Skip to content

Commit 8294cc4

Browse files
Merge pull request #3857 from MicrosoftDocs/main
[AutoPublish] main to live - 05/21 15:32 PDT | 05/22 04:02 IST
2 parents 8e2dae6 + 5b0e4c9 commit 8294cc4

File tree

13 files changed

+172
-96
lines changed

13 files changed

+172
-96
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 41 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -37,12 +37,6 @@ Direct Defender for Identity capabilities are supported on domain controllers on
3737
>
3838
> This issue is addressed in the out-of-band update [KB5037422](https://support.microsoft.com/en-gb/topic/march-22-2024-kb5037422-os-build-20348-2342-out-of-band-e8f5bf56-c7cb-4051-bd5c-cc35963b18f3).
3939
40-
### Defender for Endpoint onboarding
41-
42-
Your domain controller must be onboarded to Microsoft Defender for Endpoint.
43-
44-
For more information, see [Onboard a Windows server](/microsoft-365/security/defender-endpoint/onboard-windows-server).
45-
4640
### Permissions requirements
4741

4842
To access the Defender for Identity **Activation** page, you must either be a [Security Administrator](/entra/identity/role-based-access-control/permissions-reference), or have the following Unified RBAC permissions:
@@ -55,12 +49,6 @@ For more information, see:
5549
- [Unified role-based access control RBAC](../role-groups.md#unified-role-based-access-control-rbac)
5650
- [Create a role to access and manage roles and permissions](/microsoft-365/security/defender/create-custom-rbac-roles#create-a-role-to-access-and-manage-roles-and-permissions)
5751

58-
### Connectivity requirements
59-
60-
Defender for Identity capabilities directly on domain controllers use Defender for Endpoint URL endpoints for communication, including simplified URLs.
61-
62-
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).
63-
6452
## Configure Windows auditing
6553

6654
Defender for Identity detections rely on specific Windows Event Log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
@@ -78,42 +66,58 @@ For example, the following command defines all settings for the domain, creates
7866
Set-MDIConfiguration -Mode Domain -Configuration All
7967
```
8068

81-
## Activate Defender for Identity capabilities
69+
## Onboarding steps
70+
71+
### Customers with domain controllers already onboarded to Defender for Endpoint
8272

83-
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
73+
### Activate Defender for Identity capabilities
8474

8575
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
8676

8777
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
8878

89-
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
79+
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the activation of the new Defender for Identity sensor. For each server you can find its activation state.
9080

91-
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
81+
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
9282

9383
:::image type="content" source="media/activate-capabilities/1.jpg" lightbox="media/activate-capabilities/1.jpg" alt-text="Screenshot that shows how to activate the new sensor.":::
9484

9585
> [!NOTE]
9686
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
9787
98-
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
88+
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
9989

10090
:::image type="content" source="media/activate-capabilities/2.jpg" lightbox="media/activate-capabilities/2.jpg" alt-text="Screenshot that shows how to seethe onboarded servers.":::
10191

92+
### Customers without domain controllers onboarded to Defender for Endpoint
93+
94+
### Connectivity requirements
95+
96+
Defender for Identity capabilities directly on domain controllers use Defender for Endpoint URL endpoints for communication, including simplified URLs.
97+
98+
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).
99+
100+
### Onboard Defender for Identity capabilities
101+
Download the Defender for Identity onboarding package from the [Microsoft Defender portal] (https://security.microsoft.com)
102+
103+
1. Navigate to **System** > **Settings** > **Identities** > **Activation**
104+
2. Select Download onboarding package and save the file in a location you can access from your domain controller.
105+
3. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOnboardingScript.cmd` script as an Administrator.
106+
102107
## Onboarding Confirmation
103108

104109
To confirm the sensor has been onboarded:
105110

106-
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
111+
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
107112

108113
2. Check that the onboarded domain controller is listed.
109114

110115
> [!NOTE]
111-
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
116+
> The onboarding doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
117+
> To check the onboarding on the local server you can also review the event log under **Applications and Services Logs** > **Microsoft** > **Windows** > **Sense** > **Operational**. You should receive an onboarding event:
112118
113119
## Test activated capabilities
114120

115-
The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations show within five minutes.
116-
117121
Defender for Identity capabilities on domain controllers currently support the following Defender for Identity functionality:
118122

119123
- Investigation features on the [ITDR dashboard](#check-the-itdr-dashboard), [identity inventory](#confirm-entity-page-details), and [identity advanced hunting data](#test-advanced-hunting-tables)
@@ -163,7 +167,6 @@ IdentityQueryEvents
163167

164168
For more information, see [Advanced hunting in the Microsoft Defender portal](/microsoft-365/security/defender/advanced-hunting-microsoft-defender).
165169

166-
167170
## Test Identity Security Posture Management (ISPM) recommendations
168171

169172
We recommend simulating risky behavior in a test environment to trigger supported assessments and verify that they appear as expected. For example:
@@ -214,17 +217,31 @@ Test remediation actions on a test user. For example:
214217
215218
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
216219
217-
## Deactivate Defender for Identity capabilities on your domain controller
220+
## Offboarding steps
221+
222+
### Customers with domain controllers already onboarded to Defender for Endpoint
223+
224+
### Deactivate Defender for Identity capabilities on your domain controller
218225
219226
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
220227
221-
1. In the Defender portal, select **Settings** > **Identities** > **Sensors**.
228+
1. Navigate to **Settings** > **Identities** > **Sensors**
222229
2. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
223230
224231
:::image type="content" source="media/activate-capabilities/3.jpg" lightbox="media/activate-capabilities/3.jpg" alt-text="Screenshot that shows how to deactivate a server.":::
225232
226233
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
227234
235+
### Customers without domain controllers onboarded to Defender for Endpoint
236+
237+
### Offboard Defender for Identity capabilities on your domain controller
238+
Download the Defender for Identity offboarding package from the [Microsoft Defender portal] (https://security.microsoft.com).
239+
240+
1. Navigate to **Settings** > **Identities** > **Activation**
241+
2. Select Download offboarding package and save the file in a location you can access from your domain controller.
242+
3. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOffboardingScript_valid_until_YYYY-MM-DD.cmd` script as an Administrator.
243+
4. To fully remove the sensor, navigate to **Settings** > **Identities** > **Sensors**, select the server and click Delete.
244+
228245
## Next steps
229246
230247
For more information, see [Manage and update Microsoft Defender for Identity sensors](../sensor-settings.md).

defender-business/mdb-manage-devices.md

Lines changed: 33 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: how-to
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 02/28/2025
12+
ms.date: 05/21/2025
1313
ms.reviewer: nehabha
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -33,54 +33,60 @@ In Defender for Business, you can manage devices as follows:
3333

3434
:::image type="content" source="/defender/media/defender-business/mdb-device-inventory.png" alt-text="Screenshot of device inventory":::
3535

36-
1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
36+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Assets** \> **Devices**. Or, to go directly to the **Device inventory** page, use <https://security.microsoft.com/machines>.
37+
2. On the **Device inventory** page, you can see the list of devices and view some information about them.
38+
3. Select a device from the list to open the details flyout for the device, where you can learn more about the status of the device and take actions.
3739

38-
2. In the navigation pane, go to **Assets** > **Devices**.
39-
40-
3. Select a device to open its flyout panel, where you can learn more about its status and take action.
41-
42-
If you don't have any devices listed yet, [Onboard devices to Defender for Business](mdb-onboard-devices.md)
40+
If no devices are listed, see [Onboard devices to Defender for Business](mdb-onboard-devices.md)
4341

4442
## Take action on a device that has threat detections
4543

4644
:::image type="content" source="/defender/media/defender-business/mdb-selected-device.png" alt-text="Screenshot of a selected device with details and actions available.":::
4745

48-
1. In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the navigation pane, go to **Assets** > **Devices**.
46+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Assets** \> **Devices**. Or, to go directly to the **Device inventory** page, use <https://security.microsoft.com/machines>.
47+
2. On the **Device inventory** page, select a device from the list.
48+
3. In the details flyout that opens, select :::image type="icon" source="media/m365-cc-sc-more-actions-icon.png" border="false"::: **More**, and then select an available action (for example, **Run antivirus scan** or **Initiate Automated Investigation**).
49+
50+
## View the state of Microsoft Defender Antivirus
4951

50-
2. Select a device to open its flyout panel, and review the information that is displayed.
52+
Microsoft Defender Antivirus is a key component of next-generation protection in Defender for Business. To view the state of Microsoft Defender Antivirus, you have several options:
5153

52-
3. Select the ellipsis (**...**) to open the actions menu.
54+
- Use the [Device health report](mdb-reports.md#device-health-report).
55+
- Use one of the methods described in [How to confirm the state of Microsoft Defender Antivirus](/defender-endpoint/microsoft-defender-antivirus-compatibility#how-to-confirm-the-state-of-microsoft-defender-antivirus).
5356

54-
4. Select an action, such as **Run antivirus scan** or **Initiate Automated Investigation**.
57+
Microsoft Defender Antivirus has one of the following states on devices:
5558

56-
## View the state of Microsoft Defender Antivirus
59+
- **Active mode** (*recommended*): Microsoft Defender Antivirus is the exclusive antivirus app on a device onboarded to Defender for Business. Files are scanned and threats are remediated. Detection information is reported in the Microsoft Defender portal and in the Windows Security app on Windows devices.
60+
61+
We recommend active mode so devices onboarded to Defender for Business get all of the following types of protection:
5762

58-
Microsoft Defender Antivirus is a key component of next-generation protection in Defender for Business. When devices are onboarded to Defender for Business, Microsoft Defender Antivirus can have one of the following states:
63+
- **Real-time protection**: Locates and stops malware from running on devices.
64+
- **Cloud protection**: Works with Microsoft Defender Antivirus and the Microsoft cloud to identify new threats, sometimes even before a single device is affected.
65+
- **Network protection**: Helps protect against phishing scams, exploit-hosting sites, and malicious content on the internet.
66+
- **Web content filtering**: Regulates access to websites based on content categories (such as adult content, high bandwidth, and legal liability) across all browsers.
67+
- **Protection from potentially unwanted applications**: For example:
68+
- Advertising software.
69+
- Bundled software that offers to install other, unsigned software.
70+
- Evasion software that attempts to evade security features.
5971

60-
- Active mode
61-
- Passive mode
62-
- Disabled (or uninstalled) mode
72+
- **Passive mode**: A non-Microsoft antivirus/antimalware product is installed on a device onboarded to Defender for Business. Microsoft Defender Antivirus can detect threats and can receive security intelligence and platform updates. But Microsoft Defender Antivirus doesn't remediate threats.
6373

64-
To view the state of Microsoft Defender Antivirus, you can choose from several options, such as:
74+
You can automatically switch to active mode by uninstalling the non-Microsoft antivirus/antimalware product.
6575

66-
- Reports, like the [Device health report](mdb-reports.md#device-health-report); or
67-
- One of the methods described in [How to confirm the state of Microsoft Defender Antivirus](/defender-endpoint/microsoft-defender-antivirus-compatibility#how-to-confirm-the-state-of-microsoft-defender-antivirus).
76+
- **Disabled mode**: Also known as *uninstalled mode*. A non-Microsoft antivirus/antimalware product is installed on a device that isn't onboarded to Defender for Business. Microsoft Defender Antivirus isn't currently running on the device; it might be automatically disabled or manually disabled. Microsoft Defender Antivirus can't detect or remediate threats on the device.
6877

69-
The following table describes each state and what it means.
78+
You can switch to active mode by doing the following steps:
7079

71-
|Microsoft Defender Antivirus state|What it means|
72-
|---|---|
73-
|**Active mode** <br/>(*recommended*)|Microsoft Defender Antivirus is used as the antivirus app on the machine. Files are scanned, threats are remediated, and detection information is reported in the Microsoft Defender portal and in the Windows Security app on a device running Windows.<br/><br/>We recommend running Microsoft Defender Antivirus in active mode so that devices onboarded to Defender for Business will get all of the following types of protection: <br/>- **Real-time protection**, which locates and stops malware from running on devices. <br/> - **Cloud protection**, which works with Microsoft Defender Antivirus and the Microsoft cloud to identify new threats, sometimes even before a single device is affected.<br/> - **Network protection**, which helps protect against phishing scams, exploit-hosting sites, and malicious content on the internet.<br/> - **Web content filtering**, which regulates access to websites based on content categories (such as adult content, high bandwidth, and legal liability) across all browsers.<br/> - **Protection from potentially unwanted applications**, such as advertising software, bundling software that offers to install other, unsigned software, and evasion software that attempts to evade security features.|
74-
|**Passive mode**|A non-Microsoft antivirus/antimalware product is installed on the device, and even though the device has been onboarded to Defender for Business, Microsoft Defender Antivirus can detect threats but doesn't remediate them. Devices with Microsoft Defender Antivirus can still receive security intelligence and platform updates. <br/><br/>You can switch Microsoft Defender Antivirus to active mode automatically by uninstalling the non-Microsoft antivirus/antimalware product.|
75-
|**Disabled mode**|A non-Microsoft antivirus/antimalware product is installed on the device, and the device hasn't been onboarded to Defender for Business. Whether Microsoft Defender Antivirus went into disabled mode automatically or was set manually, it's not currently running on the device. In this case, Microsoft Defender Antivirus neither detects nor remediates threats on the device.<br/><br/>You can switch Microsoft Defender Antivirus to active mode by uninstalling the non-Microsoft antivirus/antimalware solution and onboarding the device to Defender for Business.|
80+
1. Uninstall the non-Microsoft antivirus/antimalware solution.
81+
2. Onboard the device to Defender for Business.
7682

7783
## Onboard a device
7884

79-
See [Onboard devices to Defender for Business](mdb-onboard-devices.md).
85+
For more information, see [Onboard devices to Defender for Business](mdb-onboard-devices.md).
8086

8187
## Offboard a device
8288

83-
See [Offboarding a device](mdb-offboard-devices.md).
89+
For more information, see [Offboarding a device](mdb-offboard-devices.md).
8490

8591
## Next steps
8692

449 Bytes
Loading

defender-endpoint/api/exposed-apis-odata-samples.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: OData queries with Microsoft Defender for Endpoint
3-
ms.reviewer:
3+
ms.reviewer: yongrhee
44
description: Use these examples of Open Data Protocol (OData) queries to help with data access protocols in Microsoft Defender for Endpoint.
55
ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 03/21/2025
9+
ms.date: 05/20/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -44,7 +44,7 @@ Not all properties are filterable.
4444
## Properties that support $filter
4545

4646
- [Alert](alerts.md): `alertCreationTime`, `lastUpdateTime`, `incidentId`,`InvestigationId`, `status`, `severity`, and `category`.
47-
- [Machine](machine.md): `ComputerDnsName`, `LastSeen`, `HealthStatus`, `OsPlatform`, `onboardingStatus`, `RiskScore`, and `RbacGroupId`.
47+
- [Machine](machine.md): `ComputerDnsName`, `LastSeen`, `exposureLevel`, `HealthStatus`, `OsPlatform`, `onboardingStatus`, `RiskScore`, and `RbacGroupId`.
4848
- [MachineAction](machineaction.md): `Status`, `MachineId`, `Type`, `Requestor`, and `CreationDateTimeUtc`.
4949
- [Indicator](ti-indicator.md): `indicatorValue`, `indicatorType`, `creationTimeDateTimeUtc`, `createdBy`, `severity`, and `action`.
5050

0 commit comments

Comments
 (0)