Skip to content

Commit 94b7418

Browse files
authored
Merge branch 'main' into patch-5
2 parents 8f02747 + fdd46dd commit 94b7418

File tree

459 files changed

+1336
-1103
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

459 files changed

+1336
-1103
lines changed

.openpublishing.redirection.ata-atp.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1039,6 +1039,11 @@
10391039
"source_path": "ATPDocs/security-assessment-legacy-protocols.md",
10401040
"redirect_url": "/defender-for-identity/security-assessment",
10411041
"redirect_document_id": false
1042-
}
1042+
},
1043+
{
1044+
"source_path": "ATPDocs/manage-security-alerts.md",
1045+
"redirect_url": "/defender-for-identity/understanding-security-alerts",
1046+
"redirect_document_id": false
1047+
},
10431048
]
10441049
}

ATADocs/whats-new-version-1.4.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: What's new in Advanced Threat Analytics version 1.4
55
description: Lists what was new in ATA version 1.4 along with known issues
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: whats-new
88
ms.service: advanced-threat-analytics
99
ms.assetid: cbea47f9-34c1-42b6-ae9e-6a472b49e1a5
1010

ATADocs/whats-new-version-1.5.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: What's new in Advanced Threat Analytics version 1.5
55
description: Lists what was new in ATA version 1.5 along with known issues
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: whats-new
88
ms.service: advanced-threat-analytics
99
ms.assetid: a0d64aff-ca9e-4300-b3f8-eb3c8b8ae045
1010

ATADocs/whats-new-version-1.6.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: What's new in Advanced Threat Analytics version 1.6
55
description: Lists what was new in ATA version 1.6 along with known issues
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: whats-new
88
ms.service: advanced-threat-analytics
99
ms.assetid: 27b139e5-12b9-4953-8f53-eb58e8ce0038
1010

ATADocs/whats-new-version-1.7.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: What's new in ATA version 1.7
55
description: Lists what was new in ATA version 1.7 along with known issues
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: whats-new
88
ms.service: advanced-threat-analytics
99
ms.assetid: be9ee613-4eb3-40f1-8973-e7f0a707ff57
1010

ATADocs/whats-new-version-1.8.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: What's new in ATA version 1.8
55
description: Lists what was new in ATA version 1.8 along with known issues
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: whats-new
88
ms.service: advanced-threat-analytics
99
ms.assetid: 9592d413-df0e-4cec-8e03-be1ae00ba5dc
1010

ATADocs/whats-new-version-1.9.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: What's new in ATA version 1.9
55
description: Lists what was new in ATA version 1.9 along with known issues
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: whats-new
88
ms.service: advanced-threat-analytics
99
ms.assetid: 51de491c-49ba-4aff-aded-cc133a8ccf0b
1010

ATPDocs/alerts-overview.md

Lines changed: 22 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,29 @@
11
---
22
title: Security alerts
33
description: This article provides a list of the security alerts issued by Microsoft Defender for Identity.
4-
ms.date: 03/23/2023
5-
ms.topic: conceptual
6-
ms.reviewer: morRubin
4+
ms.date: 05/08/2025
5+
ms.topic: reference
6+
ms.reviewer: rlitinsky
77
---
88

99
# Security alerts in Microsoft Defender for Identity
1010

11+
## What are Microsoft Defender for Identity security alerts?
12+
13+
Microsoft Defender for Identity security alerts provide information about the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
14+
1115
> [!NOTE]
12-
> The experience described in this page can be accessed at <https://security.microsoft.com> as part of Microsoft Defender XDR.
16+
> Defender for Identity isn't designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
17+
18+
The Identity alerts page gives you cross-domain signal enrichment and automated identity response capabilities. The benefit of investigating alerts with [Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender) is that Microsoft Defender for Identity alerts are correlated with information obtained from each of the other products in the suite. These enhanced alerts are consistent with the other Microsoft Defender XDR alert formats originating from [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security) and [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint).
19+
20+
Alerts originating from Defender for Identity trigger [Microsoft Defender XDR automated investigation and response (AIR)](/microsoft-365/security/defender/m365d-autoir) capabilities, including automatically remediating alerts and the mitigation of tools and processes that can contribute to the suspicious activity.
1321

14-
Microsoft Defender for Identity security alerts explain the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
22+
Microsoft Defender for Identity alerts currently appear in two different layouts in the Microsoft Defender XDR portal. While the alert views may show different information, all alerts are based on detections from Defender for Identity sensors. The differences in layout and information shown are part of an ongoing transition to a unified alerting experience across Microsoft Defender products.
23+
24+
For more information, see [View and manage security alerts](understanding-security-alerts.md).
25+
26+
## Alert categories
1527

1628
Defender for Identity security alerts are divided into the following categories or phases, like the phases seen in a typical cyber-attack kill chain. Learn more about each phase, the alerts designed to detect each attack, and how to use the alerts to help protect your network using the following links:
1729

@@ -21,14 +33,11 @@ Defender for Identity security alerts are divided into the following categories
2133
1. [Lateral movement alerts](lateral-movement-alerts.md)
2234
1. [Other alerts](other-alerts.md)
2335

24-
To learn more about the structure and common components of all Defender for Identity security alerts, see [Understanding security alerts](understanding-security-alerts.md).
2536

26-
## Security alert name mapping and unique external IDs
37+
## Map security alerts to unique external ID and MITRE ATT&CK Matrix tactics
2738

2839
The following table lists the mapping between alert names, their corresponding unique external IDs, their severity, and their MITRE ATT&CK Matrix&trade; tactic. When used with scripts or automation, Microsoft recommends use of alert external IDs in place of alert names, as only security alert external IDs are permanent, and not subject to change.
2940

30-
### External IDs
31-
3241
| Security alert name | Unique external ID | Severity | MITRE ATT&CK Matrix™ |
3342
| ------------------------------------------------------------ | ------------------- | -------------------------------------------------------- | ------------------------------------------------------------ |
3443
| [Suspected SID-History injection](persistence-privilege-escalation-alerts.md#suspected-sid-history-injection-external-id-1106) | 1106 | High | Privilege Escalation |
@@ -56,7 +65,7 @@ The following table lists the mapping between alert names, their corresponding u
5665
| [Suspected Golden Ticket usage (nonexistent account)](persistence-privilege-escalation-alerts.md#suspected-golden-ticket-usage-nonexistent-account-external-id-2027) | 2027 | High | Persistence, Privilege Escalation, Lateral movement |
5766
| [Suspected DCShadow attack (domain controller promotion)](other-alerts.md#suspected-dcshadow-attack-domain-controller-promotion-external-id-2028) | 2028 | High | Defense evasion |
5867
| [Suspected DCShadow attack (domain controller replication request)](other-alerts.md#suspected-dcshadow-attack-domain-controller-replication-request-external-id-2029) | 2029 | High | Defense evasion |
59-
| [Data exfiltration over SMB](other-alerts.md#data-exfiltration-over-smb-external-id-2030) | 2030 | High | Exfiltration, Lateral movement, Command and control |
68+
| [Data exfiltration over SMB](other-alerts.md#data-exfiltration-over-smb-external-id-2030) | 2030 | High | Exfiltration, Lateral movement, Command, and control |
6069
| [Suspicious communication over DNS](other-alerts.md#suspicious-communication-over-dns-external-id-2031) | 2031 | Medium | Exfiltration |
6170
| [Suspected Golden Ticket usage (ticket anomaly)](persistence-privilege-escalation-alerts.md#suspected-golden-ticket-usage-ticket-anomaly-external-id-2032) | 2032 | High | Persistence, Privilege Escalation, Lateral movement |
6271
| [Suspected Brute Force attack (SMB)](lateral-movement-alerts.md#suspected-brute-force-attack-smb-external-id-2033) | 2033 | Medium | Lateral movement |
@@ -101,10 +110,10 @@ The following table lists the mapping between alert names, their corresponding u
101110
|[Group Policy Tampering ](/defender-for-identity/other-alerts)|2440|Medium|Defense evasion|
102111

103112
> [!NOTE]
104-
> To disable any security alert, contact support.
113+
> Contact support to disable security alerts.
105114
106115
## See Also
107116

108-
- [Working with security alerts](/defender-for-identity/manage-security-alerts)
109-
- [Understanding security alerts](understanding-security-alerts.md)
117+
- [View and manage security alerts](understanding-security-alerts.md)
118+
- [Investigate security alerts](/defender-for-identity/investigate-security-alerts)
110119
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)

ATPDocs/automated-response-exclusions.md

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -18,27 +18,30 @@ For example, an incident involving Attack Disruption, where response actions are
1818

1919
## How to add automated response exclusions
2020

21-
1. In [Microsoft Defender XDR](https://security.microsoft.com/), go to **Settings** and then **Identities**.
2221

23-
![Go to Settings, then Identities.](media/settings-identities.png)
22+
1. In the [Microsoft Defender XDR](https://security.microsoft.com/) portal, go to **Settings** and then **Microsoft Defender XDR**.
2423

25-
1. You'll then see **Automated response exclusions** in the left-hand menu.
24+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-settings1.png" alt-text="Go to Settings, then Microsoft Defender XDR.":::
2625

27-
![Automated response exclusions.](media/automated-response-exclusions.png)
26+
27+
2. You'll see **Automated response > Identities** in the left-side menu.
2828

29-
1. To exclude specific users, select **Exclude Users**.
29+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-automated-response.png" alt-text="Go to Automated response then Identities.":::
30+
31+
3. To exclude specific users, select **Add User Exclusion**.
3032

31-
:::image type="content" source="media/exclude-users.png" alt-text="Exclude specific users.":::
32-
33-
1. Search for the users to exclude and select the **Exclude Users** button.
33+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-add-exclusion.png" alt-text="Exclude specific users.":::
34+
35+
4. Search for the users to exclude and select the **Exclude Users** button.
3436

3537
:::image type="content" source="media/exclude-specific-users.png" alt-text="Choose which users to exclude.":::
38+
39+
5. To remove excluded users, select the relevant users from the list and select the **Remove** button.
3640

37-
1. To remove excluded users, select the relevant users from the list and select the **Remove** button.
38-
39-
:::image type="content" source="media/remove-excluded-users.png" alt-text="Remove excluded users.":::
40-
41+
:::image type="content" source="media/remove-excluded-users.png" alt-text="Remove excluded users.":::
42+
4143
## See also
4244

4345
- [Configure event collection](deploy/configure-event-collection.md)
44-
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)
46+
- [Check out the Defender for Identity forum!](https://aka.ms/MDIcommunity)
47+

ATPDocs/cef-format-sa.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,14 +40,14 @@ The cs2 field identifies if the alert is new or updated.
4040
The cs3 field identifies the fully qualified domain name of the source computer name.
4141

4242
> [!NOTE]
43-
> If you plan to create automation or scripts for Defender for Identity SIEM logs, we recommend using the **externalId** field to identify the alert type instead of using the alert name for this purpose. Alert names may occasionally be modified, while the **externalId** of each alert is permanent. For a list of external IDs, see [Security alert name mapping and unique external IDs](alerts-overview.md#security-alert-name-mapping-and-unique-external-ids).
43+
> If you plan to create automation or scripts for Defender for Identity SIEM logs, we recommend using the **externalId** field to identify the alert type instead of using the alert name for this purpose. Alert names may occasionally be modified, while the **externalId** of each alert is permanent. For a list of external IDs, see [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
4444
4545
## Sample logs
4646

4747
The log examples comply with RFC 5424, but Defender for Identity also supports RFC 3164.
4848

4949
>[!NOTE]
50-
>The list below is a sample of logs sent to a SIEM. For a full list of alert details, see [Security alert name mapping and unique external IDs](alerts-overview.md#security-alert-name-mapping-and-unique-external-ids).
50+
>The list below is a sample of logs sent to a SIEM. For a full list of alert details, see [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
5151
5252
Priorities:
5353

@@ -197,7 +197,7 @@ Priorities:
197197

198198
## See Also
199199

200-
- [Security alert name mapping and unique external IDs](alerts-overview.md#security-alert-name-mapping-and-unique-external-ids).
200+
- [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
201201
- [Configure event collection](deploy/configure-event-collection.md)
202202
- [Configuring Windows event forwarding](deploy/configure-event-forwarding.md)
203203
- [Check out the Defender for Identity forum](https://aka.ms/MDIcommunity)

0 commit comments

Comments
 (0)