Skip to content

Commit 8ffc662

Browse files
authored
Merge branch 'main' into cabailey-defender-newairoles
2 parents bf7b23d + fe2ba5c commit 8ffc662

File tree

350 files changed

+2203
-1149
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

350 files changed

+2203
-1149
lines changed

.github/workflows/TierManagement.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,15 @@ name: Tier management
22

33
permissions:
44
pull-requests: write
5-
contents: read
5+
contents: write
66

77
on:
88
issue_comment:
99
types: [created, edited]
1010

11+
pull_request_target:
12+
types: [opened, reopened]
13+
1114
jobs:
1215

1316
tier-mgmt:

.openpublishing.publish.config.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
"build_output_subfolder": "ATA-Docs",
77
"locale": "en-us",
88
"monikers": [],
9-
"open_to_public_contributors": true,
9+
"open_to_public_contributors": false,
1010
"type_mapping": {
1111
"Conceptual": "Content"
1212
},
@@ -191,6 +191,8 @@
191191
".openpublishing.redirection.defender-cloud-apps.json",
192192
".openpublishing.redirection.defender-endpoint.json",
193193
".openpublishing.redirection.defender-office-365.json",
194-
".openpublishing.redirection.defender-xdr.json"
194+
".openpublishing.redirection.defender-xdr.json",
195+
".openpublishing.redirection.unified-secops.json"
196+
195197
]
196198
}

.openpublishing.redirection.ata-atp.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,17 +17,17 @@
1717
},
1818
{
1919
"source_path": "ATPDocs/deploy/quick-installation-guide.md",
20-
"redirect_url": "deploy/deploy-defender-identity",
20+
"redirect_url": "deploy-defender-identity",
2121
"redirect_document_id": false
2222
},
2323
{
2424
"source_path": "ATPDocs/deploy/prerequisites.md",
25-
"redirect_url": "deploy/prerequisites-sensor-version-2",
25+
"redirect_url": "prerequisites-sensor-version-2",
2626
"redirect_document_id": false
2727
},
2828
{
2929
"source_path": "ATPDocs/deploy/activate-capabilities.md",
30-
"redirect_url": "deploy/activate-sensor",
30+
"redirect_url": "activate-sensor",
3131
"redirect_document_id": false
3232
},
3333
{
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path": "unified-secops-platform/mto-tenantgroups.md",
5+
"redirect_url": "mto-distribution-profiles",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

ATPDocs/advanced-settings.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Adjust alert thresholds | Microsoft Defender for Identity
33
description: Learn how to configure the number of Microsoft Defender for Identity alerts triggered of specific alert types by adjusting alert thresholds.
4-
ms.date: 02/11/2024
4+
ms.date: 08/03/2025
55
ms.topic: how-to
66
#CustomerIntent: As a Microsoft Defender for Identity customer, I want to reduce the number of false positives by adjusting thresholds for specific alerts.
77
ms.reviewer: rlitinsky
@@ -15,7 +15,7 @@ Some Defender for Identity alerts rely on *learning periods* to build a profile
1515

1616
Use the **Adjust alert thresholds** page to customize the threshold level for specific alerts to influence their alert volume. For example, if you're running comprehensive testing, you might want to lower alert thresholds to trigger as many alerts as possible.
1717

18-
Alerts are always triggered immediately if the **Recommended test mode** option is selected, or if a threshold level is set to **Medium** or **Low**, regardless of whether the alert's learning period has already completed.
18+
Alerts are triggered immediately if the **Recommended test mode** option is selected, or if a threshold level is set to **Medium** or **Low**, regardless of whether the alert's learning period has already completed.
1919

2020
> [!NOTE]
2121
> The **Adjust alert thresholds** page was previously named **Advanced settings**. For details about this transition and how any previous settings were retained, see our [What's New announcement](whats-new.md#enhanced-user-experience-for-adjusting-alert-thresholds-preview).
@@ -46,24 +46,27 @@ For example, if you have NAT or VPN, we recommend that you consider any changes
4646
When you select **Medium** or **Low**, details are bolded in the **Information** column to help you understand how the change affects the alert behavior.
4747

4848
1. Select **Apply changes** to save changes.
49+
1. Select **Revert to default** and then **Apply changes** to reset all alerts to the default threshold (**High**). Reverting to default is irreversible and any changes made to your threshold levels are lost.
4950

50-
Select **Revert to default** and then **Apply changes** to reset all alerts to the default threshold (**High**). Reverting to default is irreversible and any changes made to your threshold levels are lost.
51-
52-
## Switch to test mode
51+
## Switch to Recommended test mode
5352

5453
The **Recommended test mode** option is designed to help you understand all Defender for Identity alerts, including some related to legitimate traffic and activities so that you can thoroughly evaluate Defender for Identity as efficiently as possible.
5554

5655
If you recently deployed Defender for Identity and want to test it, select the **Recommended test mode** option to switch all alert thresholds to **Low** and increase the number of alerts triggered.
5756

58-
Threshold levels are read-only when the **Recommended test mode** option is selected. When you're finished testing, toggle the **Recommended test mode** option back off to return to your previous settings.
57+
Threshold levels are read-only when the **Recommended test mode** option is selected.
58+
59+
> [!NOTE]
60+
> Test mode is time-limited to a maximum of 60 days.
61+
> When turning on Recommended test mode, you must specify an end time. The selected end time is displayed next to the toggle for as long as test mode is enabled.
5962
60-
Select **Apply changes** to save changes.
63+
When you're finished testing, toggle the Recommended test mode option back off to return to your previous settings. Select **Apply changes** to save changes.
6164

6265
## Supported detections for threshold configurations
6366

6467
The following table describes the types of detections that support adjustments for threshold levels, including the effects of **Medium** and **Low** thresholds.
6568

66-
Cells marked with N/A indicate that the threshold level is not supported for the detection
69+
Cells marked with N/A indicate that the threshold level isn't supported for the detection.
6770

6871
| Detection | Medium | Low |
6972
| --- | --- | --- |
456 KB
Loading
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
---
2+
title: 'Security Assessment: Remove Discoverable Passwords in Active Directory Account Attributes (Preview)'
3+
description: Learn how to identify and address discoverable passwords in Active Directory account attributes to mitigate security risks and improve your organization's security posture.
4+
ms.date: 08/12/2025
5+
ms.topic: how-to
6+
---
7+
8+
# Security Assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
9+
10+
11+
## Why do discoverable passwords in Active Directory account attributes pose a risk?
12+
13+
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges.
14+
15+
Attackers seek low-friction paths to expand access. Exposed passwords in these attributes represent an easy win because:
16+
17+
- The attributes aren't access-restricted.
18+
19+
- They aren't monitored by default.
20+
21+
- They provide context attackers can exploit for lateral movement and privilege escalation.
22+
23+
Removing exposed credentials from these attributes reduces the risk of identity compromise and strengthens your organization’s security posture.
24+
25+
26+
## How does Microsoft Defender for Identity detect discoverable passwords?
27+
28+
> [!NOTE]
29+
> Findings can include false positives. Always validate the results before taking action.
30+
31+
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse.
32+
This recommendation uses GenAI-powered analysis of Active directory attributes to detect:
33+
34+
- Plaintext passwords or variations. For example, '`Password=Summer2025!'`
35+
36+
- Credential patterns, reset hints, or sensitive account information.
37+
38+
- Other indicators suggesting operational misuse of directory fields.
39+
40+
Detected matches are surfaced in **Secure Score** and the **Security Assessment report** for review and remediation.
41+
42+
43+
## Remediation steps
44+
45+
To address this security assessment, follow these steps:
46+
47+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for Remove discoverable passwords in Active Directory account attributes.
48+
1. Review the exposed entries in the security report. Identify any field content that includes:
49+
50+
- Cleartext passwords
51+
52+
- Reset instructions or credential clues
53+
54+
- Sensitive business or system information
55+
56+
1. Remove sensitive information from the listed attribute fields using standard directory management tools (for example, PowerShell or ADSI Edit).
57+
1. Fully remove the sensitive information. Don’t just mask the value. Partial obfuscation (for example, P@ssw***) can still offer useful clues to attackers.
58+
59+
> [!NOTE]
60+
> Assessments are updated in near real time. Scores and statuses are updated every 24 hours. The list of impacted entities is updated within a few minutes of you implementing the recommendations. The status might take time until it's marked as **Completed**.
61+
62+
## Related articles
63+
64+
- [Learn more about Microsoft Secure Score](/defender-xdr/microsoft-secure-score)
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: 'Security Assessment: Remove Inactive Service Account (Preview)'
3+
description: Learn how to identify and address inactive Active Directory service accounts to mitigate security risks and improve your organization's security posture.
4+
ms.date: 08/17/2025
5+
ms.topic: how-to
6+
#customer intent: As a security administrator, I want to improve security posture in my organization by removing inactive service accounts
7+
---
8+
9+
# Security Assessment: Remove Inactive Service Accounts (Preview)
10+
11+
This recommendation lists Active Directory service accounts detected as inactive (stale) within the past 180 days.
12+
13+
## Why do inactive service accounts pose a risk?
14+
15+
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Dormant service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
16+
17+
This exposure creates several risks:
18+
19+
- Unauthorized access to sensitive applications and data.
20+
21+
- Lateral movement across the network without detection.
22+
23+
24+
## How do I use this security assessment to improve my organizational security posture?
25+
26+
To use this security assessment effectively, follow these steps:
27+
28+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions ) for Remove inactive service account.
29+
1. Review the list of exposed entities to discover which of your service account is inactive.
30+
31+
:::image type="content" source="media/okta-integration/remove-inactive-service-accounts.png" alt-text="Screenshot that shows the recommendation action to remove inactive service accounts." lightbox="media/okta-integration/remove-inactive-service-accounts.png":::
32+
33+
1. Take appropriate actions on those entities by removing the service account. For example:
34+
35+
- **Disable the account:** Prevent any usage by disabling the account identified as exposed.
36+
37+
- **Monitor for impact:** Wait several weeks and monitor for operational issues, such as service disruptions or errors.
38+
39+
- **Delete the account:** If no issues are observed, delete the account and fully remove its access.
40+
41+
> [!NOTE]
42+
> Assessments are updated in near real time, and scores and statuses are updated every 24 hours. The list of impacted entities is updated within a few minutes of your implementing the recommendations. The status might take time until it's marked as **Completed**.
43+
44+
## Related articles
45+
46+
- [Learn more about Microsoft Secure Score](/defender-xdr/microsoft-secure-score)

ATPDocs/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -249,6 +249,10 @@ items:
249249
href: security-assessment-clear-text.md
250250
- name: LAPS usage assessment
251251
href: security-assessment-laps.md
252+
- name: Remove discoverable passwords in Active Directory account attributes
253+
href: remove-discoverable-passwords-active-directory-account-attributes.md
254+
- name: Remove inactive service accounts
255+
href: remove-inactive-service-account.md
252256
- name: Riskiest lateral movement paths
253257
href: security-assessment-riskiest-lmp.md
254258
- name: Unsecure Kerberos delegation assessment

0 commit comments

Comments
 (0)