You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/change-password-krbtgt-account.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,9 @@ If the KRBTGT account's password is compromised, an attacker can use its hash to
29
29
1. Take appropriate action on those accounts by resetting their password **twice** to invalidate the Golden Ticket attack.
30
30
31
31
> [!NOTE]
32
-
> The krbtgt Kerberos account in all Active Directory domains supports key storage in all Kerberos Key Distribution Centers (KDC). To renew the Kerberos keys for TGT encryption, periodically change the krbtgt account password. It is recommended to use the [Microsoft-provided script.](https://github.com/microsoft/New-KrbtgtKeys.ps1)
32
+
> The krbtgt Kerberos account in all Active Directory domains supports key storage in all Kerberos Key Distribution Centers (KDC). To renew the Kerberos keys for TGT encryption, periodically change the krbtgt account password. It is recommended to use the [Microsoft-provided script.](https://github.com/microsoft/New-KrbtgtKeys.ps1)
33
+
> When resetting the password twice, wait at least 10 hours between resets to avoid Kerberos authentication issues. This wait time is enforced by the script and aligns with best practices.
34
+
33
35
### Next steps
34
36
35
37
[Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
Copy file name to clipboardExpand all lines: ATPDocs/deploy/configure-windows-event-collection.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ Use the following procedures to configure auditing on the domain controllers tha
59
59
60
60
This procedure describes how to modify your domain controller's Advanced Audit Policy settings as needed for Defender for Identity via the UI.
61
61
62
-
**Related health issue:**[Directory Services Advanced Auditing is not enabled as required](../health-alerts.md)
62
+
**Related health issue:**[Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
63
63
64
64
To configure your Advanced Audit Policy settings:
65
65
@@ -100,7 +100,7 @@ To configure your Advanced Audit Policy settings:
100
100
101
101
1. From an elevated command prompt, enter `gpupdate`.
102
102
103
-
1. After you apply the policy via GPO, conform that the new events appear in the Event Viewer, under **Windows Logs** > **Security**.
103
+
1. After you apply the policy via GPO, confirm that the new events appear in the Event Viewer, under **Windows Logs** > **Security**.
104
104
105
105
To test your audit policies from the command line, run the following command:
106
106
@@ -114,7 +114,7 @@ For more information, see the [auditpol reference documentation](/windows-server
114
114
115
115
The following actions describe how to modify your domain controller's Advanced Audit Policy settings as needed for Defender for Identity by using PowerShell.
116
116
117
-
**Related health issue:** [Directory Services Advanced Auditing is not enabled as required](../health-alerts.md)
117
+
**Related health issue:** [Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
118
118
119
119
To configure your settings, run:
120
120
@@ -167,7 +167,7 @@ This section describes the extra configuration steps that you need for auditing
167
167
> - Domain group policies to collect Windows event 8004 should be applied *only* to domain controllers.
168
168
> - When a Defender for Identity sensor parses Windows event 8004, Defender for Identity NTLM authentication activities are enriched with the server-accessed data.
169
169
170
-
**Related health issue:**[NTLM Auditing is not enabled](../health-alerts.md)
170
+
**Related health issue:**[NTLM Auditing isn't enabled](../health-alerts.md)
171
171
172
172
To configure NTLM auditing:
173
173
@@ -192,7 +192,7 @@ To collect events for object changes, such as for event 4662, you must also conf
192
192
> [!IMPORTANT]
193
193
> Review and audit your policies (via the [UI](#configure-advanced-audit-policy-settings-from-the-ui) or [PowerShell](#configure-advanced-audit-policy-settings-by-using-powershell)) before you enable event collection, to ensure that the domain controllers are properly configured to record the necessary events. If this auditing is configured properly, it should have a minimal effect on server performance.
194
194
195
-
**Related health issue:**[Directory Services Object Auditing is not enabled as required](../health-alerts.md)
195
+
**Related health issue:**[Directory Services Object Auditing isn't enabled as required](../health-alerts.md)
196
196
197
197
To configure domain object auditing:
198
198
@@ -233,7 +233,7 @@ To configure domain object auditing:
233
233
234
234

235
235
236
-
Now, all relevant changes to directory services appear as 4662 events when they're triggered.
236
+
Now, all relevant changes to directory services appear as 4,662 events when they're triggered.
237
237
238
238
1. Repeat the steps in this procedure, but for **Applies to**, select the following object types <sup>1</sup>
239
239
-**Descendant Group Objects**
@@ -368,7 +368,7 @@ To configure auditing on Microsoft Entra Connect servers:
368
368
369
369
## Update legacy configurations
370
370
371
-
Defender for Identity no longer requires logging 1644 events. If you have either of the following settings enabled, you can remove them from the registry.
371
+
Defender for Identity no longer requires logging 1,644 events. If you have either of the following settings enabled, you can remove them from the registry.
Copy file name to clipboardExpand all lines: ATPDocs/remove-inactive-service-account.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,13 +6,13 @@ ms.topic: how-to
6
6
#customer intent: As a security administrator, I want to improve security posture in my organization by removing inactive service accounts
7
7
---
8
8
9
-
# Security Assessment: Remove Inactive Service Accounts (Preview)
9
+
# Security Assessment: Remove Stale Service Accounts (Preview)
10
10
11
-
This recommendation lists Active Directory service accounts detected as inactive (stale) within the past 180 days.
11
+
This recommendation lists Active Directory service accounts detected as stale within the past 90 days.
12
12
13
-
## Why do inactive service accounts pose a risk?
13
+
## Why do stale service accounts pose a risk?
14
14
15
-
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Dormant service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
15
+
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Stale service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
16
16
17
17
This exposure creates several risks:
18
18
@@ -25,10 +25,9 @@ This exposure creates several risks:
25
25
26
26
To use this security assessment effectively, follow these steps:
27
27
28
-
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions ) for Remove inactive service account.
29
-
1. Review the list of exposed entities to discover which of your service account is inactive.
28
+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions) for Remove stale service account.
30
29
31
-
:::image type="content" source="media/okta-integration/remove-inactive-service-accounts.png" alt-text="Screenshot that shows the recommendation action to remove inactive service accounts." lightbox="media/okta-integration/remove-inactive-service-accounts.png":::
30
+
1. Review the list of exposed entities to discover which of your serviceaccounts are stale and have not performed any login activity in the last 90 days.
32
31
33
32
1. Take appropriate actions on those entities by removing the service account. For example:
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+39-8Lines changed: 39 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,28 +25,59 @@ For updates about versions and features released six months ago or earlier, see
25
25
26
26
## September 2025
27
27
28
+
### Microsoft Defender for Identity sensor version updates
29
+
30
+
|Version number |Updates |
31
+
|---------|---------|
32
+
|2.248|The improved event log query method now captures a broader range of unique events at scale. As a result, you might notice an increase in captured activities. This update also delivers additional security enhancements and performance improvements.|
33
+
34
+
### Updates to multiple detections to reduce noise and improve alert accuracy
35
+
36
+
Several Defender for Identity detections are being updated to reduce noise and improve accuracy, making alerts more reliable and actionable. As the rollout continues, you might see a decrease in the number of alerts raised.
37
+
38
+
The improvements will gradually take effect across the following detections:
- Suspicious modification of Resource Based Constrained Delegation by a machine account
55
+
56
+
- Remote code execution attempt
57
+
58
+
28
59
### Unified connectors is now available for Okta Single Sign-On connectors (Preview)
29
60
30
61
Microsoft Defender for Identity supports the [Unified connectors](/azure/sentinel/unified-connector) experience, starting with the Okta Single Sign-On connector. This enables Defender for Identity to collect Okta system logs once and share them across supported Microsoft security products, reducing API usage and improving connector efficiency.
31
62
32
-
For more information see: [Connect Okta to Microsoft Defender for Identity (Preview)](okta-integration.md)
63
+
For more information, see: [Connect Okta to Microsoft Defender for Identity (Preview)](okta-integration.md)
33
64
34
65
35
66
## August 2025
36
67
37
68
### Microsoft Entra ID risk level is now available in near real time in Microsoft Defender for Identity (Preview)
38
69
39
-
Entra ID risk level is now available on the Identity Inventory assets page, the identity details page, and in the IdentityInfo table in Advanced Hunting, and includes the Entra ID risk score. SOC analysts can use this data to correlate risky users with sensitive or highly privileged users, create custom detections based on current or historical user risk, and improve investigation context.
70
+
Microsoft Entra ID risk level is now available on the Identity Inventory assets page, the identity details page, and in the IdentityInfo table in Advanced Hunting, and includes the Microsoft Entra ID risk score. SOC analysts can use this data to correlate risky users with sensitive or highly privileged users, create custom detections based on current or historical user risk, and improve investigation context.
40
71
41
-
Previously, Defender for Identity tenants received Entra ID risk level in the IdentityInfo table through user and entity behavior analytics (UEBA). With this update, the Entra ID risk level is now updated in near real time through Microsoft Defender for Identity.
72
+
Previously, Defender for Identity tenants received Microsoft Entra ID risk level in the IdentityInfo table through user and entity behavior analytics (UEBA). With this update, the Microsoft Entra ID risk level is now updated in near real time through Microsoft Defender for Identity.
42
73
43
-
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Entra ID risk level to the IdentityInfo table remains unchanged.
74
+
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Microsoft Entra ID risk level to the IdentityInfo table remains unchanged.
44
75
45
-
### New security assessment: Remove inactive service accounts (Preview)
76
+
### New security assessment: Remove stale service accounts (Preview)
46
77
47
-
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been inactive (stale) for the past 180 days, to help you mitigate security risks associated with unused accounts.
78
+
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been stale for the past 90 days, to help you mitigate security risks associated with unused accounts.
48
79
49
-
For more information, see: [Security Assessment: Remove Inactive Service Accounts (Preview)](remove-inactive-service-account.md)
80
+
For more information, see: Security Assessment: [Remove Stale Service Accounts (Preview)](/defender-for-identity/remove-inactive-service-account)
50
81
51
82
### New Graph based API for response actions (preview)
52
83
@@ -478,7 +509,7 @@ Defender for Identity added the new **Edit insecure ADCS certificate enrollment
478
509
479
510
Active Directory Certificate Services (AD CS) supports certificate enrollment through various methods and protocols, including enrollment via HTTP using the Certificate Enrollment Service (CES) or the Web Enrollment interface (Certsrv). Insecure configurations of the CES or Certsrv IIS endpoints might create vulnerabilities to relay attacks (ESC8).
480
511
481
-
The new **Edit insecure ADCS certificate enrollment IIS endpoints (ESC8)** recommendation is added to other AD CS-related recommendations recently released. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that post risks to the entire organization, together with related detections.
512
+
The new **Edit insecure ADCS certificate enrollment IIS endpoints (ESC8)** recommendation is added to other AD CS-related recommendations recently released. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that pose risks to the entire organization, together with related detections.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/app-governance-app-policies-get-started.md
+11-9Lines changed: 11 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,9 @@
1
1
---
2
2
title: Get started with app governance policies | Microsoft Defender for Cloud Apps
3
-
ms.date: 05/28/2023
3
+
ms.date: 08/31/2025
4
4
ms.topic: how-to
5
5
description: Get started learning about app governance policies with Microsoft Defender for Cloud Apps in Microsoft Defender XDR
6
+
ms.reviewer: shragar456
6
7
---
7
8
8
9
# Get started with app policies
@@ -23,22 +24,21 @@ To see your list of current app policies, go to the **Microsoft Defender XDR > A
23
24
24
25
For example:
25
26
26
-

27
+
:::image type="content" source="media/app-governance-app-policies-get-started/app-governance-app-policies.png" alt-text="Screenshot that shows the app governance app polcies." lightbox="media/app-governance-app-policies-get-started/app-governance-app-policies.png":::
27
28
28
29
> [!NOTE]
29
30
> Built-in threat detection policies aren't listed on the **Policies** tab. For more information, see [Investigate threat detection alerts](app-governance-anomaly-detection-alerts.md).
30
31
>
31
32
32
33
## What’s available on the app policies dashboard
33
34
34
-
The **App governance** > **Policies** tab shows the number of active, inactive, and audit mode policies, and the following information for each policy:
35
+
The **App governance** > **Policies** tab shows the number of activeand disabled policies, and the following information for each policy:
35
36
36
37
-**Policy name**
37
38
-**Status**
38
39
39
40
-**Active**: All policy evaluation and actions are active.
40
-
-**Inactive**: All policy evaluation and actions are disabled.
41
-
-**Audit mode**: Policy evaluation is active (alerts will trigger) but policy actions are disabled.
41
+
-**Disabled**: All policy evaluation and actions are disabled.
42
42
43
43
-**Severity**: Severity level set on any alerts triggered because of this policy being evaluated as true, which is part of the configuration of the policy.
44
44
-**Active alerts**: Number of alerts generated by the policy that have an **In Progress** or **New** status.
@@ -74,22 +74,24 @@ You can also:
74
74
75
75
1. Select **Edit**.
76
76
77
-
While you can't change the name of the policy once created, but you can change the description and policy severity as needed. When you're done, select **Next**.
77
+
While you can't change the name of the policy once created, you can change the description and policy severity as needed. When you're done, select **Next**.
78
78
79
79
1. Choose whether you want to continue with the existing policy settings or customize them. Select **No, I'll customize the policy** to make changes, and then select **Next**.
80
80
81
-
1. Choose whether this policy applies to all apps, specific apps, or all apps except the apps you select. Select **Choose apps** to select which apps to apply the policy to, and then select **Next**.
81
+
1. Choose whether this policy applies to all apps, specific apps, or all apps except the apps you select.
82
+
83
+
1. Select **Choose apps** to select which apps to apply the policy to, and then select **Next**.
82
84
83
85
1. Choose whether to modify the existing conditions of the policy.
84
86
85
87
- If you choose to modify the conditions, select **Edit or modify existing conditions for the policy** and choose which policy conditions to apply.
86
88
- Otherwise, select **Use existing conditions of the policy**.
87
89
88
-
When you're done, select **Next**.
90
+
1. When you're done, select **Next**.
89
91
90
92
1. Choose whether to disable the app if it triggers the policy conditions and then select **Next**.
91
93
92
-
1. Set the policy status to **Audit** mode, **Active**, or **Inactive**, as needed, and then select **Next**.
94
+
1. Set the policy status to **Active**, or **Disabled**, as needed, and then select **Next**.
93
95
94
96
1. Review your setting choices for the policy and if everything is the way you want it, select **Submit**.
0 commit comments