/app-governance-get-started.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,8 @@ You must have at least one of these roles to turn on app governance:
6464
- Compliance Admin  
6565
- Compliance Data Admin
6666
- Cloud App Security Admin
67+
> [!NOTE]
68+
> The Cloud App Security Admin role grants permissions turn on app governance for Microsoft Defender for Cloud Apps. However, this role doesn't grant access to view or manage app governance capabilities. To view or manage app governance capabilities, you must also have one of the other roles listed in the table below.
6769
6870
The following table lists the app governance capabilities for each role.
6971

defender-for-identity/whats-new.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: What's new | Microsoft Defender for Identity
33
description: This article is updated frequently to let you know what's new in the latest release of Microsoft Defender for Identity.
4-
ms.date: 10/23/2025
4+
ms.date: 11/12/2025
55
ms.topic: overview
66
#CustomerIntent: As a Defender for Identity customer, I want to know what's new in the latest release of Defender for Identity, so that I can take advantage of new features and functionality.
77
ms.reviewer: AbbyMSFT
@@ -27,9 +27,15 @@ For updates about versions and features released six months ago or earlier, see
2727

2828
### New security posture assessment: Change password for on-prem account with potentially leaked credentials (Preview)
2929

30-
The new security posture assessment lists users whose valid credentials have been leaked. For more information, see: [Change password for on-prem account with potentially leaked credentials(Preview)](/defender-for-identity/security-posture-assessments/accounts#change-password-for-on-prem-account-with-potentially-leaked-credentials-preview)
30+
The new security posture assessment lists users whose valid credentials have been leaked. For more information, see: [Change password for on-prem account with potentially leaked credentials (Preview)](/defender-for-identity/security-posture-assessments/accounts#change-password-for-on-prem-account-with-potentially-leaked-credentials-preview)
3131

32-
### Expansion of identity scoping - support for Organizational units (Preview)
32+
### Microsoft Defender for Identity sensor version updates
33+
34+
|Version number |Updates |
35+
|---------|---------|
36+
|2.250|The improved event log query method captures a broader range of unique events at scale. As a result, you might notice an increase in captured activities. This update also includes security and performance improvements.|
37+
38+
### Expansion of identity scoping: upport for Organizational units (Preview)
3339

3440
In addition to the GA release of scoping by Active Directory domains a few months ago, you can now scope by **Organizational Units (OUs)** as part of XDR User Role-Based Access Control (URBAC). This enhancement provides even more granular control over which entities and resources are included in security analysis.
3541
For more information, see [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
@@ -595,13 +601,13 @@ Changes include:
595601

596602
- The previous **Sensitivity level** column is now renamed as **Threshold level**, with newly defined values. By default, all alerts are set to a **High** threshold, which represents the default behavior and a standard alert configuration.
597603

598-
The following table lists the mapping between the previous **Sensitivity level** values and the new **Threshold level** values:
599-
600-
|Sensitivity level (previous name) |Threshold level (new name) |
601-
|---------|---------|
602-
|**Normal** | **High** |
603-
|**Medium** | **Medium** |
604-
|**High** | **Low** |
604+
The following table lists the mapping between the previous **Sensitivity level** values and the new **Threshold level** values:
605+
606+
|Sensitivity level (previous name) |Threshold level (new name) |
607+
|---------|---------|
608+
|**Normal** | **High** |
609+
|**Medium** | **Medium** |
610+
|**High** | **Low** |
605611

606612
If you had specific values defined on the **Advanced Settings** page, we transferred them to the new **Adjust alert thresholds** page as follows:
607613

defender-xdr/configure-asset-rules.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,6 @@ You can create dynamic rules in the **Asset rule management** in the Microsoft D
3838

3939
A rule can be based on device name, domain, OS platform, internet facing status, onboarding status and manual device tags. You can select or create a tag that will be applied based on the conditions you've set.
4040

41-
> [!IMPORTANT]
42-
> Use of [dynamic device tagging](/defender-xdr/configure-asset-rules) capabilities in Defender for Endpoint to tag devices with `MDE-Management` isn't currently supported with security settings management. Devices tagged through this capability don't successfully enroll. This is currently under investigation.
43-
4441
The following steps guide you on how to create a new dynamic rule in Microsoft Defender XDR:
4542

4643
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) as a user who can view and perform actions on all devices.

0 commit comments

Comments
 (0)