You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/security-assessment-unsecure-account-attributes.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,8 +40,9 @@ Use the remediation appropriate to the relevant attribute as described in the fo
40
40
| Enable Kerberos AES encryption support | Enable AES features on the account properties in AD | Enabling AES128_CTS_HMAC_SHA1_96 or AES256_CTS_HMAC_SHA1_96 on the account helps prevent the use of weaker encryption ciphers for Kerberos authentication. |
41
41
| Remove Use Kerberos DES encryption types for this account | Remove this setting from account properties in AD | Removing this setting enables the use of stronger encryption algorithms for the account's password. |
42
42
| Remove a Service Principal Name (SPN) | Remove this setting from account properties in AD | When a user account is configured with an SPN set, it means that the account has been associated with one or more SPNs. This typically occurs when a service is installed or registered to run under a specific user account, and the SPN is created to uniquely identify the service workspace for Kerberos authentication. This recommendation only showed for sensitive accounts. |
43
+
|Reset password as SmartcardRequired setting was removed|Reset the account password|Changing the account's password after the SmartcardRequired UAC flag was removed ensures it was set under current security policies. This helps prevent potential exposure from passwords created when smartcard enforcement was still active.|
43
44
44
-
Use the **UserAccountControl** flag to manipulate user account profiles. For more information, see:
45
+
Use the **UserAccountControl**(UAC) flag to manipulate user account profiles. For more information, see:
45
46
46
47
-[Windows Server troubleshooting](/troubleshoot/windows-server/identity/useraccountcontrol-manipulate-account-properties) documentation.
Copy file name to clipboardExpand all lines: ATPDocs/unmonitored-active-directory-certificate-services-server.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ This article describes the security posture assessment report for unmonitored Ac
19
19
Unmonitored Active Directory Certificate Services (AD CS) servers pose a significant risk to your organization’s identity infrastructure. AD CS, the backbone of certificate issuance and trust, is a high-value target for attackers aiming to escalate privileges or forge credentials. Without proper monitoring, attackers can exploit these servers to issue unauthorized certificates, enabling stealthy lateral movement and persistent access. Deploy Microsoft Defender for Identity version 2.0 sensors on all AD CS servers to mitigate this risk. These sensors provide real-time visibility into suspicious activity, detect advanced threats, and generate actionable alerts based on security events and network behavior.
20
20
21
21
> [!NOTE]
22
-
> This security assessment is available only if Microsoft Defender for Endpoint detects an eligible AD CS server in the environment.
22
+
> This security assessment is only available if Microsoft Defender for Endpoint detects eligible ADCS servers in the environment. In some cases, servers running ADCS might not be identified with the required role and therefore will not appear in this assessment, even if they exist in the environment.
23
23
24
24
## How do I use this security assessment?
25
25
@@ -35,4 +35,4 @@ Unmonitored Active Directory Certificate Services (AD CS) servers pose a signifi
35
35
36
36
## Next steps
37
37
38
-
Learn more about [Microsoft Secure Score](/defender-xdr/microsoft-secure-score).
38
+
Learn more about [Microsoft Secure Score](/defender-xdr/microsoft-secure-score).
Copy file name to clipboardExpand all lines: ATPDocs/unmonitored-active-directory-federation-services-servers.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,8 +18,7 @@ This article describes the Microsoft Defender for Identity's unmonitored Active
18
18
Unmonitored Active Directory Federation Services (ADFS) servers are a significant security risk to organizations. ADFS controls access to both cloud and on-premises resources as the gateway for federated authentication and single sign-on. If attackers compromise an ADFS server, they can issue forged tokens and impersonate any user, including privileged accounts. Such attacks might bypass multi-factor authentication (MFA), conditional access, and other downstream security controls, making them particularly dangerous. Without proper monitoring, suspicious activity on ADFS servers might go undetected for extended periods. Deploying Microsoft Defender for Identity version 2.0 sensors on ADFS servers is essential. These sensors enable real-time detection of suspicious behavior and help prevent token forgery, abuse of trust relationships, and stealthy lateral movement within the environment.
19
19
20
20
> [!NOTE]
21
-
> This security assessment is only available if Microsoft Defender for Endpoint detects an eligible ADFS server in the environment.
22
-
21
+
> This security assessment is only available if Microsoft Defender for Endpoint detects eligible ADFS servers in the environment. In some cases, servers running ADFS might not be identified with the required role and therefore will not appear in this assessment, even if they exist in the environment.
Copy file name to clipboardExpand all lines: ATPDocs/unmonitored-entra-connect-servers.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ If an attacker compromises a Microsoft Entra Connect server, they can inject sha
23
23
These servers operate at the intersection of on-premises and cloud identity, making them a prime target for privilege escalation and stealthy persistence. Without monitoring, such attacks can go undetected. Deploying Microsoft Defender for Identity version 2.0 sensors on Microsoft Entra Connect servers is critical. These sensors help detect suspicious activity in real time, protect the integrity of your hybrid identity bridge, and prevent full-domain compromise from a single point of failure.
24
24
25
25
> [!NOTE]
26
-
> This security assessment is only available if Microsoft Defender for Endpoint detects eligible Microsoft Entra Connect servers in the environment.
26
+
> This security assessment is only available if Microsoft Defender for Endpoint detects eligible Microsoft Entra Connect servers in the environment. In some cases, servers running Entra Connect might not be identified with the required role and therefore will not appear in this assessment, even if they exist in the environment.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/access-policy-aad.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,7 @@ title: Create access policies | Microsoft Defender for Cloud Apps
3
3
description: Learn how to configure Microsoft Defender for Cloud Apps access policies with Conditional Access app control to control access to cloud apps.
4
4
ms.date: 05/15/2024
5
5
ms.topic: how-to
6
+
ms.reviewer: AmitMishaeli
6
7
---
7
8
# Create Microsoft Defender for Cloud Apps access policies
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/activity-filters.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,7 @@ title: Investigate activities
3
3
description: This article provides a list of activities, filters, and match parameters that can be applied to activity policies.
4
4
ms.date: 06/24/2025
5
5
ms.topic: how-to
6
+
ms.reviewer: gayasalomon
6
7
---
7
8
8
9
# Investigate activities
@@ -15,7 +16,7 @@ Microsoft Defender for Cloud Apps gives you visibility into all the activities f
15
16
>
16
17
> Microsoft Defender for Cloud Apps displays these activity names and types exactly as received and doesn't define or modify them. To understand the meaning of an activity, refer to the relevant third‑party API documentation.
17
18
18
-
The action types for events and activities are determined by the source service, whether it is a first-party or third-party service. Microsoft Defender for Cloud Apps (MDA) supports a wide range of action types and is not restricted to specific ones.
19
+
The action types for events and activities are determined by the source service, whether it's a first-party or third-party service. Microsoft Defender for Cloud Apps (MDA) supports a wide range of action types and isn't restricted to specific ones.
19
20
For a full list of Microsoft 365 activities monitored by Defender for Cloud Apps, see [Search the audit log in the Microsoft Purview portal](/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance#audited-activities).
20
21
21
22
@@ -93,7 +94,7 @@ Selecting it opens the Activity drawer **User** tab provides the following insig
93
94
- **ISPs**: The number of ISPs the user connected from in the past 30 days.
94
95
- **IP addresses**: The number of IP addresses the user connected from in the past 30 days.
95
96
96
-
:::image type="content" source="media/user-insights.png" alt-text="Screenshot that shows user insights, user activities and frequent alert locations for Defender for Cloud apps." lightbox="media/user-insights.png":::
97
+
:::image type="content" source="media/user-insights.png" alt-text="Screenshot that shows user insights, user activities, and frequent alert locations for Defender for Cloud apps." lightbox="media/user-insights.png":::
97
98
98
99
99
100
#### IP address insights
@@ -122,7 +123,7 @@ To view IP address insights:
122
123
- Set as a VPN IP address and add to allowlist
123
124
- Set as a Risky IP and add to blocklist
124
125
125
-
:::image type="content" source="media/activity-filters/ip-address-insights.png" alt-text="Screenshot that shows Ip address activities over the last 30 days." lightbox="media/activity-filters/ip-address-insights.png":::
126
+
:::image type="content" source="media/activity-filters/ip-address-insights.png" alt-text="Screenshot that shows IP address activities over the last 30 days." lightbox="media/activity-filters/ip-address-insights.png":::
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/anomaly-detection-policy.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,7 @@ title: Create anomaly detection policies | Microsoft Defender for Cloud Apps
3
3
description: This article provides a description of Anomaly detection policies and provides reference information about the building blocks of an anomaly detection policy.
4
4
ms.date: 03/01/2023
5
5
ms.topic: how-to
6
+
ms.reviewer: Ronen-Refaeli
6
7
---
7
8
8
9
# Create Defender for Cloud Apps anomaly detection policies
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/api-activities-investigate-script.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,7 @@ title: Investigate activities using the API
3
3
description: This article provides information on how to use the API to investigate user activity in Defender for Cloud Apps.
4
4
ms.date: 01/29/2023
5
5
ms.topic: how-to
6
+
ms.reviewer: Naama-Goldbart
6
7
---
7
8
# Investigate activities using the API
8
9
@@ -18,7 +19,7 @@ The activities API mode is optimized for scanning and retrieval of large quantit
18
19
## To use the activity scan script
19
20
20
21
1. Run the query on your data.
21
-
1. If there are more records than could be listed in a single scan, you will get a return command with `nextQueryFilters` that you should run. You will get this command each time you scan until the query has returned all the results.
22
+
1. If there are more records than could be listed in a single scan, you'll get a return command with `nextQueryFilters` that you should run. You'll get this command each time you scan until the query has returned all the results.
22
23
23
24
## Request body parameters
24
25
@@ -32,9 +33,9 @@ The activities API mode is optimized for scanning and retrieval of large quantit
32
33
33
34
## Response parameters
34
35
35
-
- "data": the returned data. Will contain up to "limit" number of records each iteration. If there are more records to be pulled (hasNext=true), the last few records will be dropped to ensure that all data is listed only once.
36
+
- "data": the returned data. Will contain up to "limit" number of records each iteration. If there are more records to be pulled (hasNext=true), the last few records are dropped to ensure that all data is listed only once.
36
37
- "hasNext": Boolean. Denotes whether another iteration on the data is needed.
37
-
- "nextQueryFilters": If another iteration is needed, it contains the consecutive JSON query to be run. Use this as the "filters" parameter in the next request. Note that if the "hasNext" parameter is set to False, this parameter will be missing since you've iterated over all of the data.
38
+
- "nextQueryFilters": If another iteration is needed, it contains the consecutive JSON query to be run. Use this as the "filters" parameter in the next request. If the "hasNext" parameter is set to False, this parameter will be missing since you've iterated over all of the data.
38
39
39
40
The following Python example gets all the activities from the past day from Exchange Online.
0 commit comments