Skip to content

Commit 995e1ec

Browse files
authored
Merge branch 'main' into mde-toc-update
2 parents 00f7dcb + 19ba711 commit 995e1ec

File tree

4 files changed

+18
-6
lines changed

4 files changed

+18
-6
lines changed

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,10 @@ ms.topic: how-to
77

88
# Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity
99

10+
> [!IMPORTANT]
11+
> Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025.
12+
>
13+
1014
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
1115

1216
> [!NOTE]

ATPDocs/whats-new.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,9 @@ For updates about versions and features released six months ago or earlier, see
2424

2525
## May 2025
2626

27+
### Local administrators collection (using SAM-R queries) feature will be disabled
28+
Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. The details collected are used to build the potential lateral movement paths map. Alternative methods are currently being explored.
29+
2730
### New Health Issue
2831

2932
New [health issue](health-alerts.md#network-configuration-mismatch-for-sensors-running-on-vmware) for cases where sensors running on VMware have network configuration mismatch.

defender-endpoint/data-storage-privacy.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Microsoft Defender for Endpoint data storage and privacy
33
description: Learn about how Microsoft Defender for Endpoint handles privacy and data that it collects.
44
keywords: Microsoft Defender for Endpoint, data storage and privacy, storage, privacy, licensing, geolocation, data retention, data
55
ms.service: defender-endpoint
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: ewalsh
7+
author: emmwalshh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -16,7 +16,7 @@ ms.collection:
1616
- essentials-compliance
1717
ms.topic: conceptual
1818
search.appverid: met150
19-
ms.date: 08/20/2024
19+
ms.date: 05/12/2025
2020
---
2121

2222
# Microsoft Defender for Endpoint data storage and privacy
@@ -27,7 +27,6 @@ ms.date: 08/20/2024
2727

2828
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2929
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30-
- [Microsoft Defender XDR](/defender-xdr)
3130
- [Microsoft Defender for Business](/defender-business/mdb-overview)
3231

3332
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)

defender-xdr/automatic-attack-disruption-exclusions.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 02/16/2025
21+
ms.date: 05/12/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
---
@@ -116,8 +116,14 @@ To remove an exclusion:
116116

117117
- Device group exclusions can be configured in the **Device groups** tab. Select the device group you want to configure from the list and choose the appropriate exclusion from the flyout pane. Select **Save** to save the exclusion.
118118

119+
## Opt out of automatic attack disruption
120+
121+
If you must opt out of attack disruption, you can do so by opening a support case in the Microsoft Defender portal with the subject *Attack disruption opt-out*. In your request, please specify that you wish to opt out of attack disruption and include a brief explanation about your decision. This feedback helps us improve the feature and better understand customer needs. By opting out, you'll still receive alerts related to attack disruption but no automated actions are taken.
122+
123+
Opting out of attack disruption can greatly increase security risk. Consider [excluding specific entities](automatic-attack-disruption-exclusions.md#review-or-change-automated-response-exclusions-for-assets) instead.
124+
119125
## See also
120126

121127
- [View details and results of automated attack disruption actions](autoad-results.md)
122128

123-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
129+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)