Skip to content

Commit a85e774

Browse files
committed
Merge branch 'main' into Teams-chrisda
2 parents 2316bbc + cc69c67 commit a85e774

File tree

134 files changed

+936
-931
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

134 files changed

+936
-931
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,16 @@
124124
"source_path": "defender-endpoint/non-windows.md",
125125
"redirect_url": "/defender-endpoint/microsoft-defender-endpoint",
126126
"redirect_document_id": true
127+
},
128+
{
129+
"source_path": "defender-endpoint/configure-endpoints-non-windows.md",
130+
"redirect_url": "/defender-endpoint/onboarding",
131+
"redirect_document_id": true
132+
},
133+
{
134+
"source_path": "defender-endpoint/configure-server-endpoints.md",
135+
"redirect_url": "/defender-endpoint/onboard-windows-server-2012r2-2016",
136+
"redirect_document_id": true
127137
}
128138
]
129139
}
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
---
2+
title: Integrate Defender for Identity with PAM services
3+
ms.service: microsoft-defender-for-identity
4+
ms.date: 03/30/2025
5+
ms.topic: concept-article
6+
#customerIntent: As a SOC engineer, I want to understand how to integrate Microsoft Defender for Identity with my PAM (Privilege Access Management) system to manage privileged access and detect threats.
7+
description: Learn how to integrate Microsoft Defender for Identity with your Privileged Access Management (PAM) services.
8+
---
9+
10+
# Integrate Defender for Identity with PAM services
11+
12+
## What are PAM services?
13+
14+
Privileged Access Management (PAM) solutions help reduce the risk of credential misuse by securing, monitoring, and controlling privileged account access to critical resources.
15+
PAM solutions secure privileged accounts by storing their credentials in a secure vault, controlling access through approval workflows, and monitoring active sessions to enforce just-in-time (JIT) and just-enough-access (JEA) policies. Common PAM capabilities include, automated password rotation, multifactor authentication, session isolation, and anomaly detection.
16+
17+
## Defender for Identity and PAM
18+
19+
Defender for Identity helps identify and investigate suspicious activities related to privileged accounts, such as unusual sign in patterns or privilege escalation attempts.
20+
When integrated with a PAM solution, Microsoft Defender for Identity can detect and investigate suspicious activity involving privileged accounts—such as abnormal sign-ins or privilege escalation attempts. The integration combines PAM’s access controls with Defender for Identity’s behavioral analytics for enhanced threat detection and containment.
21+
22+
## Technology partners
23+
24+
Microsoft Defender for Identity currently supports integration with the following PAM vendors. Dedicated integrations for each partner are now available in the Microsoft 365 Defender partner catalog for streamlined onboarding and visibility.
25+
26+
:::image type="content" source="media/integrate-with-partner-system-services/screenshot-of-mdi-technology-partners.png" alt-text="Screenshot of the defender for identity connections page":::
27+
28+
29+
|Vendor |Description |
30+
|---------|---------|
31+
|CyberArk | Provides credential vaulting, session monitoring, and threat remediation for privileged identities. |
32+
|BeyondTrust | BeyondTrust Offers identity-centric controls to manage the privilege attack surface and mitigate internal and external threats. |
33+
|Delinea | Delivers centralized authorization and session control for privileged identities across enterprise environments. |
34+
35+
### Reset password
36+
37+
Once PAM integration is enabled, Microsoft Defender XDR automatically tags identities managed by your PAM solution, providing critical context during investigations.
38+
39+
Additionally, you can initiate a password reset for high-risk privileged accounts directly from the Microsoft Defender XDR console. This action uses the connected PAM system.
40+
41+
To reset a password:
42+
43+
1. Go to **Assets > Identities**.
44+
2. Select the relevant identity.
45+
3. Click the three-dot menu (****) in the top-right corner.
46+
4. Select **Reset password**. The label might vary based on the vendor (for example, **Reset password by CyberArk**, **Reset password by BeyondTrust**).
47+
48+
:::image type="content" source="media/screenshot-of-privilege-access-management-tags-for-identities.png" alt-text="Screenshot of the priviledge access management tags assigned to identity accounts" lightbox="media/screenshot-of-privilege-access-management-tags-for-identities.png":::
49+
50+
This capability streamlines containment and response workflows by embedding privileged access controls directly into the investigation experience.
51+
52+
53+
### Next steps
54+
55+
For more information, see:
56+
57+
[How to integrate Defender for Identity with Delinea](https://docs.delinea.com/online-help/integrations/microsoft/mdi/integrating-mdi.htm)
58+
59+
[How to integrate Defender for Identity with CyberArk](https://community.cyberark.com/marketplace/s/#a35Ht0000018sDVIAY-a39Ht000004GLaEIAW)
230 KB
Loading
378 KB
Loading
119 KB
Loading

ATPDocs/service-account-discovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ For a deeper dive into what's happening in your service account click on the dom
8181

8282
When you investigate a specific Service account, you'll see the following details under the connections tab:
8383

84-
:::image type="content" source="media/Screenshot-of-the-connections-page.png" alt-text="Screenshot of the connections page." lightbox="media/Screenshot-of-the-connections-page.png":::
84+
:::image type="content" source="media/screenshot-of-the-connections-page.png" alt-text="Screenshot of the connections page." lightbox="media/Screenshot-of-the-connections-page.png":::
8585

8686
|Service account connection details |Description |
8787
|---------|---------|

ATPDocs/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,10 @@ items:
8585
displayName: standalone
8686
- name: Activate Defender for Identity capabilities on your domain controller
8787
href: deploy/activate-capabilities.md
88+
- name: Integrate with PAM services
89+
items:
90+
- name: Integrate Defender for Identity with PAM services
91+
href: integrate-microsoft-and-pam-services.md
8892
- name: Manage
8993
items:
9094
- name: View the ITDR dashboard

ATPDocs/whats-new.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,20 @@ For more information, see also:
2222

2323
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2424

25+
## April 2025
26+
27+
### New Defender for Identity and PAM Integration
28+
29+
Microsoft Defender for Identity now supports integration with industry-leading Privileged Access Management (PAM) platforms to enhance detection and response for privileged identities.
30+
31+
**Supported PAM vendors**:
32+
33+
- CyberArk
34+
- Delinea
35+
- BeyondTrust
36+
37+
For more information see: [Integrations Defender for Identity and PAM services.](Integrate-microsoft-and-pam-services.md)
38+
2539
## March 2025
2640

2741
### New Service Account Discovery page

CloudAppSecurityDocs/activity-filters-queries.md

Lines changed: 48 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This article provides descriptions and instructions for Defender for Cloud Apps
1313

1414
## Activity filters
1515

16-
Below is a list of the activity filters that can be applied. Most filters support multiple values as well as *NOT* to provide you with a powerful tool for policy creation.
16+
Below is a list of the activity filters that can be applied. Most filters support multiple values and *NOT* to provide you with a powerful tool for policy creation.
1717

1818
- Activity ID - Search only for specific activities by their ID. This filter is useful when you connect Microsoft Defender for Cloud Apps to your SIEM (using the SIEM agent) and you want to further investigate alerts using Defender for Cloud Apps.
1919

@@ -30,7 +30,7 @@ Below is a list of the activity filters that can be applied. Most filters suppor
3030
- Activity type - Search for the app activity.
3131

3232
> [!NOTE]
33-
> Apps are added to the filter only if there is activity for that app.
33+
> Apps are added to the filter only if there's activity for that app.
3434
3535
- Administrative activity – Search only for administrative activities.
3636

@@ -56,7 +56,7 @@ Below is a list of the activity filters that can be applied. Most filters suppor
5656

5757
- IP address – The raw IP address, category, or tag from which the activity was performed.
5858
- Raw IP address - Enables you to search for activities that were performed on or by raw IP addresses. The raw IPs can equal, don't equal, start with, or don't start with a particular sequence.
59-
- IP category - The category of the IP address from which the activity was performed, for example, all activities from the administrative IP address range. The categories need to be configured to include the relevant IP addresses. Some IPs may be categorized by default. for example, there are IP addresses that are considered by Microsoft threat intelligence sources will be categorized as risky. To learn how to configure the IP categories, see [Organize the data according to your needs](ip-tags.md).
59+
- IP category - The category of the IP address from which the activity was performed, for example, all activities from the administrative IP address range. The categories need to be configured to include the relevant IP addresses. Some IPs might be categorized by default. for example, there are IP addresses that are considered by Microsoft threat intelligence sources will be categorized as risky. To learn how to configure the IP categories, see [Organize the data according to your needs](ip-tags.md).
6060
- IP tag - The tag of the IP address from which the activity was performed, for example, all activities from anonymous proxy IP addresses. Defender for Cloud Apps creates a set of built-in IP tags that aren't configurable. Additionally, you can configure your IP tags. For more information about configuring your IP tags, see [Organize the data according to your needs](ip-tags.md).
6161
The built-in IP tags include the following:
6262
- Microsoft apps (14 of them)
@@ -88,7 +88,7 @@ Below is a list of the activity filters that can be applied. Most filters suppor
8888
- User domain - Search for a specific user domain.
8989
- User organization - The organizational unit of the user who performed the activity, for example, all activities performed by EMEA_marketing users. This is only relevant for connected Google Workspace instances using organizational units.
9090
- User group - Specific user groups that you can import from connected apps, for example, Microsoft 365 administrators.
91-
- User name - Search for a specific username. To see a list of users in a specific user group, in the **Activity drawer**, select the name of the user group. Clicking will take you to the Accounts page, which lists all the users in the group. From there, you can drill down into the details of the accounts of specific users in the group.
91+
- User name - Search for a specific username. To see a list of users in a specific user group, in the **Activity drawer**, select the name of the user group. Clicking takes you to the Accounts page, which lists all the users in the group. From there, you can drill down into the details of the accounts of specific users in the group.
9292
- The **User group** and **User name** filters can be further filtered by using the **As** filter and selecting the role of the user, which can be any of the following:
9393
- Activity object only - meaning that the user or user group selected didn't perform the activity in question; they were the object of the activity.
9494
- Actor only - meaning that the user or user group performed the activity.
@@ -132,7 +132,7 @@ Defender for Cloud Apps also provides you with **Suggested queries**. Suggested
132132

133133
- Sharing activities - Filters all your activities to display only those activities that involve sharing folders and files, including creating a company link, creating an anonymous link, and granting read/write permissions.
134134

135-
- Successful log-in - Filters all your activities to display only those activities that involve successful sign-ins, including impersonate action, impersonate sign-in, single sign-o sign-ins, and sign-in from a new device.
135+
- Successful log in - Filters all your activities to display only those activities that involve successful sign-ins, including impersonate action, impersonate sign-in, single sign-o sign-ins, and sign-in from a new device.
136136

137137
![query activities.](media/queries-activity.png)
138138

@@ -162,22 +162,59 @@ For example:
162162

163163
![Filter after selecting investigate 6 months back.](media/filter-six-months-back.png)
164164

165-
#### Export activities six months back (Preview)
166165

167-
You can export all activities from up to six months by clicking the Export button in the top-left corner
166+
### Export activities six months back (Preview)
167+
168+
169+
You can export all activities from the past six months by clicking the Export button in the top-left corner of the Activity log page.
170+
168171
![Click the export icon to export records.](media/activity-filters-queries/export-button-of-activity-logs.png)
169172

173+
When exporting data:
170174

175+
- You can choose a date range of up to six months.
176+
- You can choose to exclude private activities.
177+
- The exported file is limited to 100,000 records and is delivered in CSV format.
171178

179+
Once the export is complete, the file is available under **Exported reports**.
172180

173-
When exporting data, you can choose a date range of up to six months, and have the ability to exclude private activities.
174-
The exported file is limited to 100,000 records and will be in CSV format.
181+
To access exported files and check export status, navigate to **Reports -> Cloud Apps** in Microsoft 365 Defender portal to view the status of the export process and access past exports.
175182

176-
The result file will be accessible under the **Exported reports**. Users can navigate to **Reports -> Cloud Apps** in Microsoft 365 Defender portal to view the status of the export process and access past exports.
177-
Reports that include private activities will be marked with an Eye icon in the reports page.
183+
Reports that include private activities are marked with an Eye icon in the reports page.
178184

179185
![eye-icon](media/activity-filters-queries/eye-icon-to-indicate-private-report.png)
180186

187+
> [!NOTE]
188+
>Exporting and viewing activity data up to six months back is restricted to specific roles with elevated permissions.
189+
190+
The following roles are supported:
191+
192+
- `INVITED_ADMIN`
193+
194+
- `GLOBAL_ADMINISTRATOR`
195+
196+
- `SECURITY_ADMINISTRATOR`
197+
198+
- `MCAS_ADMINISTRATOR`
199+
200+
- `DISCOVERY_ADMIN`
201+
202+
- `SECURITY_OPERATOR`
203+
204+
- `COMPLIANCE_ADMIN`
205+
206+
- `SECURITY_READER`
207+
208+
- `GLOBAL_READER`
209+
210+
- `URBAC_ROLES_GLOBAL_ADMINISTRATOR`
211+
212+
- `URBAC_ROLES_COMPLIANCE_ADMINISTRATOR`
213+
214+
- `URBAC_ROLES_SECURITY_READER`
215+
216+
- `URBAC_ROLES_SECURITY_OPERATOR`
217+
181218
## Next steps
182219

183220
> [!div class="nextstepaction"]

CloudAppSecurityDocs/index.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ metadata:
1010
ms.service: defender-for-cloud-apps
1111
ms.topic: landing-page
1212
ms.collection: na
13-
author: batamig
14-
ms.author: bagol
1513
ms.date: 11/09/2021
1614

1715
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new

0 commit comments

Comments
 (0)