Skip to content

Commit 952356b

Browse files
authored
Merge branch 'main' into docs-editor/migrate-devices-streamlined-1741343630
2 parents 10b9090 + f60882c commit 952356b

38 files changed

+516
-1069
lines changed

.github/workflows/AutoLabelMsftContributor.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,4 +31,5 @@ jobs:
3131
PayloadJson: ${{ needs.download-payload.outputs.WorkflowPayload }}
3232
secrets:
3333
AccessToken: ${{ secrets.GITHUB_TOKEN }}
34-
TeamReadAccessToken: ${{ secrets.ORG_READTEAMS_TOKEN }}
34+
ClientId: ${{ secrets.M365_APP_CLIENT_ID }}
35+
PrivateKey: ${{ secrets.M365_APP_PRIVATE_KEY }}

.openpublishing.redirection.defender-xdr.json

Lines changed: 46 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,6 +259,51 @@
259259
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
260260
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
261261
"redirect_document_id": false
262-
}
262+
},
263+
{
264+
"source_path": "defender-xdr/first-incident-path-phishing.md",
265+
"redirect_url": "/security/operations/incident-response-playbook-phishing",
266+
"redirect_document_id": false
267+
},
268+
{
269+
"source_path": "defender-xdr/first-incident-path-identity.md",
270+
"redirect_url": "/defender-for-identity/manage-security-alerts",
271+
"redirect_document_id": false
272+
},
273+
{
274+
"source_path": "defender-xdr/incident-response-overview.md",
275+
"redirect_url": "/defender-xdr/incidents-overview",
276+
"redirect_document_id": true
277+
},
278+
{
279+
"source_path": "defender-xdr/respond-first-incident-analyze.md",
280+
"redirect_url": "/defender-xdr/investigate-incidents",
281+
"redirect_document_id": true
282+
},
283+
{
284+
"source_path": "defender-xdr/respond-first-incident-365-defender.md",
285+
"redirect_url": "/defender-xdr/manage-incidents",
286+
"redirect_document_id": true
287+
},
288+
{
289+
"source_path": "defender-xdr/export-incidents-queue.md",
290+
"redirect_url": "/defender-xdr/incident-queue",
291+
"redirect_document_id": true
292+
},
293+
{
294+
"source_path": "defender-xdr/respond-first-incident-remediate.md",
295+
"redirect_url": "/defender-xdr/incidents-overview",
296+
"redirect_document_id": false
297+
},
298+
{
299+
"source_path": "defender-xdr/m365d-time-zone.md",
300+
"redirect_url": "/defender-xdr/m365d-enable-faq",
301+
"redirect_document_id": true
302+
},
303+
{
304+
"source_path": "defender-xdr/feedback.md",
305+
"redirect_url": "/defender-xdr/m365d-enable-faq",
306+
"redirect_document_id": false
307+
},
263308
]
264309
}

ATPDocs/role-groups.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,9 @@ Users that are already [Global Administrators](/entra/identity/role-based-access
1515

1616
For other users, enable and use Microsoft 365 role-based access control (RBAC) to create custom roles and to support more Entra ID roles such as Security operator or Security Reader by default to manage access to Defender for Identity.
1717

18+
> [!IMPORTANT]
19+
>Starting March 2, 2025, new Microsoft Defender for Identity tenants can only configure permissions through Microsoft Defender XDR [Unified Role-Based Access Control (RBAC)](/defender-xdr/manage-rbac). Tenants with roles assigned or exported before this date will retain their current configuration.
20+
1821
When creating your custom roles, make sure that you apply the permissions listed in the following table:
1922

2023
|Defender for Identity access level | Minimum required Microsoft 365 unified RBAC permissions |
@@ -41,15 +44,17 @@ The following table details the specific permissions required for Defender for I
4144
| ------------------- | ---------------------- |
4245
| **Onboard Defender for Identity** (create workspace) | [Security Administrator](/entra/identity/role-based-access-control/permissions-reference) |
4346
| **Configure Defender for Identity settings** | One of the following Microsoft Entra roles:<br>- [Security Administrator](/entra/identity/role-based-access-control/permissions-reference)<br>- [Security Operator](/entra/identity/role-based-access-control/permissions-reference)<br> **Or** <br>The following [Unified RBAC permissions](#unified-role-based-access-control-rbac):<br />- `Authorization and settings/Security settings/Read`<br/>- `Authorization and settings/Security settings/All permissions`<br/>- `Authorization and settings/System settings/Read`<br/>- `Authorization and settings/System settings/All permissions` |
44-
|**View Defender for Identity settings** | One of the following Microsoft Entra roles:<br>- [Global Reader](/entra/identity/role-based-access-control/permissions-reference)<br>- [Security Reader](/entra/identity/role-based-access-control/permissions-reference) <br> **Or** <br>The following [Unified RBAC permissions](#unified-role-based-access-control-rbac):<br />- `Authorization and settings/Security settings/Read` <br/>- `Authorization and settings/System settings/Read`|
47+
|**View Defender for Identity settings** | Microsoft Entra roles:<br>- [Security Reader](/entra/identity/role-based-access-control/permissions-reference) <br> **Or** <br>The following [Unified RBAC permissions](#unified-role-based-access-control-rbac):<br />- `Authorization and settings/Security settings/Read` <br/>- `Authorization and settings/System settings/Read`|
4548
|**Manage Defender for Identity security alerts and activities** | One of the following Microsoft Entra roles:<br>- [Security Operator](/entra/identity/role-based-access-control/permissions-reference)<br> **Or** <br>The following [Unified RBAC permissions](#unified-role-based-access-control-rbac):<br />- `Security operations/Security data/Alerts (Manage)`<br/>- `Security operations/Security data /Security data basics (Read)` |
4649
| **View Defender for Identity security assessments** <br> (now part of Microsoft Secure Score) | [Permissions](/microsoft-365/security/defender/microsoft-secure-score#required-permissions) to access Microsoft Secure Score <br> **And** <br> The following [Unified RBAC permissions](#unified-role-based-access-control-rbac): `Security operations/Security data /Security data basics (Read)`|
4750
|**View the Assets / Identities page**|[Permissions](/defender-cloud-apps/manage-admins) to access Defender for Cloud Apps <br> **Or** <br> One of the Microsoft Entra roles required by [Microsoft Defender XDR](/microsoft-365/security/defender/m365d-permissions) |
4851
|**Perform Defender for Identity response actions** |A [custom role](/microsoft-365/security/defender/create-custom-rbac-roles) defined with permissions for **Response (manage)**<br> **Or** <br> One of the following Microsoft Entra roles:<br>- [Security Operator](/entra/identity/role-based-access-control/permissions-reference) |
4952

50-
5153
## Defender for Identity security groups
5254

55+
> [!IMPORTANT]
56+
> Starting March 2, Defender for Identity will no longer create Microsoft Entra ID security groups. Tenants can still configure the same permissions through Microsoft Defender XDR [Unified Role-Based Access Control (RBAC)](/defender-xdr/manage-rbac)
57+
5358
Defender for Identity provides the following security groups to help manage access to Defender for Identity resources:
5459

5560
- **Azure ATP *(workspace name)* Administrators**

ATPDocs/security-assessment.md

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,13 @@ ms.topic: how-to
99

1010
Typically, organizations of all sizes have limited visibility into whether or not their on-premises apps and services could introduce a security vulnerability to their organization. The problem of limited visibility is especially true regarding use of unsupported or outdated components.
1111

12-
While your company may invest significant time and effort on hardening identities and identity infrastructure (such as Active Directory, Active Directory Connect) as an on-going project, it's easy to remain unaware of common misconfigurations and use of legacy components that represent one of the greatest threat risks to your organization.
12+
While your company might invest significant time and effort on hardening identities and identity infrastructure (such as Active Directory, Active Directory Connect) as an ongoing project, it's easy to remain unaware of common misconfigurations and use of legacy components that represent one of the greatest threat risks to your organization.
1313

1414
Microsoft security research reveals that most identity attacks utilize common misconfigurations in Active Directory and continued use of legacy components (such as NTLMv1 protocol) to compromise identities and successfully breach your organization. To combat this effectively, Microsoft Defender for Identity now offers proactive identity security posture assessments to detect and recommend actions across your on-premises Active Directory configurations.
1515

1616
## What do Defender for Identity security assessments provide?
1717

18-
Defender for Identity's security posture assessments are available in [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score), and provide:
18+
Defender for Identity security posture assessments are available in [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score), and provide:
1919

2020
- **Detections and contextual data** on known exploitable components and misconfigurations, along with relevant paths for remediation.
2121

@@ -25,11 +25,21 @@ Defender for Identity's security posture assessments are available in [Microsoft
2525

2626
Microsoft Secure Score is a measurement of an organization's security posture, with a higher number indicating more recommended actions taken. It can be found at <https://security.microsoft.com/securescore> in the [Microsoft Defender portal](/microsoft-365/security/defender/microsoft-365-defender).
2727

28+
### Categorization of Defender for Identity security posture assessments
29+
30+
Defender for Identity security posture assessments have five key categories. Each category addresses specific identity security risks and provides remediation guidance.
31+
32+
- **Hybrid security**: Identifies misconfigurations in environments that integrate on-premises (e.g., Active Directory) and cloud-based identity providers (e.g., Entra ID, Okta). Assesses risks related to synchronization, authentication, and authorization across platforms.
33+
- **Identity infrastructure**: Detects misconfigurations and vulnerabilities in core identity components, including domain controllers.
34+
- **Certificates**: Assesses Active Directory Certificate Services (AD CS) for security gaps, such as misconfigured certificate templates or weak certificate authority settings. Identifying and addressing these issues helps prevent unauthorized access that could arise from certificate-related vulnerabilities.
35+
- **Group policy**: Analyzes Group Policy configurations to identify settings that might allow privilege escalation or unauthorized lateral movement within the network. Ensuring secure Group Policy settings helps maintain proper access controls and system configurations.
36+
- **Accounts**: Reviews users, devices, and groups to pinpoint security risks such as weak passwords, inactive accounts, or improper permissions.
37+
2838
## Access Defender for Identity security posture assessments
2939

40+
> [!NOTE]
3041
You must have a Defender for Identity license to view Defender for Identity security posture assessments in Microsoft Secure Score.
31-
32-
While *certificate template* assessments are available to all customers that have AD CS installed on their environment, *certificate authority* assessments are available only to customers who've installed a sensor on an AD CS server. For more information, see [Configuring sensors for AD FS and AD CS](deploy/active-directory-federation-services.md).
42+
While *certificate template* assessments are available to all customers with AD CS installed in their environment, *certificate authority* assessments are available only to customers who have installed a sensor on an AD CS server. For more information, see [Configuring sensors for AD FS and AD CS](deploy/active-directory-federation-services.md).
3343

3444
**To access identity security posture assessments**:
3545

0 commit comments

Comments
 (0)