Skip to content

Commit 7afc467

Browse files
authored
Merge branch 'public' into public
2 parents 1466841 + e435db4 commit 7afc467

File tree

280 files changed

+1791
-951
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

280 files changed

+1791
-951
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,8 @@
8282
},
8383
{
8484
"source_path": "defender-endpoint/linux-support-rhel.md",
85-
"redirect_url": "/defender-endpoint/comprehensive-guidance-on-linux-deployment",
86-
"redirect_document_id": true
85+
"redirect_url": "/defender-endpoint/linux-installer-script",
86+
"redirect_document_id": false
8787
},
8888
{
8989
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
@@ -105,10 +105,20 @@
105105
"redirect_url": "/defender-endpoint/overview-client-analyzer",
106106
"redirect_document_id": false
107107
},
108+
{
109+
"source_path": "defender-endpoint/schedule-antivirus-scan-in-mde.md",
110+
"redirect_url": "/defender-endpoint/schedule-antivirus-scan-anacron",
111+
"redirect_document_id": true
112+
},
108113
{
109114
"source_path": "defender-endpoint/comprehensive-guidance-on-linux-deployment.md",
110115
"redirect_url": "/defender-endpoint/linux-installer-script",
111116
"redirect_document_id": true
112-
}
117+
},
118+
{
119+
"source_path": "defender-endpoint/linux-schedule-scan-mde.md",
120+
"redirect_url": "/defender-endpoint/schedule-antivirus-scan-crontab",
121+
"redirect_document_id": true
122+
}
113123
]
114124
}

ATPDocs/architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Microsoft Defender for Identity monitors your domain controllers by capturing an
1212

1313
The following image shows how Defender for Identity is layered over Microsoft Defender XDR, and works together with other Microsoft services and third-party identity providers to monitor traffic coming in from domain controllers and Active Directory servers.
1414

15-
:::image type="content" source="media/architecture/architecture.png" alt-text="Diagram of the Defender for Identity architecture." border="false":::
15+
:::image type="content" source="media\diagram-of-the-defender-for-identity-architecture.png" alt-text="Diagram of the Defender for Identity architecture." border="false":::
1616

1717
Installed directly on your domain controller, Active Directory Federation Services (AD FS), or Active Directory Certificate Services (AD CS) servers, the Defender for Identity sensor accesses the event logs it requires directly from the servers. After the logs and network traffic are parsed by the sensor, Defender for Identity sends only the parsed information to the Defender for Identity cloud service.
1818

ATPDocs/investigate-assets.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,9 +63,10 @@ When you investigate a specific identity, you'll see the following details on an
6363
|[Remediation actions](/microsoft-365/security/defender/investigate-users#remediation-actions) | Respond to compromised users by disabling their accounts or resetting their password. After taking action on users, you can check on the activity details in the Microsoft Defender XDR **Action center.|
6464

6565
> [!NOTE]
66-
> **Investigation Priority Score** has been deprecated on December 3, 2025. As a result, both the Investigation Priority Score breakdown and the scored activity timeline cards have been removed from the UI.
66+
> **Investigation Priority Score** has been deprecated on December 3, 2024. As a result, both the Investigation Priority Score breakdown and the scored activity timeline cards have been removed from the UI.
67+
68+
6769

68-
6970
For more information, see [Investigate users](/microsoft-365/security/defender/investigate-users) in the Microsoft Defender XDR documentation.
7071

7172
## Investigation steps for suspicious groups
305 KB
Loading
70 KB
Loading
76.2 KB
Loading

ATPDocs/remove-rbcd-microsoft-entra-seamless-single-sign-on-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: 'Security assessment: Remove Resource Based Constrained Delegation for Microsoft Entra seamless SSO account'
33
description: This article describes Microsoft Defender for Identity's Microsoft Entra Seamless Single sign-on (SSO) account with Resource Based Constrained Delegation (RBCD) applied security posture assessment report.
44
author: RonitLitinsky
5-
ms.author: t-rlitinsky
5+
ms.author: rlitinsky
66
ms.service: microsoft-defender-for-identity
77
ms.topic: article
88
ms.date: 08/22/2024
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
---
2+
# Required metadata
3+
# For more information, see https://review.learn.microsoft.com/en-us/help/platform/learn-editor-add-metadata?branch=main
4+
# For valid values of ms.service, ms.prod, and ms.topic, see https://review.learn.microsoft.com/en-us/help/platform/metadata-taxonomies?branch=main
5+
6+
title: 'Security assessment: Remove unsafe permissions on sensitive Microsoft Entra Connect accounts'
7+
description: This report lists any sensitive AD DS Connector (MSOL_) accounts or Microsoft Entra Seamless SSO computer account (AZUREADSSOACC) with unsafe permissions.
8+
author: LiorShapiraa # GitHub alias
9+
ms.author: liorshapira
10+
ms.service: microsoft-defender-for-identity
11+
ms.topic: article
12+
ms.date: 03/16/2025
13+
---
14+
15+
# Security assessment: Remove unsafe permissions on sensitive Entra Connect accounts
16+
17+
This article describes Microsoft Defender for Identity's Microsoft Entra Connect accounts unsafe permissions security posture assessment report.
18+
19+
> [!NOTE]
20+
> This security assessment will be available only if Microsoft Defender for Identity sensor is installed on servers running Microsoft Entra Connect services and Sign on method as part of Microsoft Entra Connect configuration is set to single sign-on and the SSO computer account exists. Learn more about Microsoft Entra seamless sign-on **[here](/entra/identity/hybrid/connect/how-to-connect-sso)**.
21+
22+
## How can unsafe permissions on Microsoft Entra Connect accounts expose your hybrid identity to risk?
23+
24+
Microsoft Entra Connect accounts like AD DS Connector account (also known as MSOL_) and Microsoft Entra Seamless SSO computer account (AZUREADSSOACC) have powerful privileges, including replication and password reset rights. If these accounts are granted unsafe permissions, attackers could exploit them to gain unauthorized access, escalate privileges, or take control of hybrid identity infrastructure. This could lead to account takeovers, unauthorized directory modifications, and a broader compromise of both on-premises and cloud environments.
25+
26+
## How do I use this security assessment to improve my hybrid organizational security posture?
27+
28+
> [!NOTE]
29+
> While assessments are updated in near real time, scores and statuses are updated every 24 hours. While the list of impacted entities is updated within a few minutes of your implementing the recommendations, the status may still take time until it's marked as **Completed**.
30+
31+
1. Review the recommended action at[ https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for Remove unsafe permissions on sensitive Entra Connect accounts.
32+
33+
1. Review the list of exposed entities to identify accounts with unsafe permissions. For example:
34+
35+
:::image type="content" source="media/remove-unsafe-permissions-sensitive-entra-connect/screenshot-of-exposed-entities.png" alt-text="Screenshot of exposed entities" lightbox="media/remove-unsafe-permissions-sensitive-entra-connect/screenshot-of-exposed-entities.png":::
36+
37+
1. If you click on "Click to expend" you can find more details about the granted permissions. For example:
38+
39+
:::image type="content" source="media/remove-unsafe-permissions-sensitive-entra-connect/screenshot-of-excessive-permissions.png" alt-text="Screenshot of excessive permissions" lightbox="media/remove-unsafe-permissions-sensitive-entra-connect/screenshot-of-excessive-permissions.png":::
40+
41+
1. For each exposed account, remove problematic permissions that allow unprivileged accounts to takeover critical hybrid assets.
42+
43+
44+
## Next steps
45+
46+
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
47+
48+
- [Learn more about Defender for Identity Sensor for Microsoft Entra Connect](https://aka.ms/MdiSensorForMicrosoftEntraConnectInstallation)
49+

ATPDocs/toc.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -172,6 +172,9 @@ items:
172172
displayName: Microsoft Entra Connect
173173
- name: Remove unnecessary replication permissions for Microsoft Entra Connect connector account
174174
href: remove-replication-permissions-microsoft-entra-connect.md
175+
- name: Remove unsafe permissions on sensitive Entra Connect accounts
176+
href: remove-unsafe-permissions-sensitive-entra-connect.md
177+
displayName: MDI
175178
- name: Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account
176179
href: replace-entra-connect-default-admin.md
177180
- name: Identity infrastructure

ATPDocs/whats-new.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,10 @@ For updates about versions and features released six months ago or earlier, see
2424

2525
## March 2025
2626

27+
### New Health Issue
28+
29+
New [health issue](health-alerts.md#network-configuration-mismatch-for-sensors-running-on-vmware) for cases where sensors running on VMware have network configuration mismatch.
30+
2731
### Enhanced Identity Inventory (Preview)
2832

2933
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment.

0 commit comments

Comments
 (0)