Skip to content

Commit 9e35a7b

Browse files
authored
Merge branch 'public' into patch-1
2 parents 363a5c5 + b45d87f commit 9e35a7b

File tree

280 files changed

+3075
-1375
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

280 files changed

+3075
-1375
lines changed

.acrolinx-config.edn

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,10 @@ Select the total score link to review all feedback on clarity, consistency, tone
5151
"
5252
**More information about Acrolinx**
5353
54-
- [Install Acrolinx locally for VSCode for Magic](https://review.docs.microsoft.com/office-authoring-guide/acrolinx-vscode?branch=main)
54+
- [Install Acrolinx locally for VSCode for Magic](https://review.learn.microsoft.com/office-authoring-guide/acrolinx-vscode?branch=main)
5555
- [False positives or issues](https://aka.ms/acrolinxbug)
5656
- [Request a new Acrolinx term](https://microsoft.sharepoint.com/teams/M365Dev2/SitePages/M365-terminology.aspx)
57-
- [Troubleshooting issues with Acrolinx](https://review.docs.microsoft.com/help/contribute/acrolinx-error-messages)
57+
- [Troubleshooting issues with Acrolinx](https://review.learn.microsoft.com/help/platform/acrolinx-troubleshoot?branch)
5858
5959
"
6060
}

.github/workflows/StaleBranch.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ name: (Scheduled) Stale branch removal
22

33
permissions:
44
contents: write
5+
pull-requests: read
56

67
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
78
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1009,6 +1009,11 @@
10091009
"source_path": "CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md",
10101010
"redirect_url": "/defender-cloud-apps/troubleshooting-api-connectors-errors",
10111011
"redirect_document_id": true
1012-
}
1012+
},
1013+
{
1014+
"source_path": "CloudAppSecurityDocs/connector-platform.md",
1015+
"redirect_url": "/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps",
1016+
"redirect_document_id": true
1017+
},
10131018
]
10141019
}

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,14 @@ ms.topic: how-to
77

88
# Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity
99

10+
> [!IMPORTANT]
11+
> Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. This change will happen automatically by the specified dates. No admin action is required.
12+
>
13+
1014
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
1115

1216
> [!NOTE]
13-
> This feature can potentially be exploited by an adversary to obtain the Net-NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
17+
> This feature can potentially be exploited by an adversary to obtain the NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
1418
> The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods.
1519
>
1620
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.
Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,85 @@
1+
---
2+
title: Identity Security Initiative
3+
description: Learn how to enhance your organization's identity security using the Identity Security Initiative in Microsoft Defender XDR.
4+
ms.topic: overview
5+
ms.date: 04/05/2025
6+
---
7+
8+
# Identity Security Initiative (Preview)
9+
10+
Identity security is the practice of protecting the digital identities of individuals and organizations. This includes protecting passwords, usernames, and other credentials that can be used to access sensitive data or systems. Identity security is essential for protecting against a wide range of cyber threats, including phishing, malware, and data breaches.
11+
12+
## Prerequisites
13+
14+
- Your organization must have a Microsoft Defender for Identity license.
15+
- [Review prerequisites and permissions needed](/security-exposure-management/prerequisites) for working with Security Exposure Management.
16+
17+
## View Identity Security Initiatives
18+
1. Navigate to the [Microsoft Defender portal](https://security.microsoft.com/).
19+
1. From the Exposure management section on the navigation bar, select **Exposure insights** **>** **Initiatives** to open the Identity Security page.
20+
21+
:::image type="content" source="media/identity-security-initiative/screenshot-of-the-identity-security-initiative-page.png" alt-text="Screenshot showing the Identity security initiative page." lightbox="media/identity-security-initiative/screenshot-of-the-identity-security-initiative-page.png":::
22+
23+
## Review security metrics
24+
25+
Metrics in security initiatives help you to measure exposure risk for different areas within the initiative. Each metric gathers together one or more recommendations for similar assets.
26+
Metrics can be associated with one or more initiatives.
27+
28+
On the **Metrics** tab of an initiative, or in the Metrics section of Exposure Insights, you can see the metric state, its effect, and relative importance in an initiative, and recommendations to improve the metric.
29+
We recommend that you prioritize metrics with the highest impact on Initiative Score level. This composite measure considers both the weight value of each recommendation and the percentage of noncompliant recommendations.
30+
31+
:::image type="content" source="media/identity-security-initiative/screenshot-of-the-security-metrics-page.png" alt-text="Screenshot showing the security metrics page." lightbox="media/identity-security-initiative/screenshot-of-the-security-metrics-page.png":::
32+
33+
34+
|Metric property |Description |
35+
|---------|---------|
36+
|**Metric name** | The name of the metric. |
37+
|**Progress** |Shows the improvement of the exposure level for the metric from 0 (high exposure) to 100 (no exposure). |
38+
|**State** | Shows if the metric needs attention or if the target was met. |
39+
|**Total assets** | Total number of assets under the metric scope. |
40+
|**Recommendations** | Security recommendations associated with the metric. |
41+
|**Weight** | The relative weight (importance) of the metric within the initiative, and its effect on the initiative score. Shown as High, Medium, and Low. It can also be defined as Risk accepted. |
42+
|**14-day trend** | Shows the metric value changes over the last 14 days. |
43+
|**Last updated** | Shows a timestamp of when the metric was last updated.
44+
45+
> [!NOTE]
46+
> The Affected assets experience isn't fully supported during the Preview phase.
47+
48+
## View Identity security recommendations
49+
50+
The Security recommendations tab displays a list of prioritized remediation actions related to your identity security posture. Each recommendation is evaluated for compliance and mapped to its corresponding risk impact, workload, and domain. This view helps you triage and take action based on urgency and business relevance.
51+
52+
:::image type="content" source="media/identity-security-initiative/screenshot-showing-the-security-recommendations-page.png" alt-text="Showing showing the security recommendations page." lightbox="media/identity-security-initiative/screenshot-showing-the-security-recommendations-page.png":::
53+
54+
Sort the recommendations by any of the headings or filter them based on your task needs.
55+
56+
| **Column** | **Description** |
57+
|------------------------|---------------------------------------------------------------------------------|
58+
| **Name** | The name of the recommended action (for example, *Configure VPN integration*, *Enable MFA*). |
59+
| **State** | Indicates whether the recommendation is *Compliant* or *Not Compliant*. |
60+
| **Impact** | The security impact level (Low, Medium, or High) of implementing the recommendation. |
61+
| **Workload** | The Microsoft service area the recommendation applies to (for example, Defender for Identity, Microsoft Entra ID). |
62+
| **Domain** | The security domain (for example, identity, apps) associated with the recommendation. |
63+
| **Last calculated** | The most recent time the recommendation's status was evaluated. |
64+
| **Last state change** | When the recommendation’s compliance state last changed. |
65+
| **Related initiatives**| Number of security initiatives impacted by this recommendation. |
66+
| **Related metrics** | Number of security metrics that this recommendation contributes to. |
67+
68+
Security Exposure Management categorizes recommendations by compliance status, as follows:
69+
70+
- **Compliant**: Indicates that the recommendation was implemented successfully.
71+
- **Not complaint**: Indicates that the recommendation wasn't fixed.
72+
73+
## Set target score
74+
75+
You can set a customized target score for the initiative, taking your organization’s unique set of circumstances, priorities, and risk appetite into account.
76+
77+
To set a target store, select the initiative, and then select **Set target score** from the top of the initiative pane.
78+
79+
:::image type="content" source="media/identity-security-initiative/set-target-score.png" alt-text="Screenshot showing the set target score button." lightbox="media/identity-security-initiative/set-target-score.png":::
80+
81+
## Related content
82+
83+
- [Review security initiatives](/security-exposure-management/initiatives)
84+
85+
- [Investigate security initiative metrics](/security-exposure-management/security-metrics)
138 KB
Loading
109 KB
Loading
127 KB
Loading
196 KB
Loading

ATPDocs/service-account-discovery.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Service accounts are classified into several types:
1717
- sMSA (Managed Service Accounts): Designed for individual services on a single server rather than groups.
1818
- User Account: These standard user accounts are typically used for interactive logins but can also be configured to run services.
1919

20-
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria and classifies them as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
20+
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria.These criteria include having a [Service Principal Name ](/windows/win32/ad/service-principal-names)(SPN) or a "password never expires" attribute assigned. The feature then classifies these accounts as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
2121

2222
Service account types are displayed in the Identity Info table within Advanced Hunting.
2323

@@ -68,7 +68,7 @@ You can use the sort and filter functionality on each service account tab to get
6868
|**Tags** | Sensitive or Honey Token |
6969
|**Auth protocols** | Lists the available methods for verifying user identities, for example, Kerberos and NTLM (New Technology LAN Manager). |
7070
|**Sources** | The number of potential source logins. |
71-
|**Destinations** | When a service account is trying to access a destination server, the request is directed to the target system, which can include a number of resources on that server. These resources might be a database, a file server, or other services hosted on the server. |
71+
|**Destinations** | When a service account is trying to access a destination server, the request is directed to the target system, which can include many resources on that server. These resources might be a database, a file server, or other services hosted on the server. |
7272
|**Connections** | The number of unique connections made between sources and destinations. |
7373
|**Created** |The timestamp when the service account was first created. |
7474
|**Last updated** | The timestamp of the most recent update to the service account. |
@@ -79,7 +79,7 @@ You can use the sort and filter functionality on each service account tab to get
7979

8080
For a deeper dive into what's happening in your service account click on the domain name to see the following information:
8181

82-
When you investigate a specific Service account, you'll see the following details under the connections tab:
82+
When you investigate a specific Service account, you see the following details under the connections tab:
8383

8484
:::image type="content" source="media/screenshot-of-the-connections-page.png" alt-text="Screenshot of the connections page." lightbox="media/Screenshot-of-the-connections-page.png":::
8585

@@ -96,8 +96,10 @@ When you investigate a specific Service account, you'll see the following detail
9696
Last seen | The date and time of the most recent sign in event over this connection. |
9797

9898

99-
10099
For more information about the following tabs, **Overview**, **Incidents and alerts**,**Observed in organization**, **Timeline**, and **Attack paths**, see: [Investigate assets](/defender-for-identity/investigate-assets#identity-details).
101100

101+
## Related content
102+
- [Service principal names](/windows/win32/ad/service-principal-names)
103+
- [How to configure SPN](/windows-server/identity/ad-ds/manage/how-to-configure-spn?tabs=add%2Caduc)
102104

103105
If you run into any problems, we're here to help. To get assistance or support for your product issue, see how to open a support ticket at [Microsoft Defender for Identity support](support.md).

0 commit comments

Comments
 (0)