Skip to content

Commit aae3ffc

Browse files
Merge pull request #3542 from MicrosoftDocs/main
[AutoPublish] main to live - 04/22 10:31 PDT | 04/22 23:01 IST
2 parents 7ea2ab5 + 135ebfd commit aae3ffc

11 files changed

+288
-20
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -117,8 +117,8 @@ The first time you activate Defender for Identity capabilities on your domain co
117117
Defender for Identity capabilities on domain controllers currently support the following Defender for Identity functionality:
118118

119119
- Investigation features on the [ITDR dashboard](#check-the-itdr-dashboard), [identity inventory](#confirm-entity-page-details), and [identity advanced hunting data](#test-advanced-hunting-tables)
120-
- [Specified security posture recommendations](#test-identity-security-posture-management-ispm-recommendations)
121-
- [Specified alert detections](#test-alert-functionality)
120+
- [Security posture recommendations](#test-identity-security-posture-management-ispm-recommendations)
121+
- [Alert detections](#test-alert-functionality)
122122
- [Remediation actions](#test-remediation-actions)
123123
- [Automatic attack disruption](/microsoft-365/security/defender/automatic-attack-disruption)
124124

ATPDocs/health-alerts.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,15 @@ The Microsoft Defender for Identity **Health issues** page lets you know when th
3232

3333
:::image type="content" source="media/health-issues/close-suppress.png" alt-text="Screenshot of a health issue details pane." lightbox="media/health-issues/close-suppress.png":::
3434

35+
## Health issue status
36+
37+
Health issues in Microsoft Defender for Identity can have different statuses depending on their state and how they're handled.
38+
39+
- **Open:**: The health issue is marked as open.
40+
- **Closed:** A health issue is automatically marked as **Closed** when Microsoft Defender for Identity detects that the underlying issue is resolved. If you have [Azure ATP (workspace name) Administrator](/defender-for-identity/role-groups#defender-for-identity-security-groups) you can also manually close a health issue.
41+
- **Suppressed:** If you have Azure ATP (workspace name) Administrators permissions, you can suppress the health alert for seven days. Suppress a health alert if you're aware of an expected temporary known issue, for example, taking down a machine for maintenance.
42+
43+
For example, if a domain controller is taken offline for maintenance, a "Sensor stopped communicating" alert might be triggered. You can use the API to change the alert status from Open to Suppressed. Once the domain controller is back online, revert the status to Open and let Microsoft Defender for Identity close the alert automatically when the issue is resolved.
3544

3645
## Health issues
3746

@@ -43,7 +52,7 @@ Sensor-specific health issues are displayed in the **Sensor health issues** tab
4352

4453
|Alert|Description|Resolution|Severity|Displayed in|
4554
|----|----|----|----|----|
46-
|The virtual machines that the listed Defender for Identity sensors are installed on has a network configuration mismatch. This issue may affect the performance and reliability of the sensors.|Review the network interface settings, including disabling the Large Send Offload (LSO), and follow the instructions in [here](https://aka.ms/mdi/vmware-sensor-issue).|High|Sensors health issues tab|
55+
|The virtual machines that the listed Defender for Identity sensors is installed on has a network configuration mismatch. This issue might affect the performance and reliability of the sensors.|Review the network interface settings, including disabling the Large Send Offload (LSO), and follow the instructions in [here](https://aka.ms/mdi/vmware-sensor-issue).|High|Sensors health issues tab|
4756

4857
### A domain controller is unreachable by a sensor
4958

ATPDocs/identity-inventory.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -28,15 +28,15 @@ The Identities inventory page includes the following tabs:
2828

2929
- **Identities**: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.
3030

31-
- **Cloud application accounts:** Displays a list of cloud application accounts, including those from application connectors and third-party sources (original available in the previous version based on Microsoft Defender for Cloud Apps). Learn more about [Cloud application accounts from connected apps.](/defender-cloud-apps/accounts)
31+
- **Cloud application accounts:** Displays a list of cloud application accounts, including those from application connectors and third-party sources (original available in the previous version based on Microsoft Defender for Cloud Apps). Learn more about [Cloud application accounts from connected apps.](/defender-cloud-apps/accounts)
3232

3333
There are several options you can choose from to customize the identities list view. On the top navigation you can:
3434

3535
- Add or remove columns.
3636

3737
- Apply filters.
3838

39-
- Search for an identity by name or full UPN, SID and Object ID.
39+
- Search for an identity by name or full UPN, SID, and Object ID.
4040

4141
- Export the list to a CSV file.
4242

@@ -49,23 +49,23 @@ There are several options you can choose from to customize the identities list v
4949

5050
### Identity details
5151

52-
The **Identities** list offers a consolidated view of identities across Active Directory and Entra ID. It highlights key details, including the following columns by default:
52+
The **Identities** list offers a consolidated view of identities across Active Directory and Microsoft Entra IDs. It highlights key details, including the following columns by default:
5353

5454
- __Display name__ – The full name of the identity as shown in the directory.
5555

5656
- __SID__ – The Security Identifier, a unique value used to identify the identity in Active Directory.
5757

5858
- __Domain__ – The Active Directory domain to which the identity belongs.
5959

60-
- __Object ID__ – A unique identifier for the identity in Entra ID.
60+
- __Object ID__ – A unique identifier for the identity in Microsoft Entra ID.
6161

62-
- __Source__ – Indicates whether the identity is on-premises (originate from Active Directory), Cloud only (Entra ID) or Hybrid (synced from AD to Entra ID).
62+
- __Source__ – Indicates whether the identity is on-premises (originate from Active Directory), Cloud only (Entra ID) or Hybrid (synced from Azure Active Directory to Entra ID).
6363

6464
- __Type__ – Specifies if the identity is a user account or service account.
6565

6666
- __UPN (User Principal Name)__ – The unique login name of the identity in an email-like format.
6767

68-
- __Tags__ – Custom labels that help categorize or classify identities: Sensitive and Honeytoken.
68+
- __Tags__ – Custom labels that help categorize identities that are considered high value assets. For example, **Sensitive**, **Honeytoken** or **Privileged Accounts** managed by a [Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-configure) (PIM) service.
6969

7070
- __Created time__ – The timestamp when the identity was first created.
7171

@@ -75,7 +75,7 @@ The **Identities** list offers a consolidated view of identities across Active D
7575

7676
- __Last updated__ – The timestamp of the most recent update to the identity's attributes in Active Directory.
7777

78-
Non-default columns: Email and Entra ID risk level.  
78+
Nondefault columns: Email and Microsoft Entra ID risk level.  
7979

8080
> [!TIP]
8181
> To see all columns, you likely need to do one or more of the following steps:
@@ -99,13 +99,13 @@ You can apply the following filters to limit the list of identities and get a mo
9999

100100
- Account status
101101

102-
Sort option applies to Display name, Domain and Created time columns.
102+
Sort option applies to Display name, Domain, and Created time columns.
103103

104104
### Identity inventory insights
105105

106106
- The __Classify critical assets__ card allows you to define identity groups as business critical. For more information, see [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management).
107107

108-
- **Highly privileged identities** card helps you investigate in Advanced hunting all sensitive accounts in your organization, including Entra ID security administrators and Global admin users.
108+
- **Highly privileged identities** card helps you investigate in Advanced hunting all sensitive accounts in your organization, including Microsoft Entra ID security administrators and Global admin users.
109109

110110
- **Critical Active Directory service accounts** card helps you quickly identify all Active Directory accounts designated as critical, making it easier to focus on identities most at risk.
111111

ATPDocs/whats-new.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,13 @@ For updates about versions and features released six months ago or earlier, see
2424

2525
## April 2025
2626

27+
### Privileged Identity Tag Now Visible in Defender for Identity Inventory
28+
29+
Identities listed in the [Identity inventory](identity-inventory.md) in Microsoft Defender portal now include a **“Privileged account”** tag for accounts managed by a **Privileged Identity Management (PIM)** service.
30+
Privileged accounts are prime targets for attackers. Tagging them in the inventory helps you quickly identify high-risk or high-value accounts, prioritize investigation and mitigation efforts, and streamline incident response workflows.
31+
32+
Learn more about [Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-configure)
33+
2734
### New Defender for Identity and PAM Integration
2835

2936
Microsoft Defender for Identity now supports integration with industry-leading Privileged Access Management (PAM) platforms to enhance detection and response for privileged identities.
@@ -34,7 +41,7 @@ Microsoft Defender for Identity now supports integration with industry-leading P
3441
- Delinea
3542
- BeyondTrust
3643

37-
For more information see: [Integrations Defender for Identity and PAM services.](Integrate-microsoft-and-pam-services.md)
44+
For more information, see: [Integrations Defender for Identity and PAM services.](Integrate-microsoft-and-pam-services.md)
3845

3946
## March 2025
4047

@@ -77,7 +84,7 @@ New LDAP query events were added to the `IdentityQueryEvents` table in Advanced
7784
### DefenderForIdentity PowerShell module updates (version 1.0.0.3)
7885

7986
New Features and Improvements:
80-
- Support for getting, testing, and setting the Active Directory Recycle Bin in Get/Set/Test MDIConfiguration.
87+
- Support for getting, testing, and setting the Active Directory Recycle Bin in Get/Set/Test MDI Configuration.
8188
- Support for getting, testing, and setting the proxy configuration on new MDI sensor.
8289
- The Active Directory Certificate Services registry value for audit filtering now properly sets the type.
8390
- New-MDIConfigurationReport now shows the name of the tested GPO and supports Server and Identity arguments.
@@ -121,7 +128,7 @@ Additionally, the **built-in schema reference** for Advanced Hunting in Microsof
121128

122129
### New Identity guide tour
123130

124-
Explore key MDI features with the new **Identities Tour** in the M365 portal. Navigate Incidents, Hunting, and Settings to enhance identity security and threat investigation.
131+
Explore key MDI features with the new **Identities Tour** in the Microsoft 365 portal. Navigate Incidents, Hunting, and Settings to enhance identity security and threat investigation.
125132

126133
## December 2024
127134

@@ -177,11 +184,11 @@ As part of our ongoing effort to enhance Microsoft Defender for Identity coverag
177184
**New Microsoft Entra Connect Identity posture recommendations:**
178185

179186
* **Rotate password for Microsoft Entra Connect connector account**
180-
* A compromised Microsoft Entra Connect connector account (AD DS connector account, commonly shown as MSOL_XXXXXXXX) can grant access to high-privilege functions like replication and password resets, allowing attackers to modify synchronization settings and compromise security in both cloud and on-premises environments as well as offering several paths for compromising the entire domain. In this assessment we recommend customers change the password of MSOL accounts with the password last set over 90 days ago. For more information click [here](rotate-password-microsoft-entra-connect.md).
187+
* A compromised Microsoft Entra Connect connector account (AD DS connector account, commonly shown as MSOL_XXXXXXXX) can grant access to high-privilege functions like replication and password resets, allowing attackers to modify synchronization settings and compromise security in both cloud and on-premises environments as well as offering several paths for compromising the entire domain. In this assessment we recommend customers change the password of MSOL accounts with the password last set over 90 days ago. For more information, click [here](rotate-password-microsoft-entra-connect.md).
181188
* **Remove unnecessary replication permissions for Microsoft Entra Connect Account**
182-
* By default, the Microsoft Entra Connect connector account has extensive permissions to ensure proper synchronization (even if they aren't actually required). If Password Hash Sync isn't configured, it’s important to remove unnecessary permissions to reduce the potential attack surface. For more information click [here](remove-replication-permissions-microsoft-entra-connect.md)
189+
* By default, the Microsoft Entra Connect connector account has extensive permissions to ensure proper synchronization (even if they aren't required). If Password Hash Sync isn't configured, it’s important to remove unnecessary permissions to reduce the potential attack surface. For more information, click [here](remove-replication-permissions-microsoft-entra-connect.md)
183190
* **Change password for Microsoft Entra seamless SSO account configuration**
184-
* This report lists all [Microsoft Entra seamless SSO](/entra/identity/hybrid/connect/how-to-connect-sso) computer accounts with password last set over 90 days ago. The password for the Azure SSO computer account isn't automatically changed every 30 days. If an attacker compromises this account, they can generate service tickets for the AZUREADSSOACC account on behalf of any user and impersonate any user in the Microsoft Entra tenant that is synchronized from Active Directory. An attacker can use this to move laterally from Active Directory into Microsoft Entra ID. For more information click [here](change-password-microsoft-entra-seamless-single-sign-on.md).
191+
* This report lists all [Microsoft Entra seamless SSO](/entra/identity/hybrid/connect/how-to-connect-sso) computer accounts with password last set over 90 days ago. The password for the Azure SSO computer account isn't automatically changed every 30 days. If an attacker compromises this account, they can generate service tickets for the AZUREADSSOACC account on behalf of any user and impersonate any user in the Microsoft Entra tenant that is synchronized from Active Directory. An attacker can use this to move laterally from Active Directory into Microsoft Entra ID. For more information, click [here](change-password-microsoft-entra-seamless-single-sign-on.md).
185192

186193
**New Microsoft Entra Connect detections:**
187194

defender-office-365/TOC.yml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,9 @@
101101
items:
102102
- name: Defender for Office 365 SecOps guide
103103
href: mdo-sec-ops-guide.md
104+
- name: Quickly configure Microsoft Teams protection
105+
href: mdo-support-teams-quick-configure.md
106+
104107
- name: Migrate
105108
items:
106109
- name: Migrate to Defender for Office 365
@@ -116,6 +119,8 @@
116119
items:
117120
- name: Defender for Office 365 SecOps Guide
118121
href: mdo-sec-ops-guide.md
122+
- name: SecOps guide for Teams protection in Defender for Office 365
123+
href: mdo-support-teams-sec-ops-guide.md
119124
- name: Threat classification
120125
href: mdo-threat-classification.md
121126
- name: Security recommendations for priority accounts
@@ -363,6 +368,8 @@
363368
href: office-365-ti.md
364369
- name: Defender for Office 365 SecOps Guide
365370
href: mdo-sec-ops-guide.md
371+
- name: SecOps guide for Teams protection in Defender for Office 365
372+
href: mdo-support-teams-sec-ops-guide.md
366373
- name: Analyze and classify
367374
items:
368375
- name: Campaign Views

defender-office-365/mdo-deployment-guide.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,13 @@ In new Microsoft 365 organizations with Microsoft Defender for Office 365 (inclu
3030

3131
Although your Microsoft 365 organization includes a default level of protection from the moment you create it (or add Defender for Office 365 to it), the steps in this article give you an actionable plan to unleash the full protection capabilities of EOP and Defender for Office 365. After you complete the steps, you can also use this article to show management that you're maximizing your investment in Microsoft 365.
3232

33+
> [!TIP]
34+
> For information about configuring protection for Microsoft Teams, see the following articles:
35+
>
36+
> - [Microsoft Defender for Office 365 Plan 2 support for Microsoft Teams](mdo-support-teams-about.md)
37+
> - [Quickly configure Microsoft Teams protection in Microsoft Defender for Office 365 Plan 2](mdo-support-teams-quick-configure.md)
38+
> - [Security Operations Guide for Teams protection in Microsoft Defender for Office 365](mdo-support-teams-sec-ops-guide.md)
39+
3340
The steps to configure EOP and Defender for Office 365 are described in the following diagram:
3441

3542
:::image type="content" source="media/mdo-deployment-guide.png" alt-text="A conceptual diagram showing the steps to configure Defender for Office 365." lightbox="media/mdo-deployment-guide.png":::

0 commit comments

Comments
 (0)