You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+17-3Lines changed: 17 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,21 @@ For updates about versions and features released six months ago or earlier, see
26
26
## August 2025
27
27
28
28
29
-
## New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
29
+
### New Graph based API for response actions (preview)
30
+
31
+
We’re excited to announce a new Graph-based API for initiating and managing remediation actions in Microsoft Defender for Identity.
32
+
33
+
This capability is currently in preview and available in API Beta version.
34
+
35
+
For more information, see [Managing response actions through Graph API](/graph/api/resources/security-identityaccounts?view=graph-rest-beta).
36
+
37
+
### Identity scoping is now generally available (GA)
38
+
39
+
Identity scoping is now generally available across all environments. Organizations can now define and refine the scope of MDI monitoring and gain granular control over which entities and resources are included in security analysis.
40
+
41
+
For more information, see [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
42
+
43
+
### New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
30
44
31
45
The new security posture assessment highlights unsecured Active Directory attributes that contain passwords or credential clues and recommends steps to remove them, helping reduce the risk of identity compromise.
32
46
@@ -47,11 +61,11 @@ Improved detection logic to include scenarios where accounts were locked during
47
61
48
62
## July 2025
49
63
50
-
**Expanded coverage in ITDR deployment health widget**
64
+
### Expanded coverage in ITDR deployment health widget
51
65
52
66
The Identity Threat Detection and Response (ITDR) deployment health widget now provides visibility into the deployment status of additional server types. Previously, it only reflected the status for Active Directory domain controllers. With this update, the widget also includes deployment status for ADFS, ADCS, and Microsoft Entra Connect servers - making it easier to track and ensure full sensor coverage across all supported identity infrastructure.
53
67
54
-
**Time limit added to Recommended test mode**
68
+
### Time limit added to Recommended test mode
55
69
56
70
Recommended test mode configuration on the [Adjust alert thresholds page](/defender-for-identity/advanced-settings), now requires you to set an expiration time (up to 60 days) when enabling it. The end time is shown next to the toggle while test mode is active. For customers who already have Recommended test mode enabled, a 60-day expiration is automatically applied.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/investigate-anomaly-alerts.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,6 @@ ms.topic: how-to
8
8
# How to investigate anomaly detection alerts
9
9
10
10
11
-
12
11
Microsoft Defender for Cloud Apps provides security detections and alerts for malicious activities. The purpose of this guide is to provide you with general and practical information on each alert, to help with your investigation and remediation tasks. Included in this guide is general information about the conditions for triggering alerts. However, it's important to note that since anomaly detections are nondeterministic by nature, they're only triggered when there's behavior that deviates from the norm. Finally, some alerts might be in preview, so regularly review the official documentation for updated alert status.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-salesforce.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ You can use the following built-in policy templates to detect and notify you abo
55
55
56
56
| Type | Name |
57
57
| ---- | ---- |
58
-
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
58
+
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user) (Temporarily not supported due to limitation in Salesforce API)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
59
59
| Activity policy template | Logon from a risky IP address<br />Mass download by a single user|
60
60
| File policy template | Detect a file shared with an unauthorized domain<br />Detect a file shared with personal email addresses|
Copy file name to clipboardExpand all lines: defender-xdr/configure-deception.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,10 +4,10 @@ description: Learn how to create, edit, and delete deception rules in the Micros
4
4
ms.service: defender-xdr
5
5
f1.keywords:
6
6
- NOCSH
7
-
ms.author: diannegali
8
-
author: diannegali
7
+
ms.author: painbar
8
+
author: paulinbar
9
9
ms.localizationpriority: medium
10
-
manager: dansimp
10
+
manager: orspodek
11
11
audience: ITPro
12
12
ms.collection:
13
13
- m365-security
@@ -16,7 +16,7 @@ ms.topic: how-to
16
16
search.appverid:
17
17
- MOE150
18
18
- MET150
19
-
ms.date: 04/25/2025
19
+
ms.date: 08/18/2025
20
20
appliesto:
21
21
- Microsoft Defender XDR
22
22
#customer intent: As a security analyst, I want to learn how to configure the deception capability so that I can protect my organization from high-impact attacks that use human-operated lateral movement.
> The deception capability of Microsoft Defender for Endpoint will be retired from public preview starting on August 18, 2025 and ending October 31, 2025.
31
+
29
32
> [!NOTE]
30
33
> The built-in [deception](deception-overview.md) capability in Microsoft Defender XDR covers all Windows clients onboarded to Microsoft Defender for Endpoint. Learn how to onboard clients to Defender for Endpoint in [Onboard to Microsoft Defender for Endpoint](/defender-endpoint/onboarding).
> The deception capability of Microsoft Defender for Endpoint will be retired from public preview starting on August 18, 2025 and ending October 31, 2025.
32
+
30
33
> [!IMPORTANT]
31
34
> Some information in this article relates to prereleased products/services that might be substantially modified before commercially release. Microsoft makes no warranties, express or implied, with respect to the information provided here.
Copy file name to clipboardExpand all lines: unified-secops-platform/criteria.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,8 @@
2
2
title: How Microsoft identifies malware and potentially unwanted applications
3
3
ms.reviewer: andanut, elahehsamani
4
4
description: Learn how Microsoft reviews software for privacy violations and other negative behavior, to determine if it's malware or a potentially unwanted application.
0 commit comments