Skip to content

Commit 7e31259

Browse files
authored
Merge pull request #3614 from MicrosoftDocs/main
[AutoPublish] main to live - 04/29 04:29 PDT | 04/29 16:59 IST
2 parents 3f6ad38 + 238278b commit 7e31259

13 files changed

+188
-52
lines changed
Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,85 @@
1+
---
2+
title: Identity Security Initiative
3+
description: Learn how to enhance your organization's identity security using the Identity Security Initiative in Microsoft Defender XDR.
4+
ms.topic: overview
5+
ms.date: 04/05/2025
6+
---
7+
8+
# Identity Security Initiative (Preview)
9+
10+
Identity security is the practice of protecting the digital identities of individuals and organizations. This includes protecting passwords, usernames, and other credentials that can be used to access sensitive data or systems. Identity security is essential for protecting against a wide range of cyber threats, including phishing, malware, and data breaches.
11+
12+
## Prerequisites
13+
14+
- Your organization must have a Microsoft Defender for Identity license.
15+
- [Review prerequisites and permissions needed](/security-exposure-management/prerequisites) for working with Security Exposure Management.
16+
17+
## View Identity Security Initiatives
18+
1. Navigate to the [Microsoft Defender portal](https://security.microsoft.com/).
19+
1. From the Exposure management section on the navigation bar, select **Exposure insights** **>** **Initiatives** to open the Identity Security page.
20+
21+
:::image type="content" source="media/identity-security-initiative/screenshot-of-the-identity-security-initiative-page.png" alt-text="Screenshot showing the Identity security initiative page." lightbox="media/identity-security-initiative/screenshot-of-the-identity-security-initiative-page.png":::
22+
23+
## Review security metrics
24+
25+
Metrics in security initiatives help you to measure exposure risk for different areas within the initiative. Each metric gathers together one or more recommendations for similar assets.
26+
Metrics can be associated with one or more initiatives.
27+
28+
On the **Metrics** tab of an initiative, or in the Metrics section of Exposure Insights, you can see the metric state, its effect, and relative importance in an initiative, and recommendations to improve the metric.
29+
We recommend that you prioritize metrics with the highest impact on Initiative Score level. This composite measure considers both the weight value of each recommendation and the percentage of noncompliant recommendations.
30+
31+
:::image type="content" source="media/identity-security-initiative/screenshot-of-the-security-metrics-page.png" alt-text="Screenshot showing the security metrics page." lightbox="media/identity-security-initiative/screenshot-of-the-security-metrics-page.png":::
32+
33+
34+
|Metric property |Description |
35+
|---------|---------|
36+
|**Metric name** | The name of the metric. |
37+
|**Progress** |Shows the improvement of the exposure level for the metric from 0 (high exposure) to 100 (no exposure). |
38+
|**State** | Shows if the metric needs attention or if the target was met. |
39+
|**Total assets** | Total number of assets under the metric scope. |
40+
|**Recommendations** | Security recommendations associated with the metric. |
41+
|**Weight** | The relative weight (importance) of the metric within the initiative, and its effect on the initiative score. Shown as High, Medium, and Low. It can also be defined as Risk accepted. |
42+
|**14-day trend** | Shows the metric value changes over the last 14 days. |
43+
|**Last updated** | Shows a timestamp of when the metric was last updated.
44+
45+
> [!NOTE]
46+
> The Affected assets experience isn't fully supported during the Preview phase.
47+
48+
## View Identity security recommendations
49+
50+
The Security recommendations tab displays a list of prioritized remediation actions related to your identity security posture. Each recommendation is evaluated for compliance and mapped to its corresponding risk impact, workload, and domain. This view helps you triage and take action based on urgency and business relevance.
51+
52+
:::image type="content" source="media/identity-security-initiative/screenshot-showing-the-security-recommendations-page.png" alt-text="Showing showing the security recommendations page." lightbox="media/identity-security-initiative/screenshot-showing-the-security-recommendations-page.png":::
53+
54+
Sort the recommendations by any of the headings or filter them based on your task needs.
55+
56+
| **Column** | **Description** |
57+
|------------------------|---------------------------------------------------------------------------------|
58+
| **Name** | The name of the recommended action (for example, *Configure VPN integration*, *Enable MFA*). |
59+
| **State** | Indicates whether the recommendation is *Compliant* or *Not Compliant*. |
60+
| **Impact** | The security impact level (Low, Medium, or High) of implementing the recommendation. |
61+
| **Workload** | The Microsoft service area the recommendation applies to (for example, Defender for Identity, Microsoft Entra ID). |
62+
| **Domain** | The security domain (for example, identity, apps) associated with the recommendation. |
63+
| **Last calculated** | The most recent time the recommendation's status was evaluated. |
64+
| **Last state change** | When the recommendation’s compliance state last changed. |
65+
| **Related initiatives**| Number of security initiatives impacted by this recommendation. |
66+
| **Related metrics** | Number of security metrics that this recommendation contributes to. |
67+
68+
Security Exposure Management categorizes recommendations by compliance status, as follows:
69+
70+
- **Compliant**: Indicates that the recommendation was implemented successfully.
71+
- **Not complaint**: Indicates that the recommendation wasn't fixed.
72+
73+
## Set target score
74+
75+
You can set a customized target score for the initiative, taking your organization’s unique set of circumstances, priorities, and risk appetite into account.
76+
77+
To set a target store, select the initiative, and then select **Set target score** from the top of the initiative pane.
78+
79+
:::image type="content" source="media/identity-security-initiative/set-target-score.png" alt-text="Screenshot showing the set target score button." lightbox="media/identity-security-initiative/set-target-score.png":::
80+
81+
## Related content
82+
83+
- [Review security initiatives](/security-exposure-management/initiatives)
84+
85+
- [Investigate security initiative metrics](/security-exposure-management/security-metrics)
138 KB
Loading
109 KB
Loading
127 KB
Loading
196 KB
Loading

ATPDocs/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -257,6 +257,8 @@ items:
257257
href: security-assessment-unsecure-account-attributes.md
258258
- name: Weak cipher usage assessment
259259
href: security-assessment-weak-cipher.md
260+
- name: Identity security initiative (Preview)
261+
href: identity-security-initiative.md
260262
- name: Reference
261263
items:
262264
- name: Operations guide

defender-endpoint/behavior-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
ms.service: defender-endpoint
1111
ms.subservice: ngp
1212
ms.localizationpriority: medium
13-
ms.date: 03/25/2025
13+
ms.date: 04/29/2025
1414
search.appverid: met150
1515
---
1616

@@ -69,7 +69,7 @@ The following table shows the different ways to configure behavior monitoring.
6969
| CSP | AllowBehaviorMonitoring | [Defender Policy CSP](/mem/intune/protect/antivirus-microsoft-defender-settings-windows#real-time-protection) |
7070
| Configuration Manager Tenant Attach | Turn on behavior monitoring | [Windows Antivirus policy settings from Microsoft Defender Antivirus for tenant attached devices](/mem/intune/protect/antivirus-microsoft-defender-settings-windows-tenant-attach#real-time-protection) |
7171
| Group Policy | Turn on behavior monitoring | [Download Group Policy Settings Reference Spreadsheet for Windows 11 2023 Update (23H2)](https://www.microsoft.com/download/details.aspx?id=105668) |
72-
| PowerShell | Set-Preference -DisableBehaviorMonitoring | [Set-MpPreference](/powershell/module/defender/set-mppreference#-disablebehaviormonitoring) |
72+
| PowerShell | Set-MpPreference -DisableBehaviorMonitoring | [Set-MpPreference](/powershell/module/defender/set-mppreference#-disablebehaviormonitoring) |
7373
| WMI | boolean DisableBehaviorMonitoring; | [MSFT\_MpPreference class](/previous-versions/windows/desktop/defender/msft-mppreference) |
7474

7575
If you use Microsoft Defender for Business, see [Review or edit your next-generation protection policies in Microsoft Defender for Business](/defender-business/mdb-next-generation-protection).

defender-endpoint/ios-configure-features.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -318,10 +318,10 @@ Defender for Endpoint on iOS enables admins to configure custom indicators on iO
318318

319319
> [!NOTE]
320320
> Defender for Endpoint on iOS supports creating custom indicators only for URLs and domains. IP based custom indicators aren't supported on iOS.
321+
> > IP `245.245.0.1` is an internal Defender IP and shouldn't be included in custom indicators by customers to avoid any functionality issues.
322+
> > For iOS, no alerts are generated in the Microsoft Defender portal when the URL or domain set in the indicator is accessed.
321323
>
322-
> IP `245.245.0.1` is an internal Defender IP and shouldn't be included in custom indicators by customers to avoid any functionality issues.
323-
>
324-
> For iOS, no alerts are generated in the Microsoft Defender portal when the URL or domain set in the indicator is accessed.
324+
> MDE portal Timeline doesn't display the URL for Custom URL Indicator Blocks for unsupervised devices, instead it marks hidden for privacy.
325325
326326
## Configure vulnerability assessment of apps
327327

@@ -374,7 +374,7 @@ Defender for Endpoint on iOS supports vulnerability assessments of OS and apps.
374374
- The privacy approval screen appears only for unsupervised devices.
375375
- Only if end-user approves the privacy, the app information is sent to the Defender for Endpoint console.
376376

377-
:::image type="content" source="media/tvm-user-privacy2.png" alt-text="Screenshot of the end user privacy screen." lightbox="media/tvm-user-privacy2.png":::
377+
:::image type="content" source="media/tvm-user-privacy2.png" alt-text="Screenshot of the end user privacy screen.":::
378378

379379
Once the client versions are deployed to target iOS devices, processing starts. Vulnerabilities found on those devices start showing up in the Defender Vulnerability Management dashboard. The processing might take few hours (max 24 hours) to complete. This time frame is especially true for the entire list of apps to show up in the software inventory.
380380

defender-endpoint/mde-linux-prerequisites.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -68,10 +68,14 @@ For detailed licensing information, see [Product Terms: Microsoft Defender for E
6868

6969
The following Linux server distributions and x64 (AMD64/EM64T) versions are supported:
7070

71-
- Red Hat Enterprise Linux 7.2 or higher
71+
- Red Hat Enterprise Linux 7.2 and higher
72+
7273
- Red Hat Enterprise Linux 8.x
7374
- Red Hat Enterprise Linux 9.x
74-
- CentOS 7.2 or higher, excluding CentOS Stream
75+
- CentOS 7.2 and higher, excluding CentOS Stream
76+
77+
- CentOS 8.x
78+
7579
- Ubuntu 16.04 LTS
7680
- Ubuntu 18.04 LTS
7781
- Ubuntu 20.04 LTS
@@ -80,7 +84,8 @@ The following Linux server distributions and x64 (AMD64/EM64T) versions are supp
8084
- Debian 9 - 12
8185
- SUSE Linux Enterprise Server 12.x
8286
- SUSE Linux Enterprise Server 15.x
83-
- Oracle Linux 7.2 or higher
87+
- Oracle Linux 7.2 and higher
88+
8489
- Oracle Linux 8.x
8590
- Oracle Linux 9.x
8691
- Amazon Linux 2
@@ -174,13 +179,6 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
174179
- For RHEL6 the mdatp RPM package requires `policycoreutils`, `libselinux`, and `mde-netfilter`.
175180
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, and `mde-netfilter`.
176181

177-
> [!NOTE]
178-
> Beginning with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
179-
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or older, the following additional dependency on the auditd package exists for mdatp:
180-
> - The mdatp RPM package requires `audit`, `semanage`.
181-
> - For DEBIAN, the mdatp package requires `auditd`.
182-
> - For Mariner, the mdatp package requires `audit`.
183-
184182
The `mde-netfilter` package also has the following package dependencies:
185183

186184
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1` and `libglib2.0-0`

defender-endpoint/mde-sdp-strategy.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: emmwalshh
66
ms.author: ewalsh
77
ms.reviewer: yongrhee
88
manager: deniseb
9-
ms.date: 09/16/2024
9+
ms.date: 04/29/2025
1010
ms.topic: conceptual
1111
ms.service: defender-endpoint
1212
ms.subservice: ngp
@@ -19,28 +19,35 @@ ms.collection:
1919

2020
# Use safe deployment practices to safeguard and manage your environment
2121

22-
Microsoft follows safe deployment practices (SDP) to minimize the risk of security updates having an unexpected impact. This article describes Microsoft Defender for Endpoint's approach to SDP and what customers can do to manage their own roll-out processes to add an extra layer of control.
22+
<!-- Added introductory text to emphasize why updates are important. Mirrors language from https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/microsoft-defender-for-endpoint%e2%80%99s-safe-deployment-practices/4220342 -->
23+
24+
Microsoft Defender for Endpoint helps protect organizations against sophisticated adversaries while optimizing for resiliency, performance, and compatibility, following [best practices for managing security tools in Windows](https://www.microsoft.com/en-us/security/blog/2024/07/27/windows-security-best-practices-for-integrating-and-managing-security-tools/). Keeping Microsoft Defender for Endpoint up to date is essential to ensure your devices have the latest technology and features needed to protect against new malware and attack techniques.
25+
26+
Microsoft follows safe deployment practices (SDP) to deliver critical new product capabilities while minimizing the risk of updates having unexpected impacts to endpoint performance and availability. This article describes Defender for Endpoint's approach to SDP and how customers can manage their own roll-out processes to add extra layers of control to meet their own business, technical, and security requirements.
27+
28+
## Approach and update types
2329

2430
Microsoft Defender for Endpoint ships updates externally only after all the certification and validation tests are completed across multiple iterations of internal devices.
2531

2632
Defender for Endpoint applies SDP to two distinct update mechanisms:
2733

28-
- Software and driver updates that are updated monthly (can potentially update kernel-mode components).
29-
- Security intelligence and detection logic updates that can be updated multiple times a day (updates only apply to user-mode components).
34+
- Software and driver updates that are updated monthly and can potentially update kernel-mode components.
35+
36+
- Security intelligence and detection logic updates that can be updated multiple times a day and apply only to user-mode components.
3037

3138
## Monthly SDP software and driver updates
3239

3340
Defender for Endpoint releases monthly software and driver updates that add new functionality, improve existing features, and resolve bugs.
3441

35-
Defender for Endpoint's kernel drivers capture system-wide signals like process execution, file creation, and network activity. These drivers are updated through Windows Update, over a gradual and staged deployment process after spending weeks in stabilization and testing. The deployment evaluation monitors key metrics like reliability, performance, battery, application compatibility, and more across hardware and software configurations.
42+
Defender for Endpoint's kernel drivers captures system-wide signals like process execution, file creation, and network activity. These drivers are updated through Windows Update, over a gradual and staged deployment process after spending weeks in stabilization and testing. The deployment evaluation monitors key metrics like reliability, performance, battery, application compatibility, and more across hardware and software configurations.
3643

3744
The process for rolling out software and driver updates for Defender for Endpoint is shown in this image:
3845

3946
:::image type="content" alt-text="Screenshot that shows the process for rolling out software and driver updates for Defender for Endpoint." source="/defender/media/defender-endpoint/mde-software-driver-updates.png" lightbox="/defender/media/defender-endpoint/mde-software-driver-updates.png":::
4047

4148
### Microsoft SDP for monthly updates
4249

43-
All code and content changes go through engineering release gates along with extensive validations and stability testing. After the certification and validation process, Microsoft ships the updates through multiple groups of devices known as stabilization rings. The first stabilization ring targets Microsoft's hundreds of thousands of employees and millions of internal devices. This helps ensure Microsoft discovers and addresses issues first, before customers.
50+
All code and content changes go through engineering release gates along with extensive validations and stability testing. After the certification and validation process, Microsoft ships the updates through multiple groups of devices known as stabilization rings. The first stabilization ring targets Microsoft's hundreds of thousands of employees and millions of internal devices. This helps ensure your devices are equipped with the latest technology and features necessary to defend against emerging malware and attack techniques.
4451

4552
Within each ring, Microsoft closely monitors quality signals such as product behavior and performance, false positives, as well as functional and reliability issues, before proceeding to roll out the update to a broader set of devices.
4653

0 commit comments

Comments
 (0)