Skip to content

Commit a25318b

Browse files
authored
Merge branch 'main' into WI475700-ispm-service-account
2 parents 561df4c + 862c45c commit a25318b

File tree

2 files changed

+13
-6
lines changed

2 files changed

+13
-6
lines changed

ATPDocs/whats-new.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,15 +25,20 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## August 2025
2727

28+
2829
## New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
2930

3031
The new security posture assessment highlights unsecured Active Directory attributes that contain passwords or credential clues and recommends steps to remove them, helping reduce the risk of identity compromise.
3132

3233
For more information, see: [Security Assessment: Remove discoverable passwords in Active Directory account attributes (Preview)](remove-discoverable-passwords-active-directory-account-attributes.md)
3334

34-
### Sensor version 2.246
3535

36-
This version includes bug fixes and stability improvements for the Microsoft Defender for Identity sensor.
36+
### Microsoft Defender for Identity sensor version updates
37+
38+
|Version number |Updates |
39+
|---------|---------|
40+
|2.247|Includes bug fixes and stability improvements for the Microsoft Defender for Identity sensor.|
41+
|2.246|Includes bug fixes and stability improvements for the Microsoft Defender for Identity sensor. |
3742

3843
### Detection update: Suspected Brute Force attack (Kerberos, NTLM)
3944

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.custom:
2323
appliesto:
2424
- Microsoft Defender XDR
2525
- Microsoft Sentinel in the Microsoft Defender portal
26-
ms.date: 03/28/2025
26+
ms.date: 07/28/2025
2727
---
2828

2929
# Use Microsoft Sentinel functions, saved queries, and custom rules
@@ -61,14 +61,17 @@ For example, to get the first 10 rows of data from the `StormEvents` table store
6161
> [!NOTE]
6262
> The `adx()` operator isn't supported for custom detections.
6363
64-
6564
### Use arg() operator for Azure Resource Graph queries
66-
The `arg()` operator can be used to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like.
65+
66+
The `arg()` operator can be used to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like.
6767

6868
This feature was previously only available in the Logs feature in Microsoft Sentinel. In the Microsoft Defender portal, the `arg()` operator works to combine Azure Resource Graph (arg) queries with Microsoft Sentinel tables (that is, Defender XDR tables aren't supported). This allows users to make the cross-service query in advanced hunting without manually opening a Microsoft Sentinel window.
6969

7070
For more information, see [Query data in Azure Resource Graph by using arg()](/azure/azure-monitor/logs/azure-monitor-data-explorer-proxy#query-data-in-azure-resource-graph-by-using-arg-preview).
7171

72+
>[!NOTE]
73+
> The `arg()` operator isn't supported for analytics rules.
74+
7275
In the query editor, enter *arg("").* followed by the Azure Resource Graph table name.
7376

7477
For example:
@@ -86,7 +89,6 @@ BehaviorAnalytics
8689
) on $left.name == $right.SourceDevice
8790
```
8891

89-
9092
## Use saved queries
9193

9294
To use a saved query from Microsoft Sentinel, go to the **Queries** tab and scroll until you find the query that you want. Double-click the query name to load the query in the query editor. For more options, select the vertical ellipses ( ![kebab icon](/defender/media/ah-kebab.png) ) to the right of the query. From here, you can perform the following actions:

0 commit comments

Comments
 (0)