Skip to content

Commit 8c986ba

Browse files
authored
Merge pull request #3866 from MicrosoftDocs/main
[AutoPublish] main to live - 05/22 04:29 PDT | 05/22 16:59 IST
2 parents 8294cc4 + 5da394e commit 8c986ba

File tree

4 files changed

+26
-3
lines changed

4 files changed

+26
-3
lines changed

ATPDocs/whats-new.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,14 @@ For updates about versions and features released six months ago or earlier, see
2424

2525
## May 2025
2626

27+
### Expanded New Sensor Deployment Support for Domain Controllers (Preview)
28+
Defender for Identity now supports deploying its new sensor on Domain Controllers without requiring Defender for Endpoint onboarding. This simplifies sensor activation and expands deployment flexibility. [Learn more](deploy/activate-capabilities.md).
29+
30+
31+
### Improved Visibility into Defender for Identity New Sensor Eligibility in the Activation page
32+
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify non-eligible servers and take action to update and onboard them for enhanced identity protection.
33+
34+
2735
### Local administrators collection (using SAM-R queries) feature will be disabled
2836
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change will occur automatically by the specified date, and no administrative action is required.
2937

CloudAppSecurityDocs/discovered-apps.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -66,9 +66,9 @@ You also might want to identify specific app instances that are in use by invest
6666
:::image type="content" source="media/discovered-apps/subdomains-image.png" alt-text="Subdomain filter.":::
6767

6868
> [!NOTE]
69-
> Deep dives into discovered apps are supported only only in firewalls and proxies that contain target URL data. For more information, see [Supported firewalls and proxies](set-up-cloud-discovery.md#supported-firewalls-and-proxies).
69+
> Deep dives into discovered apps are supported only in firewalls and proxies that contain target URL data. For more information, see [Supported firewalls and proxies](set-up-cloud-discovery.md#supported-firewalls-and-proxies).
7070
>
71-
> If Defender for Cloud Apps can't match the subdomain detected in the traffic logs with the data stored in the app catalogue, the subdomain is tagged as **Other**.
71+
> If Defender for Cloud Apps can't match the subdomain detected in the traffic logs with the data stored in the app catalog, the subdomain is tagged as **Other**.
7272
7373
## Discover resources and custom apps
7474

@@ -102,6 +102,9 @@ The best way to get an overview of Shadow IT use across your organization is by
102102
1. From the **Cloud discovery** page, select **Actions** > **Generate Cloud Discovery executive report**.
103103

104104
1. Optionally, change the report name, and then select **Generate**.
105+
106+
> [!NOTE]
107+
> The executive summary report is revamped to a 6-pager report with a goal to provide a clear, concise & actionable overview while preserving the depth and integrity of the original analysis.
105108
106109
## Exclude entities
107110

@@ -154,7 +157,7 @@ We recommend deleting cloud discovery data in the following cases:
154157
- If many users or IP addresses recently started working again after being offline for some time, their activity is identified as anomalous and might give you false positive violations.
155158

156159
> [!IMPORTANT]
157-
> Make sure you want to delete data before doing so. This action is irreversbile and deletes **all** cloud discovery data in the system.
160+
> Make sure you want to delete data before doing so. This action is irreversible and deletes **all** cloud discovery data in the system.
158161
>
159162
160163
**To delete cloud discovery data**:
270 KB
Loading

unified-secops-platform/respond-threats-overview.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,18 @@ The following image shows the Microsoft Sentinel **Content hub**, filtered for o
134134

135135
To create and manage these playbooks, specific roles and permissions are required, and extra charges may apply for the usage of Azure Logic Apps. For more information, see [Automate threat response with playbooks in Microsoft Sentinel](/azure/sentinel/automation/automate-responses-with-playbooks).
136136

137+
### SOC optimizations
138+
139+
Security operations center (SOC) teams look for ways to improve processes and outcomes and ensure you have the data needed to address risks without extra ingestion costs. SOC teams want to make sure that you have all the necessary data to act against risks, without paying for more data than needed. At the same time, SOC teams must also adjust security controls as threats and business priorities change, doing so quickly and efficiently to maximize your return on investment.
140+
141+
SOC optimizations are actionable recommendations that surface ways that you can optimize your security controls, gaining more value from Microsoft security services as time goes on. Recommendations help you reduce costs without affecting SOC needs or coverage, and can help you add security controls and data where needed. These optimizations are tailored to your environment and based on your current coverage and threat landscape.
142+
143+
Use SOC optimization recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. SOC optimizations help you optimize your Microsoft Sentinel workspace, without having your SOC teams spend time on manual analysis and research.
144+
145+
:::image type="content" source="media/respond-threats-overview/soc-optimizations.png" alt-text="Screenshot of Microsoft Sentinel SOC optimization recommendations.":::
146+
147+
For more information, see [Microsoft Sentinel SOC optimizations](/azure/sentinel/soc-optimization/soc-optimization-access?tabs=defender-portal).
148+
137149
## Microsoft Security Exposure Management for potential threat response
138150

139151
[Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) enables organizations to identify and mitigate potential attack paths before they can be exploited. Microsoft Security Exposure Management treats attack paths like incidents, providing a proactive approach to managing vulnerabilities and misconfigurations, and aiding in responses to in-progress attacks.

0 commit comments

Comments
 (0)