Skip to content

Commit 94e486f

Browse files
committed
Fix blocking issues
1 parent 28d2b14 commit 94e486f

File tree

2 files changed

+5
-9
lines changed

2 files changed

+5
-9
lines changed

defender-for-identity/advanced-configurations.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.reviewer: rlitinsky
1313
Defender for Identity uses specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
1414
This article describes how to configure the advanced audit policy settings to avoid gaps in the event logs and incomplete Defender for Identity coverage.
1515

16-
Defender for Identity generates health issues when it detects incorrect windows event auditing configurations. For more information, see [Microsoft Defender for Identity health alerts](../health-alerts.md).
16+
Defender for Identity generates health issues when it detects incorrect windows event auditing configurations. For more information, see [Microsoft Defender for Identity health issues](health-alerts.md).
1717

1818
Defender for Identity sensor v3.x supports automatic Windows event auditing on your domain controllers. This feature applies the required Windows event auditing settings to new sensors and fixes misconfigurations on existing ones.
1919

@@ -48,13 +48,9 @@ To turn off automatic windows auditing:
4848
1. In the **General** section, select **Advanced features**.
4949
1. Turn off **Automatic Windows auditing configuration**.​
5050

51+
## See also
5152

52-
53-
- [Event collection with Microsoft Defender for Identity](event-collection-overview.md)
53+
- [Event collection with Microsoft Defender for Identity](deploy/event-collection-overview.md)
5454
- [Windows security auditing](/windows/security/threat-protection/auditing/security-auditing-overview)
5555
- [Advanced security audit policies](/windows/security/threat-protection/auditing/advanced-security-auditing)
5656

57-
## Next step
58-
59-
> [!div class="step-by-step"]
60-
> [What are Defender for Identity roles and permissions?](../role-groups.md)

defender-for-identity/deploy/configure-windows-event-collection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ When a Defender for Identity sensor parses Windows event 8004, Defender for Iden
170170
171171
To configure NTLM auditing:
172172

173-
1. After you configure your initial Advanced Audit Policy settings (In the [Defender portal](#configure-advanced-audit-policy-settings-from-the-ui) or [using PowerShell](#configure-advanced-audit-policy-settings-by-using-powershell)), open **Group Policy Management**. Then go to **Default Domain Controllers Policy** > **Local Policies** > **Security Options**.
173+
1. After you configure your initial Advanced Audit Policy settings in the [Defender portal](#configure-advanced-audit-policy-settings-from-the-ui) or [using PowerShell](#configure-advanced-audit-policy-settings-by-using-powershell), open **Group Policy Management**. Then go to **Default Domain Controllers Policy** > **Local Policies** > **Security Options**.
174174

175175
1. Configure the specified security policies as follows:
176176

@@ -188,7 +188,7 @@ For example, to configure **Outgoing NTLM traffic to remote servers**, under **S
188188

189189
To collect events for object changes, such as for event 4662, you must also configure object auditing on the user, group, computer, and other objects. The following procedure describes how to enable auditing in the Active Directory domain.
190190

191-
Review and audit your policies (in the [Defender portal](#configure-advanced-audit-policy-settings-from-the-ui) or [using PowerShell](#configure-advanced-audit-policy-settings-by-using-powershell)) before you enable event collection, to ensure that the domain controllers are properly configured to record the necessary events. If this auditing is configured properly, it should have a minimal effect on server performance.
191+
To ensure that the domain controllers are properly configured to record the necessary events, review and audit your policies in the [Defender portal](#configure-advanced-audit-policy-settings-from-the-ui) or [using PowerShell](#configure-advanced-audit-policy-settings-by-using-powershell) before you enable event collection. If auditing is configured properly, it has minimal effect on server performance.
192192

193193
To configure domain object auditing:
194194

0 commit comments

Comments
 (0)