Skip to content

Commit a8623a7

Browse files
Merge pull request #2896 from MicrosoftDocs/main
Publish main to live, 02/24, 11:00 AM IST
2 parents 1dc0c67 + 56acb1d commit a8623a7

9 files changed

+64
-51
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Microsoft Defender for Endpoint customers, who have already onboarded their doma
1212
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
1313

1414
> [!IMPORTANT]
15-
> Information in this article relates to a feature that is currently in limited availability for a select set of use cases. If you weren't directed to use the Defender for Identity **Activation** page, use our [main deployment guide](deploy-defender-identity.md) instead.
15+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor.
1616
1717
## Prerequisites
1818

@@ -29,10 +29,8 @@ Make sure that the domain controller where you're planning to activate Defender
2929

3030
Direct Defender for Identity capabilities are supported on domain controllers only, using the one of the following operating systems:
3131

32-
- Windows Server 2019
33-
- Windows Server 2022
34-
35-
You must also have the [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) installed.
32+
- Windows Server 2019 or above
33+
- [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) or later
3634

3735
> [!IMPORTANT]
3836
>After installing the March 2024 Cumulative Update, LSASS might experience a memory leak on domain controllers when on-premises and cloud-based Active Directory Domain Controllers service Kerberos authentication requests.

ATPDocs/deploy/configure-windows-event-collection.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -328,7 +328,7 @@ To configure auditing on Microsoft Entra Connect servers:
328328
<a name="enable-auditing-on-an-exchange-object"></a>
329329
330330
>[!NOTE]
331-
> The configuration container audit is requried only for environments that currently have or previously had Microsoft Exchange, as these environments have an Exchange container located within the domain's Configuration section.
331+
> The configuration container audit is required only for environments that currently have or previously had Microsoft Exchange, as these environments have an Exchange container located within the domain's Configuration section.
332332
333333
**Related health issue:** [Auditing on the Configuration container is not enabled as required](../health-alerts.md#auditing-on-the-configuration-container-is-not-enabled-as-required)
334334
@@ -340,6 +340,8 @@ To configure auditing on Microsoft Entra Connect servers:
340340
341341
1. Expand the **Configuration** container to show the **Configuration** node, which begins with **"CN=Configuration,DC=..."**.
342342
343+
:::image type="content" source="../media/cn-configuration.png" alt-text="Screenshot of selections for opening properties for the CN Configuration node.":::
344+
343345
1. Right-click the **Configuration** node and select **Properties**.
344346
345347
![Screenshot of selections for opening properties for the Configuration node.](../media/configuration-properties.png)

ATPDocs/deploy/event-collection-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The following event is required for Microsoft Entra Connect servers:
5050

5151
- 4624: An account was successfully logged on
5252

53-
For more information, see [Configure auditing on Microsoft Entra Connect](../configure-windows-event-collection.md#configure-auditing-for-entra-connect).
53+
For more information, see [Configure auditing on Microsoft Entra Connect](../configure-windows-event-collection.md#configure-auditing-on-microsoft-entra-connect).
5454

5555
### Other required Windows events
5656

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,12 +34,16 @@ To ensure that Windows clients and servers allow your Defender for Identity Dire
3434
3535
**To configure required permissions**:
3636

37-
1. Locate the policy. In your **Computer configuration > Windows settings > Security settings > Local policies > Security options**, select the **Network access - Restrict clients allowed to make remote calls to SAM** policy. For example:
37+
1. Create a new group policy or use an existing one.
38+
1. In your **Computer configuration > Windows settings > Security settings > Local policies > Security options**, select the **Network access - Restrict clients allowed to make remote calls to SAM** policy. For example:
3839

3940
:::image type="content" source="../media/samr-policy-location.png" alt-text="Screenshot of the Network access policy selected." lightbox="../media/samr-policy-location.png":::
4041

4142
1. Add the DSA to the list of approved accounts able to perform this action, together with any other account that you've discovered during audit mode.
4243

44+
:::image type="content" source="../media/restrict-clients-allowed-to-make-remote-calls-to-sam.png" alt-text="Screenshot of the Network access policy settings." lightbox="../media/restrict-clients-allowed-to-make-remote-calls-to-sam.png":::
45+
46+
4347
For more information, see [Network access: Restrict clients allowed to make remote calls to SAM](/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls).
4448

4549
## Make sure the DSA is allowed to access computers from the network (optional)
@@ -60,6 +64,8 @@ To ensure that Windows clients and servers allow your Defender for Identity Dire
6064
>
6165
> The [Microsoft Security Compliance Toolkit](https://www.microsoft.com/download/details.aspx?id=55319) recommends replacing the default *Everyone* with *Authenticated Users* to prevent anonymous connections from performing network sign-ins. Review your local policy settings before managing the [Access this computer from the network](/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network) setting from a GPO, and consider including *Authenticated Users* in the GPO if needed.
6266
67+
:::image type="content" source="../media/define-security-policy-setting.png" alt-text="Screenshot of Security Policy Settings." lightbox="../media/define-security-policy-setting.png":::
68+
6369
## Configure a Device profile for Microsoft Entra hybrid joined devices only
6470

6571
This procedure describes how to use the [Microsoft Intune admin center](https://intune.microsoft.com/) to configure the policies in a Device profile if you're working with Microsoft Entra hybrid joined devices.

ATPDocs/media/cn-configuration.png

37.9 KB
Loading
75.3 KB
Loading
68.3 KB
Loading

ATPDocs/whats-new.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,19 @@ For updates about versions and features released six months ago or earlier, see
2424

2525
## February 2025
2626

27+
### DefenderForIdentity PowerShell module updates (version 1.0.0.3)
28+
29+
New Features and Improvements:
30+
- Support for getting, testing, and setting the Active Directory Recycle Bin in Get/Set/Test MDIConfiguration.
31+
- Support for getting, testing, and setting the proxy configuration on new MDI sensor.
32+
- The Active Directory Certificate Services registry value for audit filtering now properly sets the type.
33+
- New-MDIConfigurationReport now shows the name of the tested GPO and supports Server and Identity arguments.
34+
35+
Bug Fixes:
36+
- Improved reliability for DeletedObjects container permissions on non-English operating systems.
37+
- Fixed extraneous output for KDS root key creation.
38+
- Other reliability fixes.
39+
2740
### New attack paths tab on the Identity profile page
2841

2942
This tab provides visibility into potential attack paths leading to a critical identity or involving it within the path, helping assess security risks. For more information, see [Overview of attack path within Exposure Management.](/security-exposure-management/work-attack-paths-overview)

0 commit comments

Comments
 (0)