Skip to content

Commit ae45b13

Browse files
Merge pull request #5811 from MicrosoftDocs/main
[AutoPublish] main to live - 12/01 13:29 PST | 12/02 02:59 IST
2 parents 7b1fb79 + 57dba8a commit ae45b13

File tree

8 files changed

+48
-92
lines changed

8 files changed

+48
-92
lines changed

defender-for-identity/deploy/configure-windows-event-collection.md

Lines changed: 33 additions & 79 deletions
Large diffs are not rendered by default.

defender-for-identity/deploy/prerequisites-sensor-version-3.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,8 +101,7 @@ Learn more about Asset Management Rule [here](/defender-xdr/configure-asset-rule
101101

102102
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
103103

104-
The Defender for Identity sensor v3.x can offer preview feature that allows automatically configure Windows event auditing on your domain controllers, applying the required Windows event auditing settings to new sensors, and fixing misconfigurations on existing ones. See [Configure auditing with the Defender for Identity sensor v3.x](configure-windows-event-collection.md#configure-windows-event-auditing-with-the-defender-for-identity-sensor-v3x).
105-
If you do not select automatic Windows auditing configuration, you must [manually configure Windows event auditing](configure-windows-event-collection.md) in the Defender portal or using PowerShell.
104+
For more information about configuring windows event auditing in the Defender portal or using PowerShell, see [Configure Windows event auditing](configure-windows-event-collection.md).
106105

107106
## Test your prerequisites
108107

defender-for-identity/whats-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: What's new | Microsoft Defender for Identity
33
description: This article is updated frequently to let you know what's new in the latest release of Microsoft Defender for Identity.
4-
ms.date: 11/16/2025
4+
ms.date: 11/30/2025
55
ms.topic: overview
66
#CustomerIntent: As a Defender for Identity customer, I want to know what's new in the latest release of Defender for Identity, so that I can take advantage of new features and functionality.
77
ms.reviewer: AbbyMSFT
@@ -31,7 +31,7 @@ For updates about versions and features released six months ago or earlier, see
3131

3232
### Automatic Windows event auditing configuration for Defender for Identity sensors v3.x (Preview)
3333

34-
Defender for Identity offers automatic Windows event-auditing configuration for sensors v3.x, streamlining deployment by applying required auditing settings to new sensors and fixing misconfigurations on existing ones; admins can enable it in the Defender portal or via the Graph API. The new feature will roll out gradually over the next few weeks, and related health alerts are expected to be available in early Jan 2026.
34+
Defender for Identity is slowly rolling out automatic Windows event auditing for sensors v3.x, streamlining deployment by applying required auditing settings to new sensors and fixing misconfigurations on existing ones. As it becomes available, you will be able to enable automatic Windows event-auditing in the **Advanced settings** section in the Defender portal, or using the Graph API.
3535

3636
### Identity Inventory enhancements: Accounts tab, manual account linking and unlinking, and expanded remediation actions
3737

defender-office-365/outbound-spam-policies-configure.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -87,8 +87,8 @@ You can configure outbound spam policies in the Microsoft Defender portal or in
8787

8888
You can use a condition only once, but the condition can contain multiple values:
8989

90-
- Multiple **values** of the **same condition** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
91-
- Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
90+
- Multiple **values** of the **same condition** use OR logic (for example, _\<sender1\>_ or _\<sender2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
91+
- Different **types of conditions** use AND logic. The sender must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
9292
- Users: `[email protected]`
9393
- Groups: Executives
9494

@@ -98,8 +98,8 @@ You can configure outbound spam policies in the Microsoft Defender portal or in
9898

9999
You can use an exception only once, but the exception can contain multiple values:
100100

101-
- Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
102-
- Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
101+
- Multiple **values** of the **same exception** use OR logic (for example, _\<sender1\>_ or _\<sender2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
102+
- Different **types of exceptions** use OR logic (for example, _\<sender1\>_ or _\<member of group1\>_ or _\<sender domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
103103

104104
When you're finished on the **Users, groups, and domains**, select **Next**.
105105

defender-xdr/investigate-alerts.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -151,15 +151,18 @@ Microsoft Defender XDR alerts come from solutions like Microsoft Defender for En
151151
152152
<a name='configure-aad-ip-alert-service'></a>
153153

154-
### Configure Microsoft Entra IP alert service
154+
### Configure alert service settings
155+
156+
To configure alert service settings in Microsoft Defender XDR:
155157

156158
1. Go to the Microsoft Defender portal ([security.microsoft.com](https://security.microsoft.com)), select **Settings** > **Microsoft Defender XDR**.
157159

158-
2. From the list, select **Alert service settings**, and then configure your **Microsoft Entra ID Protection** alert service.
160+
1. From the list, select **Alert service settings**, and then configure the alert settings for the service.
159161

160-
:::image type="content" source="/defender/media/investigate-alerts/alerts-ss-entra-alert.png" alt-text="Screenshot of Microsoft Entra ID Protection alerts setting in the Microsoft Defender portal." lightbox="/defender/media/investigate-alerts/alerts-ss-entra-alert.png":::
162+
> [!IMPORTANT]
163+
> Starting December 11, 2025, Microsoft Defender XDR is rolling out enhanced configuration options for Entra ID Protection alerts in public preview. These updates give you more granular control over risk-based alerting. The new default setting is **High-risk detections only**. Change the default setting to **High + Medium** or **All detections** based on your organization’s needs.
161164
162-
By default, only the most relevant alerts for the security operation center are enabled. If you want to get all Microsoft Entra IP risk detections, you can change it in the **Alert service settings** section.
165+
:::image type="content" source="/defender/media/investigate-alerts/alert-service-settings-entra.png" alt-text="Screenshot of Microsoft Entra ID Protection alerts setting in the Microsoft Defender portal." lightbox="/defender/media/investigate-alerts/alert-service-settings-entra.png":::
163166

164167
You can also access **Alert service settings** directly from the **Incidents** page in the Microsoft Defender portal.
165168

71 KB
Loading
-170 KB
Binary file not shown.

unified-secops-platform/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Advanced hunting and custom detection experiences now include a contextual banne
5555

5656
All features require UEBA to be enabled and are workspace-scoped to the currently selected workspace.
5757

58-
For more information, see [UEBA experiences in the Defender portal empower analysts and streamline workflows](/azure/sentinel/identify-threats-with-entity-behavior-analytics.md#ueba-experiences-in-the-defender-portal-empower-analysts-and-streamline-workflows).
58+
For more information, see [UEBA experiences in the Defender portal empower analysts and streamline workflows](/azure/sentinel/identify-threats-with-entity-behavior-analytics#ueba-experiences-in-the-defender-portal-empower-analysts-and-streamline-workflows).
5959

6060
## September 2025
6161

0 commit comments

Comments
 (0)