Skip to content

Commit 8f201a0

Browse files
Merge pull request #4759 from MicrosoftDocs/main
[AutoPublish] main to live - 08/18 01:35 PDT | 08/18 14:05 IST
2 parents 95bd71d + 5315aa1 commit 8f201a0

38 files changed

+100
-48
lines changed

ATPDocs/whats-new.md

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,21 @@ For updates about versions and features released six months ago or earlier, see
2626
## August 2025
2727

2828

29-
## New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
29+
### New Graph based API for response actions (preview)
30+
31+
We’re excited to announce a new Graph-based API for initiating and managing remediation actions in Microsoft Defender for Identity.
32+
33+
This capability is currently in preview and available in API Beta version.
34+
35+
For more information, see [Managing response actions through Graph API](/graph/api/resources/security-identityaccounts?view=graph-rest-beta).
36+
37+
### Identity scoping is now generally available (GA)
38+
39+
Identity scoping is now generally available across all environments. Organizations can now define and refine the scope of MDI monitoring and gain granular control over which entities and resources are included in security analysis.
40+
41+
For more information, see [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
42+
43+
### New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
3044

3145
The new security posture assessment highlights unsecured Active Directory attributes that contain passwords or credential clues and recommends steps to remove them, helping reduce the risk of identity compromise.
3246

@@ -47,11 +61,11 @@ Improved detection logic to include scenarios where accounts were locked during
4761

4862
## July 2025
4963

50-
**Expanded coverage in ITDR deployment health widget**
64+
### Expanded coverage in ITDR deployment health widget
5165

5266
The Identity Threat Detection and Response (ITDR) deployment health widget now provides visibility into the deployment status of additional server types. Previously, it only reflected the status for Active Directory domain controllers. With this update, the widget also includes deployment status for ADFS, ADCS, and Microsoft Entra Connect servers - making it easier to track and ensure full sensor coverage across all supported identity infrastructure.
5367

54-
**Time limit added to Recommended test mode**
68+
### Time limit added to Recommended test mode
5569

5670
Recommended test mode configuration on the [Adjust alert thresholds page](/defender-for-identity/advanced-settings), now requires you to set an expiration time (up to 60 days) when enabling it. The end time is shown next to the toggle while test mode is active. For customers who already have Recommended test mode enabled, a 60-day expiration is automatically applied.
5771

CloudAppSecurityDocs/investigate-anomaly-alerts.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ ms.topic: how-to
88
# How to investigate anomaly detection alerts
99

1010

11-
1211
Microsoft Defender for Cloud Apps provides security detections and alerts for malicious activities. The purpose of this guide is to provide you with general and practical information on each alert, to help with your investigation and remediation tasks. Included in this guide is general information about the conditions for triggering alerts. However, it's important to note that since anomaly detections are nondeterministic by nature, they're only triggered when there's behavior that deviates from the norm. Finally, some alerts might be in preview, so regularly review the official documentation for updated alert status.
1312

1413
> [!IMPORTANT]

CloudAppSecurityDocs/protect-salesforce.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ You can use the following built-in policy templates to detect and notify you abo
5555

5656
| Type | Name |
5757
| ---- | ---- |
58-
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
58+
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user) (Temporarily not supported due to limitation in Salesforce API)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
5959
| Activity policy template | Logon from a risky IP address<br />Mass download by a single user|
6060
| File policy template | Detect a file shared with an unauthorized domain<br />Detect a file shared with personal email addresses|
6161

defender-xdr/configure-deception.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ description: Learn how to create, edit, and delete deception rules in the Micros
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
7-
ms.author: diannegali
8-
author: diannegali
7+
ms.author: painbar
8+
author: paulinbar
99
ms.localizationpriority: medium
10-
manager: dansimp
10+
manager: orspodek
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security
@@ -16,7 +16,7 @@ ms.topic: how-to
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 04/25/2025
19+
ms.date: 08/18/2025
2020
appliesto:
2121
- Microsoft Defender XDR
2222
#customer intent: As a security analyst, I want to learn how to configure the deception capability so that I can protect my organization from high-impact attacks that use human-operated lateral movement.
@@ -26,6 +26,9 @@ appliesto:
2626

2727
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2828

29+
> [!WARNING]
30+
> The deception capability of Microsoft Defender for Endpoint will be retired from public preview starting on August 18, 2025 and ending October 31, 2025.
31+
2932
> [!NOTE]
3033
> The built-in [deception](deception-overview.md) capability in Microsoft Defender XDR covers all Windows clients onboarded to Microsoft Defender for Endpoint. Learn how to onboard clients to Defender for Endpoint in [Onboard to Microsoft Defender for Endpoint](/defender-endpoint/onboarding).
3134

defender-xdr/deception-overview.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ description: Detect human-operated attacks with lateral movement in the early st
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
7-
ms.author: diannegali
8-
author: diannegali
7+
ms.author: painbar
8+
author: paulinbar
99
ms.localizationpriority: medium
10-
manager: deniseb
10+
manager: orspodek
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security
@@ -16,7 +16,7 @@ ms.topic: concept-article
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 04/25/2025
19+
ms.date: 08/18/2025
2020
appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Defender for Endpoint
@@ -27,6 +27,9 @@ appliesto:
2727

2828
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2929

30+
> [!WARNING]
31+
> The deception capability of Microsoft Defender for Endpoint will be retired from public preview starting on August 18, 2025 and ending October 31, 2025.
32+
3033
> [!IMPORTANT]
3134
> Some information in this article relates to prereleased products/services that might be substantially modified before commercially release. Microsoft makes no warranties, express or implied, with respect to the information provided here.
3235

unified-secops-platform/criteria.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: How Microsoft identifies malware and potentially unwanted applications
33
ms.reviewer: andanut, elahehsamani
44
description: Learn how Microsoft reviews software for privacy violations and other negative behavior, to determine if it's malware or a potentially unwanted application.
5-
ms.service: unified-secops-platform
5+
ms.service: microsoft-defender
6+
ms.subservice: unified-security-operations
67
ms.localizationpriority: medium
78
ms.author: dansimp
89
author: dansimp

unified-secops-platform/defender-xdr-portal.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: Microsoft Defender XDR in the Microsoft Defender Portal
33
description: Learn about the services and features available with Microsoft Defender XDR in the Microsoft Defender portal.
44
search.appverid: met150
5-
ms.service: unified-secops-platform
5+
ms.service: microsoft-defender
6+
ms.subservice: unified-security-operations
67
ms.author: bagol
78
author: batamig
89
ms.localizationpriority: medium

unified-secops-platform/detect-threats-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: Threat detection in the Microsoft Defender portal
33
description: Learn about the features that help detect threats in the Microsoft unified security platform
44
search.appverid: met150
5-
ms.service: unified-secops-platform
5+
ms.service: microsoft-defender
6+
ms.subservice: unified-security-operations
67
ms.author: austinmc
78
author: austinmccollum
89
ms.localizationpriority: medium

unified-secops-platform/gov-support.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,8 @@ title: Microsoft Defender Portal Service Support for US Government Customers
33
description: Learn about support in the Microsoft Defender portal for US Government clouds.
44
author: batamig
55
ms.author: bagol
6-
ms.service: unified-secops-platform
6+
ms.service: microsoft-defender
7+
ms.subservice: unified-security-operations
78
ms.topic: concept-article #Don't change.
89
ms.date: 06/22/2025
910
ms.collection:

unified-secops-platform/hunting-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: Threat hunting features across the Microsoft Defender portal
33
description: Learn about threat hunting features across the Microsoft Defender portal
44
search.appverid: met150
5-
ms.service: unified-secops-platform
5+
ms.service: microsoft-defender
6+
ms.subservice: unified-security-operations
67
ms.author: austinmc
78
author: austinmccollum
89
ms.localizationpriority: medium

0 commit comments

Comments
 (0)