You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/health-alerts.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,6 +39,12 @@ This section describes all the health issues for each component, listing the cau
39
39
40
40
Sensor-specific health issues are displayed in the **Sensor health issues** tab and domain related or aggregated health issues are displayed in the **Global health issues** tab as detailed in the following tables:
41
41
42
+
### Network configuration mismatch for sensors running on VMware
|The virtual machines that the listed Defender for Identity sensors are installed on has a network configuration mismatch. This issue may affect the performance and reliability of the sensors.|Review the network interface settings, including disabling the Large Send Offload (LSO), and follow the instructions in [here](https://aka.ms/mdi/vmware-sensor-issue).|High|Sensors health issues tab|
47
+
42
48
### A domain controller is unreachable by a sensor
Copy file name to clipboardExpand all lines: ATPDocs/notifications.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,18 +19,19 @@ This article describes how to configure Defender for Identity notifications so t
19
19
20
20
## Configure email notifications
21
21
22
-
This section describes how to configure email notifications for Defender for Identity health issues or security alerts.
22
+
This section describes how to configure email notifications for Defender for Identity health issues.
23
23
24
24
1. In [Microsoft Defender XDR](https://security.microsoft.com), select **Settings** > **Identities**.
25
25
26
-
1. Under **Notifications**, select **Health issues notifications** or **Alert notifications** as needed.
26
+
1. Under **Notifications**, select **Health issues notifications**.
27
27
28
28
1. In the **Add recipient email**, enter the email address(es) where you want to receive email notifications, and select **+ Add**.
29
29
30
-
Whenever Defender for Identity detects a health issue or security alert, configured recipients receive an email notification with the details, with a link to Microsoft Defender XDR for more details.
30
+
Whenever Defender for Identity detects a health issue, configured recipients receive an email notification with the details, with a link to Microsoft Defender XDR for more details.
31
31
32
32
> [!NOTE]
33
-
> *Alert notifications* page will be deprecated by January 15, 2025. Please use the '[Email Notifications](https://security.microsoft.com/securitysettings/defender/email_notifications)' page under Defender XDR settings for new and existing notifications rules. [Learn more](https://aka.ms/IncidentsNotificationsDefenderXdr)
33
+
> To receive email notifications about Incidents, please use the [Email Notifications](https://security.microsoft.com/securitysettings/defender/email_notifications) page under Defender XDR Settings for new and existing notifications rules. [Learn more](https://aka.ms/IncidentsNotificationsDefenderXdr).
34
+
34
35
## Configure Syslog notifications
35
36
36
37
This section describes how to configure Defender for Identity to send health issues and security events to a Syslog server through a configured sensor.
@@ -41,13 +42,13 @@ Events aren't sent from the Defender for Identity service to your Syslog server
41
42
42
43
1. In [Microsoft Defender XDR](https://security.microsoft.com), select **Settings** > **Identities**.
43
44
44
-
1. Under **Notifications**, select **Syslog notifications** and then toggle on the **Syslog service** option.
45
+
1. Under **Notifications**, select **Syslog notifications**, and then toggle on the **Syslog service** option.
45
46
46
47
1. Select **Configure service** to open the **Syslog service** pane.
47
48
48
49
1. Enter the following details:
49
50
50
-
-**Sensor**: Select the sensor you want to send notifications to the Syslog server
51
+
-**Sensor**: Select the sensor you want to send notifications to the Syslog server.
51
52
-**Service endpoint** and **Port**: Enter the IP address or fully qualified domain name (FQDN) for the Syslog server, and then enter the port number. You can configure only one Syslog endpoint.
52
53
-**Transport**: Select the **Transport** protocol (TCP or UDP).
53
54
-**Format**: Select the format (RFC 3164 or RFC 5424).
Copy file name to clipboardExpand all lines: ATPDocs/troubleshooting-known-issues.md
+5-7Lines changed: 5 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -224,7 +224,7 @@ Suggested possible workarounds:
224
224
225
225
## VMware virtual machine sensor issue
226
226
227
-
If you have a Defender for Identity sensor on VMware virtual machines, you might receive the health alert**Some network traffic is not being analyzed**. This can happen because of a configuration mismatch in VMware.
227
+
If you have a Defender for Identity sensor on VMware virtual machines, you might receive one or both of the following health alerts**Some network traffic is not being analyzed** and **Network configuratuin mismatch for sensors running on VMware**. This can happen because of a configuration mismatch in VMware.
228
228
229
229
To resolve the issue:
230
230
@@ -273,8 +273,6 @@ The domain controller hasn't been granted permission to retrieve the password of
273
273
274
274
Validate that the computer running the sensor has been granted permissions to retrieve the password of the gMSA account. For more information, see [Grant permissions to retrieve the gMSA account's password](deploy/create-directory-service-account-gmsa.md#prerequisites-grant-permissions-to-retrieve-the-gmsa-accounts-password).
275
275
276
-
277
-
278
276
### Cause 2
279
277
280
278
The sensor service runs as *LocalService* and performs impersonation of the Directory Service account.
@@ -446,16 +444,16 @@ Ensure that the sensor can browse to \*.atp.azure.com directly or through the co
446
444
For more information, see [Run a silent installation with a proxy configuration](install-sensor.md#run-a-silent-installation-with-a-proxy-configuration) and [Install the Microsoft Defender for Identity sensor](deploy/install-sensor.md).
447
445
448
446
> [!IMPORTANT]
449
-
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
447
+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that aren't present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
450
448
>
451
449
452
-
## Sensor service could not run and remains in Starting state
450
+
## Sensor service couldn't run and remains in Starting state
453
451
454
452
The following errors will appear in the **System log** in **Event viewer**:
455
453
456
454
- The Open procedure for service ".NETFramework" in DLL "C:\Windows\system32\mscoree.dll" failed with error code Access is denied. Performance data for this service won't be available.
457
-
- The Open procedure for service "Lsa" in DLL "C:\Windows\System32\Secur32.dll" failed with error code Access is denied. Performance data for this service will not be available.
458
-
- The Open procedure for service "WmiApRpl" in DLL "C:\Windows\system32\wbem\wmiaprpl.dll" failed with error code "The device is not ready". Performance data for this service won't be available.
455
+
- The Open procedure for service "Lsa" in DLL "C:\Windows\System32\Secur32.dll" failed with error code Access is denied. Performance data for this service won't be available.
456
+
- The Open procedure for service "WmiApRpl" in DLL "C:\Windows\system32\wbem\wmiaprpl.dll" failed with error code "The device isn't ready". Performance data for this service won't be available.
459
457
460
458
The Microsoft.TriSensorError.log will contain an error similar to this:
@@ -45,8 +45,7 @@ Isolates a device from accessing external network.
45
45
> - Full isolation is available for all supported Linux devices. See [Microsoft Defender for Endpoint on Linux](/defender-endpoint/microsoft-defender-endpoint-linux).
46
46
> - Selective isolation is available for devices on Windows 10, version 1709 or later, and on Windows 11.
47
47
> - When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
48
-
> - Calling this API on unmanaged devices triggers the [contain device from the network](../respond-machine-alerts.md#contain-devices-from-the-network) action.
49
-
48
+
> - Calling this API on unmanaged devices triggers the [contain device from the network](../respond-machine-alerts.md#contain-devices-from-the-network) action. The IsolationType value should be set to 'UnManagedDevice.'
50
49
51
50
## Permissions
52
51
@@ -59,10 +58,9 @@ Delegated (work or school account)|Machine.Isolate|'Isolate machine'
59
58
60
59
> [!NOTE]
61
60
> When obtaining a token using user credentials:
62
-
>
63
-
> - The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](../user-roles.md) for more information)
64
-
> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
65
-
>
61
+
> - The user needs to have at least the following role permission: 'Active remediation actions.' For more information, see [Create and manage roles](../user-roles.md).
62
+
> - The user needs to have access to the device, based on device group settings. See [Create and manage device groups](../machine-groups.md) for more information.
63
+
>
66
64
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
In the request body, supply a JSON object with the following parameters:
84
82
85
-
Parameter|Type|Description
86
-
:---|:---|:---
87
-
Comment|String|Comment to associate with the action. **Required**.
88
-
IsolationType|String|Type of the isolation. Allowed values are: 'Full' or 'Selective'.
83
+
|Parameter|Type|Description|
84
+
|:---|:---|:---|
85
+
|Comment|String|Comment to associate with the action. **Required**.|
86
+
|IsolationType|String|Type of the isolation. Allowed values are: **Full**, **Selective**, or **UnManagedDevice**.|
89
87
90
88
**IsolationType** controls the type of isolation to perform and can be one of the following:
91
89
92
-
- Full: Full isolation
93
-
- Selective: Restrict only limited set of applications from accessing the network (see [Isolate devices from the network](../respond-machine-alerts.md#isolate-devices-from-the-network) for more details)
90
+
- Full: Full isolation. Works for managed devices.
91
+
- Selective: Restrict only limited set of applications from accessing the network on managed devices. For more information, see [Isolate devices from the network](../respond-machine-alerts.md#isolate-devices-from-the-network).
92
+
- UnManagedDevice: The isolation targets unmanaged devices only.
94
93
95
94
## Response
96
95
@@ -100,7 +99,7 @@ If successful, this method returns 201 - Created response code and [Machine Acti
100
99
101
100
### Request
102
101
103
-
Here is an example of the request.
102
+
Here's an example of the request.
104
103
105
104
```http
106
105
POST https://api.securitycenter.microsoft.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/isolate
Copy file name to clipboardExpand all lines: defender-endpoint/configure-endpoints-vdi.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
- tier2
15
15
ms.custom: admindeeplinkDEFENDER
16
16
ms.topic: conceptual
17
-
ms.date: 03/04/2025
17
+
ms.date: 03/11/2025
18
18
ms.subservice: onboard
19
19
---
20
20
@@ -55,8 +55,8 @@ Defender for Endpoint supports non-persistent VDI session onboarding. There migh
55
55
- In a VDI environment, VDI instances can have short lifespans. VDI devices can appear in the Microsoft Defender portal as either single entries for each VDI instance or multiple entries for each device.
56
56
57
57
- Single entry for each VDI instance. If the VDI instance was already onboarded to Microsoft Defender for Endpoint, and at some point deleted, and then recreated with the same host name, a new object representing this VDI instance is NOT be created in the portal. In this case, the *same* device name must be configured when the session is created, for example using an unattended answer file.
58
-
59
58
- Multiple entries for each device - one for each VDI instance.
59
+
- For all VDI machines, when they onboard for the first time, there's a client delay of approximately 3-4 hours.
60
60
61
61
> [!IMPORTANT]
62
62
> If you're deploying non-persistent VDIs through cloning technology, make sure that your internal template VMs are not onboarded to Defender for Endpoint. This recommendation is to avoid cloned VMs from being onboarded with the same senseGuid as your template VMs, which could prevent VMs from showing up as new entries in the Devices list.
0 commit comments