Skip to content

Commit 8c2868f

Browse files
authored
Merge branch 'main' into docs-editor/remove-unsafe-permissions-sens-1742125118
2 parents ae37897 + 6a5ec94 commit 8c2868f

File tree

255 files changed

+2473
-2293
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

255 files changed

+2473
-2293
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 28 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,8 @@
8282
},
8383
{
8484
"source_path": "defender-endpoint/linux-support-rhel.md",
85-
"redirect_url": "/defender-endpoint/comprehensive-guidance-on-linux-deployment",
86-
"redirect_document_id": true
85+
"redirect_url": "/defender-endpoint/linux-installer-script",
86+
"redirect_document_id": false
8787
},
8888
{
8989
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
@@ -94,6 +94,31 @@
9494
"source_path": "defender-endpoint/monthly-security-summary-report.md",
9595
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
9696
"redirect_document_id": true
97-
}
97+
},
98+
{
99+
"source_path": "defender-endpoint/run-analyzer-macos-linux.md",
100+
"redirect_url": "/defender-endpoint/overview-client-analyzer",
101+
"redirect_document_id": true
102+
},
103+
{
104+
"source_path": "defender-endpoint/download-client-analyzer.md",
105+
"redirect_url": "/defender-endpoint/overview-client-analyzer",
106+
"redirect_document_id": false
107+
},
108+
{
109+
"source_path": "defender-endpoint/schedule-antivirus-scan-in-mde.md",
110+
"redirect_url": "/defender-endpoint/schedule-antivirus-scan-anacron",
111+
"redirect_document_id": true
112+
},
113+
{
114+
"source_path": "defender-endpoint/comprehensive-guidance-on-linux-deployment.md",
115+
"redirect_url": "/defender-endpoint/linux-installer-script",
116+
"redirect_document_id": true
117+
},
118+
{
119+
"source_path": "defender-endpoint/linux-schedule-scan-mde.md",
120+
"redirect_url": "/defender-endpoint/schedule-antivirus-scan-crontab",
121+
"redirect_document_id": true
122+
}
98123
]
99124
}

ATPDocs/manage-security-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88
# Investigate Defender for Identity security alerts in Microsoft Defender XDR
99

1010
> [!NOTE]
11-
> Defender for Identity is not designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
11+
> Defender for Identity isn't designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
1212
1313
This article explains the basics of how to work with Microsoft Defender for Identity security alerts in [Microsoft Defender XDR](/microsoft-365/security/defender/overview-security-center).
1414

@@ -87,7 +87,7 @@ On the right pane, you'll see the **Alert details**. Here you can see more detai
8787
You can also export the alert to an Excel file. To do this, select **Export.**
8888

8989
> [!NOTE]
90-
> In the Excel file, you now have two links available: **View in Microsoft Defender for Identity** and **View in Microsoft Defender XDR**. Each link will bring you to the relevant portal, and provide information about the alert there.
90+
> Alert export option is limited to Microsoft Defender for Identity Alerts with the "aa" prefix, for more information refer to [XDR Alert Sources](https://learn.microsoft.com/defender-xdr/investigate-alerts?tabs=settings#alert-sources).
9191
9292
## Tuning alerts
9393

ATPDocs/remove-rbcd-microsoft-entra-seamless-single-sign-on-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: 'Security assessment: Remove Resource Based Constrained Delegation for Microsoft Entra seamless SSO account'
33
description: This article describes Microsoft Defender for Identity's Microsoft Entra Seamless Single sign-on (SSO) account with Resource Based Constrained Delegation (RBCD) applied security posture assessment report.
44
author: RonitLitinsky
5-
ms.author: t-rlitinsky
5+
ms.author: rlitinsky
66
ms.service: microsoft-defender-for-identity
77
ms.topic: article
88
ms.date: 08/22/2024
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: 'Security assessment: Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account'
3+
description: 'This report lists any Entra Connect AD DS Connector account that is an Enterprise Administrator or Domain Administrator.'
4+
author: LiorShapiraa # GitHub alias
5+
ms.author: Liorshapira # Microsoft alias
6+
# ms.prod: microsoft-defender-for-identity
7+
ms.topic: article
8+
ms.date: 03/16/2025
9+
---
10+
11+
# Security assessment: Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account
12+
13+
This article describes Microsoft Defender for Identity's Microsoft Entra Connect AD DS Connector account default admin security posture assessment report.
14+
15+
> [!NOTE]
16+
> This security assessment will be available only if Microsoft Defender for Identity sensor is installed on servers running Microsoft Entra Connect services.
17+
18+
## Why might using an Enterprise or Domain Admin account for the Microsoft Entra Connect AD DS Connector be a risk?
19+
20+
Smart attackers often target Microsoft Entra Connect in on-premises environments due to the elevated privileges associated with its AD DS Connector account (typically created in Active Directory with the MSOL_ prefix). Using an **Enterprise Admin** or **Domain Admin** account for this purpose significantly increases the attack surface, as these accounts have broad control over the directory.
21+
22+
Starting with [Entra Connect build 1.4.###.#](/entra/identity/hybrid/connect/reference-connect-accounts-permissions), Enterprise Admin and Domain Admin accounts can no longer be used as the AD DS Connector account. This best practice prevents over-privileging the connector account, reducing the risk of domain-wide compromise if the account is targeted by attackers. Organizations must now create or assign a lower-privileged account specifically for directory synchronization, ensuring better adherence to the principle of least privilege and protecting critical admin accounts.
23+
24+
## How do I use this security assessment to improve my hybrid organizational security posture?
25+
26+
1. Review the recommended action at[ https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account.
27+
28+
1. Review the exposed accounts and their group memberships. The list contains members of Domain/Enterprise Admins through direct and recursive membership.
29+
30+
1. Perform one of the following actions:
31+
32+
- Remove MSOL_ user account user from privileged groups, ensuring it retains the necessary permissions to function as the Entra Connect Connector account.
33+
34+
- Change the Entra Connect AD DS Connector account (MSOL_) to a lower-privileged account.
35+
36+
> [!NOTE]
37+
> While assessments are updated in near real time, scores and statuses are updated every 24 hours. While the list of impacted entities is updated within a few minutes of your implementing the recommendations, the status may still take time until it's marked as **Completed**.
38+
39+
## Next steps
40+
41+
- Learn more about [Microsoft Secure score]().
42+
43+
- Learn more about [Defender for Identity Sensor for Microsoft Entra Connect](https://aka.ms/MdiSensorForMicrosoftEntraConnectInstallation)
44+

ATPDocs/security-assessment.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,24 +38,30 @@ Defender for Identity security posture assessments have five key categories. Eac
3838
## Access Defender for Identity security posture assessments
3939

4040
> [!NOTE]
41-
You must have a Defender for Identity license to view Defender for Identity security posture assessments in Microsoft Secure Score.
42-
While *certificate template* assessments are available to all customers with AD CS installed in their environment, *certificate authority* assessments are available only to customers who have installed a sensor on an AD CS server. For more information, see [Configuring sensors for AD FS and AD CS](deploy/active-directory-federation-services.md).
41+
> You must have a Defender for Identity license to view Defender for Identity security posture assessments in Microsoft Secure Score.
42+
>
43+
> Additionally, while *certificate template* assessments are available to all customers with AD CS installed in their environment, *certificate authority* assessments are available only to customers who have installed a sensor on an AD CS server.
44+
>
45+
> Hybrid security recommendations will be available only if Microsoft Defender for Identity sensor is installed on servers running Microsoft Entra Connect services.
46+
>
47+
> For more information, see [Configuring sensors for AD FS, AD CS and Entra Connect.](https://aka.ms/DeployMdiSensorOnYourIdentityInfrastructure)
4348
4449
**To access identity security posture assessments**:
4550

4651
1. Open the [Microsoft Secure Score dashboard](https://security.microsoft.com/securescore).
4752
1. Select the **Recommended actions** tab. You can search for a particular recommended action, or filter the results (for example, by the category **Identity**).
4853

4954
[![Recommended actions.](media/recommended-actions.png)](media/recommended-actions.png#lightbox)
50-
55+
5156
1. For more details, select the assessment.
5257

5358
[![Select the assessment.](media/select-assessment.png)](media/select-assessment.png#lightbox)
54-
59+
5560
[!INCLUDE [secure-score-note](../includes/secure-score-note.md)]
5661

5762

5863
## Next steps
5964

6065
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
61-
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)
66+
- [Check out the Defender for Identity forum!](https://aka.ms/MDIcommunity)
67+

ATPDocs/toc.yml

Lines changed: 22 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -175,6 +175,8 @@ items:
175175
- name: Remove unsafe permissions on sensitive Entra Connect accounts
176176
href: remove-unsafe-permissions-sensitive-entra-connect.md
177177
displayName: MDI
178+
- name: Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account
179+
href: replace-entra-connect-default-admin.md
178180
- name: Identity infrastructure
179181
items:
180182
- name: Built-in Active Directory Guest account is enabled
@@ -191,26 +193,26 @@ items:
191193
href: security-assessment-unsecure-domain-configurations.md
192194
- name: Certificates
193195
items:
194-
- name: Enforce encryption for RPC certificate enrollment interface (ESC8)
195-
href: security-assessment-enforce-encryption-rpc.md
196-
- name: Insecure ADCS certificate enrollment IIS endpoints (ESC8)
197-
href: security-assessment-insecure-adcs-certificate-enrollment.md
198-
- name: Misconfigured certificate templates owner (ESC4)
199-
href: security-assessment-edit-misconfigured-owner.md
200-
- name: Misconfigured Certificate Authority ACL (ESC7)
201-
href: security-assessment-edit-misconfigured-ca-acl.md
202-
- name: Misconfigured certificate templates ACL (ESC4)
203-
href: security-assessment-edit-misconfigured-acl.md
204-
- name: Misconfigured enrollment agent certificate template (ESC3)
205-
href: security-assessment-edit-misconfigured-enrollment-agent.md
206-
- name: Overly permissive certificate template with privileged EKU (ESC2)
207-
href: security-assessment-edit-overly-permissive-template.md
208-
- name: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
209-
href: prevent-certificate-enrollment-esc15.md
210-
- name: Prevent requests for certificates valid for arbitrary users (ESC1)
211-
href: security-assessment-prevent-users-request-certificate.md
212-
- name: Vulnerable Certificate Authority setting (ESC6)
213-
href: security-assessment-edit-vulnerable-ca-setting.md
196+
- name: Enforce encryption for RPC certificate enrollment interface (ESC8)
197+
href: security-assessment-enforce-encryption-rpc.md
198+
- name: Insecure ADCS certificate enrollment IIS endpoints (ESC8)
199+
href: security-assessment-insecure-adcs-certificate-enrollment.md
200+
- name: Misconfigured certificate templates owner (ESC4)
201+
href: security-assessment-edit-misconfigured-owner.md
202+
- name: Misconfigured Certificate Authority ACL (ESC7)
203+
href: security-assessment-edit-misconfigured-ca-acl.md
204+
- name: Misconfigured certificate templates ACL (ESC4)
205+
href: security-assessment-edit-misconfigured-acl.md
206+
- name: Misconfigured enrollment agent certificate template (ESC3)
207+
href: security-assessment-edit-misconfigured-enrollment-agent.md
208+
- name: Overly permissive certificate template with privileged EKU (ESC2)
209+
href: security-assessment-edit-overly-permissive-template.md
210+
- name: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
211+
href: prevent-certificate-enrollment-esc15.md
212+
- name: Prevent requests for certificates valid for arbitrary users (ESC1)
213+
href: security-assessment-prevent-users-request-certificate.md
214+
- name: Vulnerable Certificate Authority setting (ESC6)
215+
href: security-assessment-edit-vulnerable-ca-setting.md
214216
- name: Group policy
215217
items:
216218
- name: GPO assigns unprivileged identities to local groups with elevated privileges

ATPDocs/whats-new.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,17 @@ For updates about versions and features released six months ago or earlier, see
2424

2525
## March 2025
2626

27+
### Enhanced Identity Inventory (Preview)
28+
29+
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment.
30+
The updated Identities Inventory page now includes the following tabs:
31+
32+
- Identities: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.
33+
34+
- Cloud application accounts: Displays a list of cloud application accounts, including those from application connectors and third-party sources (original available in the previous version based on Microsoft Defender for Cloud Apps).
35+
36+
For more information, see [Identity inventory details](/defender-for-identity/identity-inventory).
37+
2738
### New LDAP query events added to the IdentityQueryEvents table in Advanced Hunting
2839
New LDAP query events were added to the `IdentityQueryEvents` table in Advanced Hunting to provide more visibility into additional LDAP search queries running in the customer environment.
2940

CloudAppSecurityDocs/accounts.md

Lines changed: 17 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,23 @@ description: This article provides information about reviewing accounts from you
44
ms.date: 01/29/2023
55
ms.topic: how-to
66
---
7-
# Accounts
7+
# Cloud Application Accounts
88

99

1010

1111
Microsoft Defender for Cloud Apps gives you visibility into the accounts from your connected apps. After you connect Defender for Cloud Apps to an app using the App connector, Defender for Cloud Apps reads account information associated with connected apps. The Accounts page enables you to investigate those accounts, permissions, the groups they're members of, their aliases, and the apps they're using. Additionally, when Defender for Cloud Apps detects a new account that wasn't previously seen in one of the connected apps - for example, in activities or file sharing - the account is added to the accounts list of that app. This enables you to have visibility into the activity of external users interacting with your cloud apps.
1212

13+
## Identity Inventory (Preview)
14+
15+
> [!NOTE]
16+
> The Identities page is in the process of merging into the unified **Identity Inventory (Preview)**.
17+
>
18+
> The **Identity inventory** provides a centralized view of all identities in your organization, enabling you to monitor and manage them efficiently. At a glance, you can see key details such as Domain, Tags, Type, and other attributes, helping you quickly identify and manage identities that require attention.
19+
>
20+
> The functionality of the Identities page, as presented below, will be provided in the new Identity Inventory under the "**Cloud application accounts**" tab, offering the same features as it does today. For more details, visit the [Identity Inventory documentation](/defender-for-identity/identity-inventory).
21+
>
22+
## Identities
23+
1324
Admins can search for a specific user's metadata or user's activity. The **Identities** page provides you with comprehensive details about the entities that are pulled from connected cloud applications. It also provides the user's activity history and security alerts related to the user.
1425

1526
The **Identities** page can be [filtered](#identities-filters) to enable you to find specific accounts and to deep dive into different types of accounts, for example, you can filter for all External accounts that haven't been accessed since last year.
@@ -25,15 +36,15 @@ The **Identities** page enables you to easily investigate your accounts, includi
2536
* You can see which apps are accessed by each account and which apps are deleted for specific accounts
2637

2738
![accounts screen.](media/accounts-page.png)
28-
29-
## Identities filters
39+
40+
### Identities filters
3041

3142
Following is a list of the account filters that can be applied. Most filters support multiple values as well as NOT, in order to provide you with a powerful tool for policy creation.
3243

3344
* **Affiliation**: The affiliation is either **Internal** or **External**. To set which users and accounts are internal, under **Settings** make sure to set the **IP address range** of your internal organization. If the account has admin permissions the icon in the Accounts table appears with the addition of the red tie:
3445

3546
![accounts admin icon.](media/accounts-admin-icon.png)
36-
47+
3748
* **App**: You can filter for any API connected app being used by accounts in your organization.
3849
* **Domain**: This enables you to filter for users in specific domains.
3950
* **Groups**: Enables you to filter for members of user groups in Defender for Cloud Apps - both built-in user groups and imported user groups.
@@ -45,13 +56,13 @@ Following is a list of the account filters that can be applied. Most filters sup
4556
* **Type**: This enables you to filter to either the user or the account type.
4657
* **User name**: Enables you to filter specific users.
4758

48-
## Governance actions
59+
### Governance actions
4960

5061
From the **Users and account** page, you can take governance actions such as suspending an app or going to the account settings page. For a full list of governance actions, see the [governance log](governance-actions.md).
5162

5263
For example, if you identify a user that is compromised, you can apply the **Confirm user compromised** action to set the user risk level to high, causing the relevant policy actions defined in Microsoft Entra ID to be enforced. The action can be applied manually or using relevant [policies that support governance actions](governance-actions.md).
5364

54-
### To manually apply a user or account governance action
65+
#### To manually apply a user or account governance action
5566

5667
From the **Users and account** page, on the row where the relevant user or account appears, choose the three dots at the end of the row, then select **Confirm user compromised**.
5768

CloudAppSecurityDocs/activity-filters-queries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Below is a list of the activity filters that can be applied. Most filters suppor
3535
- Administrative activity – Search only for administrative activities.
3636

3737
>[!NOTE]
38-
> Defender for Cloud Apps can't mark Google Cloud Platform (GCP) administrative activities as administrative activities.
38+
> Defender for Cloud Apps classifies all GCP activities as administrative activities.
3939
4040
- Alert ID - Search by alert ID.
4141

0 commit comments

Comments
 (0)