You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/activate-sensor.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ You can choose to activate eligible domain controllers either automatically, whe
25
25
|---------|---------|
26
26
|Activate new sensor |The domain controller is already onboarded to Defender for Endpoint. [Activate the sensor](#activate-the-defender-for-identity-sensor).|
27
27
|Install classic sensor|[Deploy the classic Defender for Identity sensor](install-sensor.md) from the **Sensors page**.|
28
-
|OS update is required |This domain controller is running an unsupported operating system version for the new sensor. Update the server to Windows Server 2019 or later to use the new sensor. |
28
+
|OS upgrade is required |This domain controller is running an unsupported operating system version for the new sensor. Upgrade the OS version to the latest version. |
29
29
30
30
<!--|Download onboarding package |[Onboard the domain controller to Defender for Endpoint](#onboard-the-domain-controller).|-->
Copy file name to clipboardExpand all lines: ATPDocs/deploy/deploy-defender-identity.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,10 +31,10 @@ Identify your architecture and your requirements, and then use the table below t
31
31
> [!NOTE]
32
32
> The Defender for Identity sensor version 3.x is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
33
33
> The Defender for Identity sensor v3.x:
34
-
> - Requires that Defender for Endpoint is deployed on your endpoints
34
+
> - Requires that Defender for Endpoint is deployed
35
35
> - Doesn't currently support VPN integration
36
36
> - Doesn't currently support ExpressRoute
37
-
> - Doesn't currently offer full functionality of health alerts, posture recommendations or security alerts
37
+
> - Doesn't currently offer full functionality of health alerts, posture recommendations, security alerts or advanced hunting data.
38
38
39
39
Once you've evaluated your infrastructure and requirements, follow the instructions for deploying the sensor based on the version you need.
Copy file name to clipboardExpand all lines: ATPDocs/deploy/prerequisites-sensor-version-3.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,10 +14,10 @@ This article describes the requirements for installing the Microsoft Defender fo
14
14
15
15
Before activating the Defender for Identity sensor v3.x, note that this version of the sensor is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
16
16
The Defender for Identity sensor v3.x:
17
-
- Requires that Defender for Endpoint is deployed on your endpoints
17
+
- Requires that Defender for Endpoint is deployed
18
18
- Doesn't currently support VPN integration
19
19
- Doesn't currently support ExpressRoute
20
-
- Doesn't currently offer full functionality of health alerts, posture recommendations or security alerts
20
+
- Doesn't currently offer full functionality of health alerts, posture recommendations, security alerts or advanced hunting data.
Copy file name to clipboardExpand all lines: ATPDocs/notifications.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,17 @@
1
1
---
2
2
title: Microsoft Defender for Identity notifications
3
3
description: Learn how to use and configure Microsoft Defender for Identity notifications in Microsoft Defender XDR.
4
-
ms.date: 09/03/2023
4
+
ms.date: 07/10/2025
5
5
ms.topic: how-to
6
6
#CustomerIntent: As a Defender for Identity user, I want to learn how to work with Defender for Identity notifications to make sure I'm up to date about events detected by Defender for Identity.
7
7
ms.reviewer: LiorShapiraa
8
8
---
9
9
10
10
# Defender for Identity notifications in Microsoft Defender XDR
11
11
12
+
>[!NOTE]
13
+
>This feature is currently supported only by the Defender for Identity sensor version 2.x.
14
+
12
15
Microsoft Defender for Identity provides notifications for health issues and security alerts, either via email notifications or to a Syslog server.
13
16
14
17
This article describes how to configure Defender for Identity notifications so that you're aware of any health issues or security alerts detected.
Copy file name to clipboardExpand all lines: ATPDocs/sensor-settings.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Manage and update sensors
3
3
description: Learn how to manage and update your Microsoft Defender for Identity sensors.
4
-
ms.date: 01/29/2023
4
+
ms.date: 07/10/2025
5
5
ms.topic: how-to
6
6
ms.reviewer: rlitinsky
7
7
---
@@ -104,6 +104,9 @@ The sensors page provides the following information about each sensor:
104
104
105
105
* Disabled
106
106
107
+
>[!NOTE]
108
+
>This feature is supported only by the Defender for Identity sensor version 2.x.
109
+
107
110
***Health status**: Displays the overall health status of the sensor with a colored icon representing the highest severity open health alert. Possible values are:
108
111
109
112
***Healthy (green icon)**: No opened health issues
@@ -143,6 +146,8 @@ Defender for Identity sensors support two kinds of updates:
143
146
> * Defender for Identity sensors always reserve at least 15% of the available memory and CPU available on the domain controller where it is installed. If the Defender for Identity service consumes too much memory, the service is automatically stopped and restarted by the Defender for Identity sensor updater service.
144
147
145
148
### Delayed sensor update
149
+
>[!NOTE]
150
+
>This feature is supported only by the Defender for Identity sensor version 2.x.
146
151
147
152
Given the rapid speed of ongoing Defender for Identity development and release updates, you may decide to define a subset group of your sensors as a delayed update ring, allowing for a gradual sensor update process. Defender for Identity enables you to choose how your sensors are updated and set each sensor as a **Delayed update** candidate.
Copy file name to clipboardExpand all lines: ATPDocs/uninstall-sensor.md
+12-9Lines changed: 12 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Uninstall the sensor
3
3
description: This article describes how to uninstall the Microsoft Defender for Identity sensor from domain controllers.
4
-
ms.date: 07/02/2025
4
+
ms.date: 07/07/2025
5
5
ms.topic: how-to
6
6
ms.reviewer: rlitinsky
7
7
---
@@ -22,21 +22,24 @@ Deactivating Defender for Identity capabilities from your domain controller does
22
22
23
23
## Delete a sensor
24
24
25
+
### For sensor v3.x
25
26
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Identities** > **Sensors**.
26
-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
27
+
2. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
27
28
28
-

29
+
:::image type="content" source="media/screenshot-that-shows-how-to-delete-a-sensor.png" alt-text="Screenshot that shows how to delete a sensor." lightbox="media/screenshot-that-shows-how-to-delete-a-sensor.png":::
29
30
30
-
## Uninstall a sensor v2.x from a domain controller
31
+
>[!NOTE]
32
+
>This action removes the v3.x sensor and stops monitoring on that domain controller.
31
33
32
-
The following steps describe how to uninstall a sensor v2.x from a domain controller.
33
-
34
-
1. Sign in to the domain controller with administrative privileges.
35
-
1. From the Windows **Start** menu, select **Settings** > **Control Panel** > **Add/ Remove Programs**.
36
-
1. Select the sensor installation, select **Uninstall**, and follow the instructions to remove the sensor.
34
+
## Delete and uninstall a sensor v2.x from a domain controller
37
35
38
36
> [!IMPORTANT]
39
37
> We recommend removing the sensor from the domain controller before demoting the domain controller.
38
+
>
39
+
1. Sign in to the domain controller with administrative privileges.
40
+
2. From the Windows **Start** menu, select **Settings** > **Control Panel** > **Add/ Remove Programs**.
41
+
3. Select the sensor installation, select **Uninstall**, and follow the instructions to remove the sensor.
42
+
4. After uninstallation is complete, go to the Microsoft Defender portal > Settings > Identities > Sensors, select the domain controller, and choose Delete.
Copy file name to clipboardExpand all lines: ATPDocs/vpn-integration.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,17 @@
1
1
---
2
2
title: VPN integration | Microsoft Defender for Identity
3
3
description: Learn how to collect accounting information by integrating a VPN for Microsoft Defender for Identity in Microsoft Defender XDR.
4
-
ms.date: 08/31/2023
4
+
ms.date: 07/10/2025
5
5
ms.topic: how-to
6
6
#CustomerIntent: As a Defender for Identity user, I want to learn how to collect accounting information from VPN solutions.
7
7
ms.reviewer: martin77s
8
8
---
9
9
10
10
# Defender for Identity VPN integration in Microsoft Defender XDR
11
11
12
+
>[!NOTE]
13
+
>This feature is currently supported only by the Defender for Identity sensor version 2.x.
14
+
12
15
Microsoft Defender for Identity can integrate with your VPN solution by listening to RADIUS accounting events forwarded to Defender for Identity sensors, such as the IP addresses and locations where connections originated. VPN accounting data can help your investigations by providing more information about user activity, such as the locations from where computers are connecting to the network, and an extra detection for abnormal VPN connections.
13
16
14
17
Defender for Identity's VPN integration is based on standard RADIUS Accounting ([RFC 2866](https://tools.ietf.org/html/rfc2866)), and supports the following VPN vendors:
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+8-1Lines changed: 8 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,6 +26,12 @@ For updates about versions and features released six months ago or earlier, see
26
26
27
27
## July 2025
28
28
29
+
### Identity scoping is now available in Governance environments
30
+
31
+
Scoping is now supported in government (GOV) environments. Organizations can now define and refine the scope of MDI monitoring and gain granular control over which entities and resources are included in security analysis.
32
+
33
+
For more information, see [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
34
+
29
35
### New security posture assessments for unmonitored identity servers
30
36
31
37
Microsoft Defender for Identity now includes three security posture assessments that detect when Microsoft Entra Connect, Active Directory Federation Services (ADFS), or Active Directory Certificate Services (ADCS) servers are present in your environment but aren't monitored.
@@ -347,7 +353,8 @@ This version includes improvements and bug fixes for cloud services and the Defe
347
353
### Easily detect CVE-2024-21427 Windows Kerberos Security Feature Bypass Vulnerability
348
354
349
355
To help customers better identify and detect attempts to bypass security protocols according to [this vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21427), we have added a new activity within Advanced Hunting that monitors Kerberos AS authentication.
350
-
With this data customers can now easily create their own [custom detection rules within Microsoft Defender XDR](https://aka.ms/CustomDetectionsDocs) and automatically trigger alerts for this type of activity
356
+
357
+
With this data, customers can now easily create their own [custom detection rules within Microsoft Defender XDR](https://aka.ms/CustomDetectionsDocs) and automatically trigger alerts for this type of activity.
0 commit comments