Skip to content

Commit 7d92bf0

Browse files
authored
Merge branch 'main' into docs-editor/ios-whatsnew-1741884495
2 parents e5f8c04 + 0d57209 commit 7d92bf0

File tree

9 files changed

+184
-33
lines changed

9 files changed

+184
-33
lines changed

ATPDocs/identity-inventory.md

Lines changed: 133 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,133 @@
1+
---
2+
# Required metadata
3+
# For more information, see https://review.learn.microsoft.com/en-us/help/platform/learn-editor-add-metadata?branch=main
4+
# For valid values of ms.service, ms.prod, and ms.topic, see https://review.learn.microsoft.com/en-us/help/platform/metadata-taxonomies?branch=main
5+
6+
title: Identity inventory
7+
description: The Identity Inventory provides a centralized location for customers to view and manage identity information across their environment, ensuring optimal visibility and a comprehensive experience. The updated Identities Inventory page, located under Assets in Defender XDR portal
8+
author: LiorShapiraa # GitHub alias
9+
ms.author: liorshapira
10+
ms.service: microsoft-defender-for-identity
11+
ms.topic: article
12+
ms.date: 03/13/2025
13+
---
14+
15+
# Identity inventory
16+
17+
__Applies to:__
18+
19+
- [Microsoft Defender for Identity](https://aka.ms/aatp/docs)
20+
21+
- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/)
22+
23+
- [Microsoft Defender XDR](/defender-xdr)
24+
25+
The __Identity inventory__ provides a centralized view of all identities in your organization, enabling you to monitor and manage them efficiently. At a glance, you can see key details such as Domain, Tags, Type, and other attributes, helping you quickly identify and manage identities that require attention.
26+
27+
The Identities inventory page includes the following tabs:
28+
29+
- **Identities**: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.
30+
31+
- **Cloud application accounts:** Displays a list of cloud application accounts, including those from application connectors and third-party sources (original available in the previous version based on Microsoft Defender for Cloud Apps). Learn more about [Cloud application accounts from connected apps.](/defender-cloud-apps/accounts)
32+
33+
There are several options you can choose from to customize the identities list view. On the top navigation you can:
34+
35+
- Add or remove columns.
36+
37+
- Apply filters.
38+
39+
- Search for an identity by name or full UPN, Sid and Object ID.
40+
41+
- Export the list to a CSV file.
42+
43+
- Copy list link with the included filters configured.
44+
45+
## ![A screenshot of identity inventory page.](media/identity-inventory/inventory11.png)
46+
47+
### Identity details
48+
49+
The **Identities** list offers a consolidated view of identities across Active Directory and Entra ID. It highlights key details, including the following columns by default:
50+
51+
- __Display name__ – The full name of the identity as shown in the directory.
52+
53+
- __SID__ – The Security Identifier, a unique value used to identify the identity in Active Directory.
54+
55+
- __Domain__ – The Active Directory domain to which the identity belongs.
56+
57+
- __Object ID__ – A unique identifier for the identity in Entra ID.
58+
59+
- __Source__ – Indicates whether the identity is on-premises (originate from Active Directory), Cloud only (Entra ID) or Hybrid (synced from AD to Entra ID).
60+
61+
- __Type__ – Specifies if the identity is a user account or service account.
62+
63+
- __UPN (User Principal Name)__ – The unique login name of the identity in an email-like format.
64+
65+
- __Tags__ – Custom labels that help categorize or classify identities: Sensitive and Honeytoken.
66+
67+
- __Created time__ – The timestamp when the identity was first created.
68+
69+
- __Criticality level__ – Indicates the critical level of the identity.
70+
71+
- __Account status__ – Shows whether the identity is enabled or disabled.
72+
73+
- __Last updated__ – The timestamp of the most recent update to the identity's attributes in Active Directory.
74+
75+
Non-default columns: Email and Entra ID risk level.  
76+
77+
> [!TIP]
78+
> To see all columns, you likely need to do one or more of the following steps:
79+
> - Horizontally scroll in your web browser.
80+
> - Narrow the width of appropriate columns.
81+
> - Zoom out in your web browser.
82+
83+
### Sort and filter the Identities list
84+
85+
You can apply the following filters to limit the list of identities and get a more focused view:
86+
87+
- Domain
88+
89+
- Type
90+
91+
- Source
92+
93+
- Tags
94+
95+
- Criticality level
96+
97+
- Account status
98+
99+
Sort option applies to Display name, Domain and Created time columns.
100+
101+
### Identity inventory insights
102+
103+
- The __Classify critical assets__ card allows you to define identity groups as business critical. For more information, see [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management).
104+
105+
- **Highly privileged identities** card helps you investigate in Advanced hunting all sensitive accounts in your organization, including Entra ID security administrators and Global admin users.
106+
107+
- **Critical Active Directory service accounts** card helps you quickly identify all Active Directory accounts designated as critical, making it easier to focus on identities most at risk.
108+
109+
At the top of each device inventory tab, the following device counts are available:
110+
111+
- __Total__: The total number of identities.
112+
113+
- __Critical:__ The number of your critical assets.
114+
115+
- **Disabled:** The number of all disabled identities in your organization.
116+
117+
- **Services:** The number of all service accounts both on-premises and cloud.
118+
119+
You can use this information to help you prioritize devices for security posture improvements.
120+
121+
### Navigate to the Identity inventory page
122+
123+
Use relative links instead of absolute links.
124+
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to Assets > Identities. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
125+
126+
### Related Articles
127+
128+
- [Investigate cloud application accounts](/defender-cloud-apps/accounts)
129+
130+
- [Investigate users in Microsoft Defender XDR](/defender-xdr/investigate-users)
131+
132+
- [Investigate assets in Microsoft Defender for Identity](/defender-for-identity/investigate-assets)
133+
127 KB
Loading
1.14 MB
Loading

ATPDocs/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,8 @@ items:
124124
items:
125125
- name: Assets
126126
items:
127+
- name: Identity inventory
128+
href: identity-inventory.md
127129
- name: Investigate assets
128130
href: investigate-assets.md
129131
- name: Lateral movement paths

defender-endpoint/device-health-microsoft-defender-antivirus-health.md

Lines changed: 33 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: ewalsh
77
author: emmwalshh
88
ms.localizationpriority: medium
9-
ms.date: 02/19/2025
9+
ms.date: 03/13/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -44,14 +44,29 @@ The Device Health report provides information about the devices in your organiza
4444

4545
In the Microsoft Defender portal, in the navigation pane, select **Reports**, and then open **Device health and compliance**. The [**Microsoft Defender Antivirus health** tab](#microsoft-defender-antivirus-health-tab) has eight cards that report on the following aspects of Microsoft Defender Antivirus:
4646

47-
- [Antivirus mode card](#antivirus-mode-card)
48-
- [Antivirus engine version card](#antivirus-engine-version-card)
49-
- [Antivirus security intelligence version card](#antivirus-security-intelligence-version-card)
50-
- [Antivirus platform version card](#antivirus-platform-version-card)
51-
- [Recent antivirus scan results card](#recent-antivirus-scan-results-card)
52-
- [Antivirus engine updates card](#antivirus-engine-updates-card)
53-
- [Security intelligence updates card](#security-intelligence-updates-card)
54-
- [Antivirus platform updates card](#antivirus-platform-updates-card)
47+
- [Device health, Microsoft Defender Antivirus health report](#device-health-microsoft-defender-antivirus-health-report)
48+
- [View device health cards](#view-device-health-cards)
49+
- [Report access permissions](#report-access-permissions)
50+
- [Microsoft Defender Antivirus health tab](#microsoft-defender-antivirus-health-tab)
51+
- [Prerequisites](#prerequisites)
52+
- [Card functionality](#card-functionality)
53+
- [New Microsoft Defender Antivirus filter definitions](#new-microsoft-defender-antivirus-filter-definitions)
54+
- [Export report](#export-report)
55+
- [Top level export](#top-level-export)
56+
- [Microsoft Defender Antivirus version and update cards functionality](#microsoft-defender-antivirus-version-and-update-cards-functionality)
57+
- [Full report](#full-report)
58+
- [Card descriptions](#card-descriptions)
59+
- [Antivirus mode card](#antivirus-mode-card)
60+
- [Recent antivirus scan results card](#recent-antivirus-scan-results-card)
61+
- [Antivirus engine version card](#antivirus-engine-version-card)
62+
- [Antivirus security intelligence version card](#antivirus-security-intelligence-version-card)
63+
- [Antivirus platform version card](#antivirus-platform-version-card)
64+
- [Up-to-date cards](#up-to-date-cards)
65+
- [Up-to-date definitions](#up-to-date-definitions)
66+
- [Antivirus engine updates card](#antivirus-engine-updates-card)
67+
- [Antivirus platform updates card](#antivirus-platform-updates-card)
68+
- [Security intelligence updates card](#security-intelligence-updates-card)
69+
- [See also](#see-also)
5570

5671
## Report access permissions
5772

@@ -108,14 +123,16 @@ For the three `updates` cards (also known as up-to-date reporting cards), "**No
108123

109124
Up-to-date reporting generates information for devices that meet the following criteria:
110125

111-
- Engine version: 1.1.19300.2+
112-
- Platform version: 4.18.2202.1+
113-
- Cloud protection enabled
114-
- Sense (MsSense.exe): **10.8210.** \*+
115-
- Windows OS - Windows 10 1809 or later
126+
* **Windows:**
127+
* OS - Windows 10 1809 or later
128+
* Engine version: 1.1.19300.2+
129+
* Platform version: 4.8.2202.1+
130+
* Sense (MsSense.exe): 10.8210.*+
131+
132+
* **Linux and Mac:**
133+
* Platform version: 101.23112.*+
116134

117-
> [!NOTE]
118-
> \* Currently up to date reporting is only available for Windows and Linux devices. Mac devices are listed under “no such data available or unknown".
135+
* **Cloud Protection enabled**
119136

120137
:::image type="content" source="media/device-health-defender-antivirus-health-tab.png" alt-text="Shows the Microsoft Defender Antivirus Health tab." lightbox="media/device-health-defender-antivirus-health-tab.png":::
121138

defender-office-365/attack-simulation-training-teams.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,17 +10,17 @@ ms.localizationpriority: medium
1010
ms.collection:
1111
- m365-security
1212
- tier2
13-
description: Admins can learn about the addition of Microsoft Teams in delivering simulated phishing attacks in Attack simulation training in Microsoft Defender for Office 365 Plan 2.
13+
description: Admins can learn about the addition in Microsoft Defender for Office 365 Plan 2 of delivering simulated phishing attacks in Attack simulation training to Microsoft Teams.
1414
search.appverid: met150
15-
ms.date: 3/15/2024
15+
ms.date: 3/13/2025
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1818
---
1919

2020
# Microsoft Teams in Attack simulation training
2121

2222
> [!IMPORTANT]
23-
> Microsoft Teams' Attack simulation training is currently in Private Preview, and the intake for this preview is now closed. The information in this article is subject to change.
23+
> Microsoft Teams' Attack simulation training is currently in Private Preview. The information in this article is subject to change.
2424
2525
In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR, admins can now use Attack simulation training to deliver simulated phishing messages in Microsoft Teams. For more information about attack simulation training, see [Get started using Attack simulation training in Defender for Office 365](attack-simulation-training-get-started.md).
2626

@@ -41,10 +41,10 @@ The addition of Teams in Attack simulation training affects the following featur
4141
4242
In addition to having user reporting for Teams messages turned on as described in [User reported message settings in Microsoft Teams](submissions-teams.md), you also need to configure the Teams accounts that can be used as sources for simulation messages in Attack simulation training. To configure the accounts, do the following steps:
4343

44-
1. Identify or create a user who's a member of the [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator)<sup>\*</sup>, [Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator), or [Attack Simulation Administrator](/entra/identity/role-based-access-control/permissions-reference#attack-simulation-administrator) roles in Microsoft Entra ID. Assign a Microsoft 365, Office 365, Microsoft Teams Essentials, Microsoft 365 Business Basic, or a Microsoft 365 Business Standard license for [Microsoft Teams](/office365/servicedescriptions/teams-service-description). You need to know the password.
44+
1. Identify or create a user who's a member of the [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator), [Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator), or [Attack Simulation Administrator](/entra/identity/role-based-access-control/permissions-reference#attack-simulation-administrator) roles in Microsoft Entra ID. Assign a Microsoft 365, Office 365, Microsoft Teams Essentials, Microsoft 365 Business Basic, or a Microsoft 365 Business Standard license for [Microsoft Teams](/office365/servicedescriptions/teams-service-description). You need to know the password.
4545

4646
> [!IMPORTANT]
47-
> <sup>\*</sup> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
47+
> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
4848
4949
2. Using the account from Step 1, open the Microsoft Defender portal at <https://security.microsoft.com> and go to **Email & collaboration** \> **Attack simulation training** \> **Settings** tab. Or, to go directly to the **Settings** tab, use <https://security.microsoft.com/attacksimulator?viewid=setting>.
5050
3. On the **Settings** tab, select **Manager user accounts** in the **Teams simulation configuration** section.
@@ -93,7 +93,7 @@ Whether you create a payload on the **Payloads** page of the **Content library**
9393

9494
- If you select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Create a payload** on the **Tenant payload** tab to create a payload, the first page of the new payload wizard is **Select type** where you can select **Teams**. Selecting **Teams** introduces the following changes to the rest of the new payload wizard:
9595

96-
- On the **[Select technique](attack-simulation-training-payloads.md#create-payloads)** page, the **Malware Attachment** and **Link in Attachment** social engineering techniques aren't available for Teams.
96+
- On the **[Select technique](attack-simulation-training-payloads.md#create-payloads)** page, the **Malware Attachment**, **Link in Attachment**, and **How-to Guide** techniques aren't available for Teams.
9797

9898
- The **Configure payload** page has the following changes for Teams:
9999
- **Sender details** section: The only available setting for Teams is **Chat topic** where you enter a tile for the Teams message.

defender-office-365/submissions-teams.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
ms.custom:
1717
description: "Admins can configure whether users can report malicious message in Microsoft Teams."
1818
ms.service: defender-office-365
19-
ms.date: 3/19/2024
19+
ms.date: 03/13/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -28,7 +28,7 @@ appliesto:
2828

2929
In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR, admins can decide whether users can report malicious messages in Microsoft Teams. Admins can also get visibility into the Teams messages that users are reporting.
3030

31-
Users can report messages in Teams from **internal** chats, channels and meeting conversations. Users can only report messages as malicious.
31+
Users can report messages in Teams from chats, standard channels and meeting conversations. Users can only report messages as malicious.
3232

3333
> [!NOTE]
3434
> User reporting of messages in Teams is not supported in U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD).
@@ -48,7 +48,7 @@ User reporting of messages in Teams is made of two separate settings:
4848
To view or configure this setting, you need to be a member of the **Global Administrator**<sup>\*</sup> or **Teams Administrator** roles. For more information about permissions in Teams, see [Use Microsoft Teams administrator roles to manage Teams](/microsoftteams/using-admin-roles).
4949

5050
> [!IMPORTANT]
51-
> <sup>\*</sup> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
51+
> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
5252
5353
1. In the Teams admin center at <https://admin.teams.microsoft.com>, go to **Messaging policies**. Or, to go directly to the **Messaging policies** page, use <https://admin.teams.microsoft.com/policies/messaging>.
5454

47.5 KB
Loading

0 commit comments

Comments
 (0)