Skip to content

Commit 9f0c01a

Browse files
authored
Merge branch 'main' into docs-editor/android-intune-1752055974
2 parents 51bfd54 + 15c5cb9 commit 9f0c01a

File tree

61 files changed

+439
-751
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+439
-751
lines changed

ATPDocs/deploy/activate-sensor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ You can choose to activate eligible domain controllers either automatically, whe
2525
|---------|---------|
2626
|Activate new sensor |The domain controller is already onboarded to Defender for Endpoint. [Activate the sensor](#activate-the-defender-for-identity-sensor).|
2727
|Install classic sensor|[Deploy the classic Defender for Identity sensor](install-sensor.md) from the **Sensors page**.|
28-
|OS update is required |This domain controller is running an unsupported operating system version for the new sensor. Update the server to Windows Server 2019 or later to use the new sensor. |
28+
|OS upgrade is required |This domain controller is running an unsupported operating system version for the new sensor. Upgrade the OS version to the latest version. |
2929

3030
<!--|Download onboarding package |[Onboard the domain controller to Defender for Endpoint](#onboard-the-domain-controller).|-->
3131

ATPDocs/deploy/deploy-defender-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,10 +31,10 @@ Identify your architecture and your requirements, and then use the table below t
3131
> [!NOTE]
3232
> The Defender for Identity sensor version 3.x is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
3333
> The Defender for Identity sensor v3.x:
34-
> - Requires that Defender for Endpoint is deployed on your endpoints
34+
> - Requires that Defender for Endpoint is deployed
3535
> - Doesn't currently support VPN integration
3636
> - Doesn't currently support ExpressRoute
37-
> - Doesn't currently offer full functionality of health alerts, posture recommendations or security alerts
37+
> - Doesn't currently offer full functionality of health alerts, posture recommendations, security alerts or advanced hunting data.
3838
3939
Once you've evaluated your infrastructure and requirements, follow the instructions for deploying the sensor based on the version you need.
4040

ATPDocs/deploy/prerequisites-sensor-version-3.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@ This article describes the requirements for installing the Microsoft Defender fo
1414

1515
Before activating the Defender for Identity sensor v3.x, note that this version of the sensor is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
1616
The Defender for Identity sensor v3.x:
17-
- Requires that Defender for Endpoint is deployed on your endpoints
17+
- Requires that Defender for Endpoint is deployed
1818
- Doesn't currently support VPN integration
1919
- Doesn't currently support ExpressRoute
20-
- Doesn't currently offer full functionality of health alerts, posture recommendations or security alerts
20+
- Doesn't currently offer full functionality of health alerts, posture recommendations, security alerts or advanced hunting data.
2121

2222
## Licensing requirements
2323

ATPDocs/health-alerts.md

Lines changed: 32 additions & 32 deletions
Large diffs are not rendered by default.

ATPDocs/identity-inventory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ The **Identities** list offers a consolidated view of identities across Active D
7676

7777
- __Last updated__ – The timestamp of the most recent update to the identity's attributes in Active Directory.
7878

79-
Nondefault columns: Email and Microsoft Entra ID risk level.  
79+
Nondefault columns: Email, Microsoft Entra ID risk level and Cloud ID.
8080

8181
> [!TIP]
8282
> To see all columns, you likely need to do one or more of the following steps:

ATPDocs/notifications.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
---
22
title: Microsoft Defender for Identity notifications
33
description: Learn how to use and configure Microsoft Defender for Identity notifications in Microsoft Defender XDR.
4-
ms.date: 09/03/2023
4+
ms.date: 07/10/2025
55
ms.topic: how-to
66
#CustomerIntent: As a Defender for Identity user, I want to learn how to work with Defender for Identity notifications to make sure I'm up to date about events detected by Defender for Identity.
77
ms.reviewer: LiorShapiraa
88
---
99

1010
# Defender for Identity notifications in Microsoft Defender XDR
1111

12+
>[!NOTE]
13+
>This feature is currently supported only by the Defender for Identity sensor version 2.x.
14+
1215
Microsoft Defender for Identity provides notifications for health issues and security alerts, either via email notifications or to a Syslog server.
1316

1417
This article describes how to configure Defender for Identity notifications so that you're aware of any health issues or security alerts detected.

ATPDocs/sensor-settings.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Manage and update sensors
33
description: Learn how to manage and update your Microsoft Defender for Identity sensors.
4-
ms.date: 01/29/2023
4+
ms.date: 07/10/2025
55
ms.topic: how-to
66
ms.reviewer: rlitinsky
77
---
@@ -104,6 +104,9 @@ The sensors page provides the following information about each sensor:
104104

105105
* Disabled
106106

107+
>[!NOTE]
108+
>This feature is supported only by the Defender for Identity sensor version 2.x.
109+
107110
* **Health status**: Displays the overall health status of the sensor with a colored icon representing the highest severity open health alert. Possible values are:
108111

109112
* **Healthy (green icon)**: No opened health issues
@@ -143,6 +146,8 @@ Defender for Identity sensors support two kinds of updates:
143146
> * Defender for Identity sensors always reserve at least 15% of the available memory and CPU available on the domain controller where it is installed. If the Defender for Identity service consumes too much memory, the service is automatically stopped and restarted by the Defender for Identity sensor updater service.
144147
145148
### Delayed sensor update
149+
>[!NOTE]
150+
>This feature is supported only by the Defender for Identity sensor version 2.x.
146151
147152
Given the rapid speed of ongoing Defender for Identity development and release updates, you may decide to define a subset group of your sensors as a delayed update ring, allowing for a gradual sensor update process. Defender for Identity enables you to choose how your sensors are updated and set each sensor as a **Delayed update** candidate.
148153

ATPDocs/uninstall-sensor.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Uninstall the sensor
33
description: This article describes how to uninstall the Microsoft Defender for Identity sensor from domain controllers.
4-
ms.date: 07/02/2025
4+
ms.date: 07/07/2025
55
ms.topic: how-to
66
ms.reviewer: rlitinsky
77
---
@@ -22,21 +22,24 @@ Deactivating Defender for Identity capabilities from your domain controller does
2222

2323
## Delete a sensor
2424

25+
### For sensor v3.x
2526
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Identities** > **Sensors**.
26-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
27+
2. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
2728

28-
![Screenshot that shows how to delete a sensor.](media/screenshot-that-shows-how-to-delete-a-sensor.png)
29+
:::image type="content" source="media/screenshot-that-shows-how-to-delete-a-sensor.png" alt-text="Screenshot that shows how to delete a sensor." lightbox="media/screenshot-that-shows-how-to-delete-a-sensor.png":::
2930

30-
## Uninstall a sensor v2.x from a domain controller
31+
>[!NOTE]
32+
>This action removes the v3.x sensor and stops monitoring on that domain controller.
3133
32-
The following steps describe how to uninstall a sensor v2.x from a domain controller.
33-
34-
1. Sign in to the domain controller with administrative privileges.
35-
1. From the Windows **Start** menu, select **Settings** > **Control Panel** > **Add/ Remove Programs**.
36-
1. Select the sensor installation, select **Uninstall**, and follow the instructions to remove the sensor.
34+
## Delete and uninstall a sensor v2.x from a domain controller
3735

3836
> [!IMPORTANT]
3937
> We recommend removing the sensor from the domain controller before demoting the domain controller.
38+
>
39+
1. Sign in to the domain controller with administrative privileges.
40+
2. From the Windows **Start** menu, select **Settings** > **Control Panel** > **Add/ Remove Programs**.
41+
3. Select the sensor installation, select **Uninstall**, and follow the instructions to remove the sensor.
42+
4. After uninstallation is complete, go to the Microsoft Defender portal > Settings > Identities > Sensors, select the domain controller, and choose Delete.
4043

4144
## Remove an orphaned sensor
4245

ATPDocs/vpn-integration.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
---
22
title: VPN integration | Microsoft Defender for Identity
33
description: Learn how to collect accounting information by integrating a VPN for Microsoft Defender for Identity in Microsoft Defender XDR.
4-
ms.date: 08/31/2023
4+
ms.date: 07/10/2025
55
ms.topic: how-to
66
#CustomerIntent: As a Defender for Identity user, I want to learn how to collect accounting information from VPN solutions.
77
ms.reviewer: martin77s
88
---
99

1010
# Defender for Identity VPN integration in Microsoft Defender XDR
1111

12+
>[!NOTE]
13+
>This feature is currently supported only by the Defender for Identity sensor version 2.x.
14+
1215
Microsoft Defender for Identity can integrate with your VPN solution by listening to RADIUS accounting events forwarded to Defender for Identity sensors, such as the IP addresses and locations where connections originated. VPN accounting data can help your investigations by providing more information about user activity, such as the locations from where computers are connecting to the network, and an extra detection for abnormal VPN connections.
1316

1417
Defender for Identity's VPN integration is based on standard RADIUS Accounting ([RFC 2866](https://tools.ietf.org/html/rfc2866)), and supports the following VPN vendors:

ATPDocs/whats-new.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,12 @@ For updates about versions and features released six months ago or earlier, see
2626

2727
## July 2025
2828

29+
### Identity scoping is now available in Governance environments
30+
31+
Scoping is now supported in government (GOV) environments. Organizations can now define and refine the scope of MDI monitoring and gain granular control over which entities and resources are included in security analysis.
32+
33+
For more information, see [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
34+
2935
### New security posture assessments for unmonitored identity servers
3036

3137
Microsoft Defender for Identity now includes three security posture assessments that detect when Microsoft Entra Connect, Active Directory Federation Services (ADFS), or Active Directory Certificate Services (ADCS) servers are present in your environment but aren't monitored.
@@ -347,7 +353,8 @@ This version includes improvements and bug fixes for cloud services and the Defe
347353
### Easily detect CVE-2024-21427 Windows Kerberos Security Feature Bypass Vulnerability
348354

349355
To help customers better identify and detect attempts to bypass security protocols according to [this vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21427), we have added a new activity within Advanced Hunting that monitors Kerberos AS authentication.
350-
With this data customers can now easily create their own [custom detection rules within Microsoft Defender XDR](https://aka.ms/CustomDetectionsDocs) and automatically trigger alerts for this type of activity
356+
357+
With this data, customers can now easily create their own [custom detection rules within Microsoft Defender XDR](https://aka.ms/CustomDetectionsDocs) and automatically trigger alerts for this type of activity.
351358

352359
Access Defender XDR portal -> Hunting -> Advanced Hunting.
353360

0 commit comments

Comments
 (0)