Skip to content

Commit 8f02747

Browse files
authored
Merge branch 'main' into patch-5
2 parents bd6fede + 86dd020 commit 8f02747

File tree

54 files changed

+187
-123
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

54 files changed

+187
-123
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 44 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,15 @@ ms.topic: how-to
66
ms.reviewer: rlitinsky
77
---
88

9-
# Activate Microsoft Defender for Identity capabilities directly on a domain controller
9+
# Activate Microsoft Defender for Identity capabilities directly on a domain controller (Preview)
1010

11-
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using [Microsoft Defender for Identity classic sensor](deploy-defender-identity.md).
11+
This article describes how to activate and test Microsoft Defender for Identity new sensor capabilities on your domain controller.
1212

13-
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
13+
> [!NOTE]
14+
> The capabilities described in this article are currently available as Preview features. Preview features are features that aren't complete, but are made available on a "preview" basis so customers can get early access and provide feedback.
15+
>
16+
> Preview features are still in development, have limited or restricted functionality and may be available only in selected geographic areas.
17+
> For more information, see the [Microsoft Defender XDR preview features](/defender-xdr/preview)
1418
1519
> [!IMPORTANT]
1620
> The new Defender for Identity sensor (version 3.x) is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](quick-installation-guide.md).
@@ -71,25 +75,27 @@ Set-MDIConfiguration -Mode Domain -Configuration All
7175

7276
### Customers with domain controllers already onboarded to Defender for Endpoint
7377

78+
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using [Microsoft Defender for Identity classic sensor](deploy-defender-identity.md).
79+
7480
### Activate Defender for Identity capabilities
7581

7682
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
7783

7884
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
7985

80-
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the activation of the new Defender for Identity sensor. For each server you can find its activation state.
86+
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the activation of the new Defender for Identity sensor. For each server, you can find its activation state.
8187

82-
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
88+
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
8389

8490
:::image type="content" source="media/activate-capabilities/1.jpg" lightbox="media/activate-capabilities/1.jpg" alt-text="Screenshot that shows how to activate the new sensor.":::
8591

8692
> [!NOTE]
8793
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
8894
89-
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
90-
91-
:::image type="content" source="media/activate-capabilities/2.jpg" lightbox="media/activate-capabilities/2.jpg" alt-text="Screenshot that shows how to seethe onboarded servers.":::
95+
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
9296

97+
:::image type="content" source="media/activate-capabilities/2.jpg" lightbox="media/activate-capabilities/2.jpg" alt-text="Screenshot that shows how to see the onboarded servers.":::
98+
9399
### Customers without domain controllers onboarded to Defender for Endpoint
94100

95101
### Connectivity requirements
@@ -98,26 +104,32 @@ Defender for Identity capabilities directly on domain controllers use Defender f
98104

99105
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).
100106

101-
### Onboard Defender for Identity capabilities
102-
Download the Defender for Identity onboarding package from the [Microsoft Defender portal] (https://security.microsoft.com)
107+
### Onboard Defender for Identity capabilities
108+
109+
Download the Defender for Identity onboarding package from the [Microsoft Defender portal](https://security.microsoft.com)
110+
111+
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
112+
113+
1. Select Download onboarding package and save the file in a location you can access from your domain controller.
114+
115+
:::image type="content" source="media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor.png" alt-text="Screenshot that shows how to onboard the new sensor" lightbox="media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor.png":::
116+
117+
1. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOnboardingScript.cmd` script as an Administrator.
118+
119+
<img width="474" alt="Screenshot that shows the script." src="https://github.com/user-attachments/assets/ff2d73d4-7285-403e-979a-520e05cbf1d1" />
103120

104-
1. Navigate to **System** > **Settings** > **Identities** > **Activation**
105-
2. Select Download onboarding package and save the file in a location you can access from your domain controller.
106-
3. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOnboardingScript.cmd` script as an Administrator.
107-
108121
## Onboarding Confirmation
109122

110123
To confirm the sensor has been onboarded:
111124

112125
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
113126

114-
2. Check that the onboarded domain controller is listed.
127+
1. Check that the onboarded domain controller is listed.
115128

116-
> [!NOTE]
117-
> The onboarding doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
118-
> To check the onboarding on the local server you can also review the event log under **Applications and Services Logs** > **Microsoft** > **Windows** > **Sense** > **Operational**. You should receive an onboarding event:
129+
> [!NOTE]
130+
> The onboarding doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
119131
120-
## Test activated capabilities
132+
**Test activated capabilities**
121133

122134
Defender for Identity capabilities on domain controllers currently support the following Defender for Identity functionality:
123135

@@ -147,7 +159,7 @@ In the Defender portal, check for the following details:
147159

148160
- **Group entities**: Use the global search to find a user group, or pivot from a user or device details page where group details are shown. Check for details of group membership, view group users, and group timeline data.
149161

150-
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
162+
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
151163

152164
For more information, see [Investigate assets](../investigate-assets.md).
153165

@@ -226,22 +238,27 @@ For more information, see [Remediation actions in Microsoft Defender for Identit
226238
227239
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
228240
229-
1. Navigate to **Settings** > **Identities** > **Sensors**
230-
2. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
241+
1. Navigate to **Settings** > **Identities** > **Sensors**.
242+
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
231243
232-
:::image type="content" source="media/activate-capabilities/3.jpg" lightbox="media/activate-capabilities/3.jpg" alt-text="Screenshot that shows how to deactivate a server.":::
244+
![Screenshot that shows how to delete a sensor.](media/activate-capabilities/screenshot-that-shows-how-to-delete-a-sensor.png)
233245
234246
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
235247
236248
### Customers without domain controllers onboarded to Defender for Endpoint
237249
238250
### Offboard Defender for Identity capabilities on your domain controller
239-
Download the Defender for Identity offboarding package from the [Microsoft Defender portal] (https://security.microsoft.com).
251+
Download the Defender for Identity offboarding package from the [Microsoft Defender portal](https://security.microsoft.com).
240252
241253
1. Navigate to **Settings** > **Identities** > **Activation**
242-
2. Select Download offboarding package and save the file in a location you can access from your domain controller.
243-
3. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOffboardingScript_valid_until_YYYY-MM-DD.cmd` script as an Administrator.
244-
4. To fully remove the sensor, navigate to **Settings** > **Identities** > **Sensors**, select the server and click Delete.
254+
255+
1. Select Download offboarding package and save the file in a location you can access from your domain controller.
256+
![Screenshot that shows how to offboard the new sensor.](media/activate-capabilities/screenshot-that-shows-how-to-offboard-the-new-sensor.png)
257+
1. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOffboardingScript_valid_until_YYYY-MM-DD.cmd` script as an Administrator.
258+
1. To fully remove the sensor, navigate to **Settings** > **Identities** > **Sensors**, select the server, and click **Delete**.
259+
260+
:::image type="content" source="media/activate-capabilities/screenshot-that-shows-how-to-delete-a-sensor.png" alt-text="Screenshot that shows how to delete a sensor" lightbox="media/activate-capabilities/screenshot-that-shows-how-to-delete-a-sensor.png":::
261+
245262
246263
## Next steps
247264

ATPDocs/deploy/configure-windows-event-collection.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Configure audit policies for Windows event logs | Microsoft Defender for Identity
33
description: This article describes how to configure audit policies for Windows event logs as part of deploying a Microsoft Defender for Identity sensor.
4-
ms.date: 01/16/2024
4+
ms.date: 06/04/2025
55
ms.topic: how-to
66
ms.reviewer: rlitinsky
77
---
@@ -240,6 +240,7 @@ To configure domain object auditing:
240240
- **Descendant Computer Objects**
241241
- **Descendant msDS-GroupManagedServiceAccount Objects**
242242
- **Descendant msDS-ManagedServiceAccount Objects**
243+
- **Descendant msDS-DelegatedManagedServiceAccount Objects**
243244

244245
> [!NOTE]
245246
> Assigning the auditing permissions on **All descendant objects** would also work, but you need only the object types detailed in the last step.
62.9 KB
Loading
85.5 KB
Loading
85.4 KB
Loading
82.3 KB
Loading
181 KB
Loading

ATPDocs/privacy-compliance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Your data is kept and is available to you while the license is under grace perio
4646

4747
## Data sharing
4848

49-
Defender for Identity shares data, including customer data, among any of the following Microsoft products that are also licensed by the customer:
49+
Defender for Identity shares data, including customer data, among any of the following Microsoft products that are also licensed by the customer. For customers in the Government Community Cloud (GCC), data sharing between government and commercial cloud environments may occur, depending on the location of the service offering.
5050

5151
- Microsoft Defender XDR
5252
- Microsoft Defender for Cloud Apps

ATPDocs/remediation-actions.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,24 @@ The following Defender for Identity actions can be performed directly on your on
3939

4040
- **Reset user password** – This will prompt the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts.
4141

42+
- **Mark User Compromised** - The user’s risk level is set to High
43+
44+
- **Suspend User in Entra ID** - Block new sign-ins and access to cloud resources
45+
46+
- **Require User to Sign In Again** - Revoke a user’s active sessions
47+
4248
Depending on your Microsoft Entra ID roles, you might see additional Microsoft Entra ID actions, such as requiring users to sign in again and confirming a user as compromised. For more information, see [Remediate risks and unblock users](/entra/id-protection/howto-identity-protection-remediate-unblock).
4349

50+
## Roles and Permissions
51+
52+
| Action | XDR RBAC permissions |
53+
| ------------------------------------- | ------------------------------------------------------------ |
54+
|Mark User Compromised | - Global Administrator <br> - Security Administrator|
55+
|Suspend User in Entra ID | - Global Administrator |
56+
|Require User to Sign In Again | - Global Administrator <br>|
57+
| Disable/Enable User in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
58+
| Force Password Reset in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
59+
4460

4561
## Related videos
4662

ATPDocs/whats-new.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,23 @@ For more information, see also:
2323

2424
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2525

26+
## June 2025
27+
28+
### DefenderForIdentity PowerShell module updates (version 1.0.0.4)
29+
30+
New Features and Improvements:
31+
- Added remote domain functionality
32+
- Added SensorType parameter to Test-MDISensorApiConnection to inform endpoint URL.
33+
- Added ability to Get/Set/Test the Deleted Objects container permissions.
34+
- Added auditing for Delegated Managed Service Accounts (dMSA) in the DomainObjectAuditing configuration.
35+
36+
Bug Fixes:
37+
- Fixed audit verification checks for non-English operating systems.
38+
- Fixed DomainObjectAuditing identity redundant parameter bug.
39+
- Fixed Domain Controller detection logic to confirm AD Web Services is running on the server.
40+
- Fixed issue with Test-MDIDSA not parsing Deleted Object permissions.
41+
- Other reliability fixes.
42+
2643
## May 2025
2744

2845
### Expanded New Sensor Deployment Support for Domain Controllers (Preview)

0 commit comments

Comments
 (0)