Skip to content

Commit 93ffb24

Browse files
Merge branch 'main' into repo_sync_working_branch
2 parents b6c4527 + 2df749d commit 93ffb24

File tree

9 files changed

+109
-63
lines changed

9 files changed

+109
-63
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 41 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -37,12 +37,6 @@ Direct Defender for Identity capabilities are supported on domain controllers on
3737
>
3838
> This issue is addressed in the out-of-band update [KB5037422](https://support.microsoft.com/en-gb/topic/march-22-2024-kb5037422-os-build-20348-2342-out-of-band-e8f5bf56-c7cb-4051-bd5c-cc35963b18f3).
3939
40-
### Defender for Endpoint onboarding
41-
42-
Your domain controller must be onboarded to Microsoft Defender for Endpoint.
43-
44-
For more information, see [Onboard a Windows server](/microsoft-365/security/defender-endpoint/onboard-windows-server).
45-
4640
### Permissions requirements
4741

4842
To access the Defender for Identity **Activation** page, you must either be a [Security Administrator](/entra/identity/role-based-access-control/permissions-reference), or have the following Unified RBAC permissions:
@@ -55,12 +49,6 @@ For more information, see:
5549
- [Unified role-based access control RBAC](../role-groups.md#unified-role-based-access-control-rbac)
5650
- [Create a role to access and manage roles and permissions](/microsoft-365/security/defender/create-custom-rbac-roles#create-a-role-to-access-and-manage-roles-and-permissions)
5751

58-
### Connectivity requirements
59-
60-
Defender for Identity capabilities directly on domain controllers use Defender for Endpoint URL endpoints for communication, including simplified URLs.
61-
62-
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).
63-
6452
## Configure Windows auditing
6553

6654
Defender for Identity detections rely on specific Windows Event Log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
@@ -78,42 +66,58 @@ For example, the following command defines all settings for the domain, creates
7866
Set-MDIConfiguration -Mode Domain -Configuration All
7967
```
8068

81-
## Activate Defender for Identity capabilities
69+
## Onboarding steps
70+
71+
### Customers with domain controllers already onboarded to Defender for Endpoint
8272

83-
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
73+
### Activate Defender for Identity capabilities
8474

8575
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
8676

8777
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
8878

89-
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
79+
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the activation of the new Defender for Identity sensor. For each server you can find its activation state.
9080

91-
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
81+
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
9282

9383
:::image type="content" source="media/activate-capabilities/1.jpg" lightbox="media/activate-capabilities/1.jpg" alt-text="Screenshot that shows how to activate the new sensor.":::
9484

9585
> [!NOTE]
9686
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
9787
98-
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
88+
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
9989

10090
:::image type="content" source="media/activate-capabilities/2.jpg" lightbox="media/activate-capabilities/2.jpg" alt-text="Screenshot that shows how to seethe onboarded servers.":::
10191

92+
### Customers without domain controllers onboarded to Defender for Endpoint
93+
94+
### Connectivity requirements
95+
96+
Defender for Identity capabilities directly on domain controllers use Defender for Endpoint URL endpoints for communication, including simplified URLs.
97+
98+
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).
99+
100+
### Onboard Defender for Identity capabilities
101+
Download the Defender for Identity onboarding package from the [Microsoft Defender portal] (https://security.microsoft.com)
102+
103+
1. Navigate to **System** > **Settings** > **Identities** > **Activation**
104+
2. Select Download onboarding package and save the file in a location you can access from your domain controller.
105+
3. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOnboardingScript.cmd` script as an Administrator.
106+
102107
## Onboarding Confirmation
103108

104109
To confirm the sensor has been onboarded:
105110

106-
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
111+
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
107112

108113
2. Check that the onboarded domain controller is listed.
109114

110115
> [!NOTE]
111-
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
116+
> The onboarding doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
117+
> To check the onboarding on the local server you can also review the event log under **Applications and Services Logs** > **Microsoft** > **Windows** > **Sense** > **Operational**. You should receive an onboarding event:
112118
113119
## Test activated capabilities
114120

115-
The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations show within five minutes.
116-
117121
Defender for Identity capabilities on domain controllers currently support the following Defender for Identity functionality:
118122

119123
- Investigation features on the [ITDR dashboard](#check-the-itdr-dashboard), [identity inventory](#confirm-entity-page-details), and [identity advanced hunting data](#test-advanced-hunting-tables)
@@ -163,7 +167,6 @@ IdentityQueryEvents
163167

164168
For more information, see [Advanced hunting in the Microsoft Defender portal](/microsoft-365/security/defender/advanced-hunting-microsoft-defender).
165169

166-
167170
## Test Identity Security Posture Management (ISPM) recommendations
168171

169172
We recommend simulating risky behavior in a test environment to trigger supported assessments and verify that they appear as expected. For example:
@@ -214,17 +217,31 @@ Test remediation actions on a test user. For example:
214217
215218
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
216219
217-
## Deactivate Defender for Identity capabilities on your domain controller
220+
## Offboarding steps
221+
222+
### Customers with domain controllers already onboarded to Defender for Endpoint
223+
224+
### Deactivate Defender for Identity capabilities on your domain controller
218225
219226
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
220227
221-
1. In the Defender portal, select **Settings** > **Identities** > **Sensors**.
228+
1. Navigate to **Settings** > **Identities** > **Sensors**
222229
2. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
223230
224231
:::image type="content" source="media/activate-capabilities/3.jpg" lightbox="media/activate-capabilities/3.jpg" alt-text="Screenshot that shows how to deactivate a server.":::
225232
226233
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
227234
235+
### Customers without domain controllers onboarded to Defender for Endpoint
236+
237+
### Offboard Defender for Identity capabilities on your domain controller
238+
Download the Defender for Identity offboarding package from the [Microsoft Defender portal] (https://security.microsoft.com).
239+
240+
1. Navigate to **Settings** > **Identities** > **Activation**
241+
2. Select Download offboarding package and save the file in a location you can access from your domain controller.
242+
3. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOffboardingScript_valid_until_YYYY-MM-DD.cmd` script as an Administrator.
243+
4. To fully remove the sensor, navigate to **Settings** > **Identities** > **Sensors**, select the server and click Delete.
244+
228245
## Next steps
229246
230247
For more information, see [Manage and update Microsoft Defender for Identity sensors](../sensor-settings.md).

defender-office-365/quarantine-admin-manage-messages-files.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- seo-marvel-apr2020
1919
description: Admins can learn how to view and manage quarantined messages for all users in Exchange Online Protection (EOP). Admins in organizations with Microsoft Defender for Office 365 can also manage quarantined files in SharePoint Online, OneDrive for Business, and Microsoft Teams.
2020
ms.service: defender-office-365
21-
ms.date: 03/26/2025
21+
ms.date: 05/21/2025
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -72,7 +72,9 @@ Watch this short video to learn how to manage quarantined messages as an admin.
7272
- _Use **Block sender** to [add senders to your own Blocked Senders list](#block-email-senders-from-quarantine)_: Admins see **Block sender** only if they filter the quarantine results by **Recipient** \> **Only me** instead of the default value **All users**. Assigning any permission that gives admin access to quarantine (for example, **Security Reader** or **Global Reader**) gives access to **Block sender** in quarantine if the user filters the quarantine results by **Recipient** \> **Only me**.
7373
- _Read-only access to quarantined messages for all users_: Membership in the **Global Reader** or **Security Reader** roles.
7474

75-
> [!TIP]
75+
> [!NOTE]
76+
> Currently, roles assigned through Azure Privileged Identity Management aren't supported in quarantine. For more information about PIM, see [Privileged Identity Management (PIM) and why to use it with Microsoft Defender for Office 365](/defender-office-365/pim-in-mdo-configure).
77+
>
7678
> The ability to manage quarantined messages using [Exchange Online permissions](/exchange/permissions-exo/permissions-exo) ended in February 2023 per MC447339.
7779
>
7880
> Guest admins from other organizations can't manage quarantined messages. The admin needs to be in the same organization as the recipients.

defender-office-365/quarantine-faq.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
ms.author: chrisda
77
author: chrisda
88
manager: deniseb
9-
ms.date: 05/19/2025
9+
ms.date: 05/21/2025
1010
audience: ITPro
1111
ms.topic: faq
1212
ms.localizationpriority: medium
@@ -251,7 +251,9 @@ sections:
251251
answer: |
252252
See the permissions entry [here](quarantine-admin-manage-messages-files.md#what-do-you-need-to-know-before-you-begin).
253253
254-
> [!TIP]
254+
> [!NOTE]
255+
> Currently, roles assigned through Azure Privileged Identity Management aren't supported in quarantine. For more information about PIM, see [Privileged Identity Management (PIM) and why to use it with Microsoft Defender for Office 365](/defender-office-365/pim-in-mdo-configure).
256+
>
255257
> The ability to manage quarantined messages using [Exchange Online permissions](/exchange/permissions-exo/permissions-exo) ended in February 2023 per MC447339.
256258
>
257259
> Guest admins from other organizations can't manage quarantined messages. The admin needs to be in the same organization as the recipients.

unified-secops-platform/TOC.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,10 @@
1616
href: defender-xdr-portal.md
1717
- name: Microsoft Sentinel
1818
items:
19-
- name: Integration overview
20-
href: /azure/sentinel/microsoft-365-defender-sentinel-integration?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json&tabs=defender-portal
2119
- name: Experience in the Defender portal
2220
href: /azure/sentinel/microsoft-sentinel-defender-portal?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
21+
- name: Integration with Defender XDR
22+
href: /azure/sentinel/microsoft-365-defender-sentinel-integration?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json&tabs=defender-portal
2323
- name: Microsoft Copilot
2424
href: /defender-xdr/security-copilot-in-microsoft-365-defender?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
2525
- name: Microsoft Security Exposure Management
@@ -43,9 +43,11 @@
4343
href: overview-deploy.md
4444
- name: Connect Microsoft Sentinel to Microsoft Defender
4545
href: microsoft-sentinel-onboard.md
46+
- name: Transition
47+
href: /azure/sentinel/move-to-defender?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
4648
- name: Reduce security risk
4749
items:
48-
- name: Improve security posture and reduce risk"
50+
- name: Improve security posture and reduce risk
4951
href: reduce-risk-overview.md
5052
- name: Protect your environment with Exposure Management
5153
href: overview-msem-strategy.md

unified-secops-platform/gov-support.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Support for US Government customers
2+
title: Microsoft Unified Security Operations Support for US Government Customers
33
description: Learn about support for Microsoft's unified SecOps platform for US Government clouds.
44
author: batamig
55
ms.author: bagol
@@ -14,9 +14,9 @@ ms.collection:
1414

1515
---
1616

17-
# Microsoft's unified security operations platform for US Government customers
17+
# Microsoft's unified security operations support for US Government customers
1818

19-
This article provides information about Microsoft's unified security operations (SecOps) platform for US Government customers.
19+
This article provides information about Microsoft's unified security operations (SecOps) support for US Government customers.
2020

2121
## Feature availability
2222

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
title: Include file
3+
description: Include file
4+
ms.topic: include
5+
ms.date: 04/22/2025
6+
---
7+
8+
The minimal required permission for an analyst to view Microsoft Sentinel data is to delegate permissions for the Azure RBAC Sentinel Reader role. These permissions are also applied to the unified portal. Without these permissions, the Microsoft Sentinel navigation menu isn't available on the unified portal, despite the analyst having access to the Microsoft Defender portal.
9+
10+
A best practice is to have all Microsoft Sentinel related resources in the same Azure resource group, then delegate Microsoft Sentinel role permissions (like the Sentinel Reader role) at the resource group level that contains the Microsoft Sentinel workspace. By doing this, the role assignment applies to all the resources that support Microsoft Sentinel.

0 commit comments

Comments
 (0)