Skip to content

Commit afbab72

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into wi-476568-reorder-naming-schema-newest-first
2 parents 9c3aa49 + 13bd406 commit afbab72

File tree

176 files changed

+349
-234
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

176 files changed

+349
-234
lines changed

ATPDocs/security-assessment-unsecure-account-attributes.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,9 @@ Use the remediation appropriate to the relevant attribute as described in the fo
4040
| Enable Kerberos AES encryption support | Enable AES features on the account properties in AD | Enabling AES128_CTS_HMAC_SHA1_96 or AES256_CTS_HMAC_SHA1_96 on the account helps prevent the use of weaker encryption ciphers for Kerberos authentication. |
4141
| Remove Use Kerberos DES encryption types for this account | Remove this setting from account properties in AD | Removing this setting enables the use of stronger encryption algorithms for the account's password. |
4242
| Remove a Service Principal Name (SPN) | Remove this setting from account properties in AD | When a user account is configured with an SPN set, it means that the account has been associated with one or more SPNs. This typically occurs when a service is installed or registered to run under a specific user account, and the SPN is created to uniquely identify the service workspace for Kerberos authentication. This recommendation only showed for sensitive accounts. |
43+
|Reset password as SmartcardRequired setting was removed|Reset the account password|Changing the account's password after the SmartcardRequired UAC flag was removed ensures it was set under current security policies. This helps prevent potential exposure from passwords created when smartcard enforcement was still active.|
4344

44-
Use the **UserAccountControl** flag to manipulate user account profiles. For more information, see:
45+
Use the **UserAccountControl** (UAC) flag to manipulate user account profiles. For more information, see:
4546

4647
- [Windows Server troubleshooting](/troubleshoot/windows-server/identity/useraccountcontrol-manipulate-account-properties) documentation.
4748
- [User Properties - Account Section](/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd861342(v=ws.11))

ATPDocs/whats-new.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,6 @@ Previously, Defender for Identity tenants received Entra ID risk level in the Id
3333

3434
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Entra ID risk level to the IdentityInfo table remains unchanged.
3535

36-
3736
### New security assessment: Remove inactive service accounts (Preview)
3837

3938
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been inactive (stale) for the past 180 days, to help you mitigate security risks associated with unused accounts.
@@ -60,13 +59,12 @@ The new security posture assessment highlights unsecured Active Directory attrib
6059

6160
For more information, see: [Security Assessment: Remove discoverable passwords in Active Directory account attributes (Preview)](remove-discoverable-passwords-active-directory-account-attributes.md)
6261

63-
6462
### Microsoft Defender for Identity sensor version updates
6563

6664
|Version number |Updates |
6765
|---------|---------|
6866
|2.247|Includes bug fixes and stability improvements for the Microsoft Defender for Identity sensor.|
69-
|2.246|Includes bug fixes and stability improvements for the Microsoft Defender for Identity sensor. |
67+
|2.246|Includes bug fixes and stability improvements for the Microsoft Defender for Identity sensor.|
7068

7169
### Detection update: Suspected Brute Force attack (Kerberos, NTLM)
7270

@@ -152,10 +150,6 @@ Bug Fixes:
152150

153151
## May 2025
154152

155-
### Expanded New Sensor Deployment Support for Domain Controllers (Preview)
156-
Defender for Identity now supports deploying its new sensor on Domain Controllers without requiring Defender for Endpoint onboarding. This simplifies sensor activation and expands deployment flexibility. [Learn more](deploy/activate-sensor.md).
157-
158-
159153
### Improved Visibility into Defender for Identity New Sensor Eligibility in the Activation page
160154
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify noneligible servers and take action to update and onboard them for enhanced identity protection.
161155

CloudAppSecurityDocs/access-policy-aad.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Create access policies | Microsoft Defender for Cloud Apps
33
description: Learn how to configure Microsoft Defender for Cloud Apps access policies with Conditional Access app control to control access to cloud apps.
44
ms.date: 05/15/2024
55
ms.topic: how-to
6+
ms.reviewer: AmitMishaeli
67
---
78
# Create Microsoft Defender for Cloud Apps access policies
89

CloudAppSecurityDocs/accounts.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Investigate accounts from connected apps | Microsoft Defender for Cloud A
33
description: This article provides information about reviewing accounts from your connected apps.
44
ms.date: 01/29/2023
55
ms.topic: how-to
6+
ms.reviewer: gayasalomon
67
---
78
# Cloud Application Accounts
89

CloudAppSecurityDocs/activity-filters.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Investigate activities
33
description: This article provides a list of activities, filters, and match parameters that can be applied to activity policies.
44
ms.date: 06/24/2025
55
ms.topic: how-to
6+
ms.reviewer: gayasalomon
67
---
78

89
# Investigate activities
@@ -15,7 +16,7 @@ Microsoft Defender for Cloud Apps gives you visibility into all the activities f
1516
>
1617
> Microsoft Defender for Cloud Apps displays these activity names and types exactly as received and doesn't define or modify them. To understand the meaning of an activity, refer to the relevant third‑party API documentation.
1718
18-
The action types for events and activities are determined by the source service, whether it is a first-party or third-party service. Microsoft Defender for Cloud Apps (MDA) supports a wide range of action types and is not restricted to specific ones.
19+
The action types for events and activities are determined by the source service, whether it's a first-party or third-party service. Microsoft Defender for Cloud Apps (MDA) supports a wide range of action types and isn't restricted to specific ones.
1920
For a full list of Microsoft 365 activities monitored by Defender for Cloud Apps, see [Search the audit log in the Microsoft Purview portal](/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance#audited-activities).
2021

2122

@@ -93,7 +94,7 @@ Selecting it opens the Activity drawer **User** tab provides the following insig
9394
- **ISPs**: The number of ISPs the user connected from in the past 30 days.
9495
- **IP addresses**: The number of IP addresses the user connected from in the past 30 days.
9596

96-
:::image type="content" source="media/user-insights.png" alt-text="Screenshot that shows user insights, user activities and frequent alert locations for Defender for Cloud apps." lightbox="media/user-insights.png":::
97+
:::image type="content" source="media/user-insights.png" alt-text="Screenshot that shows user insights, user activities, and frequent alert locations for Defender for Cloud apps." lightbox="media/user-insights.png":::
9798

9899

99100
#### IP address insights
@@ -122,7 +123,7 @@ To view IP address insights:
122123
- Set as a VPN IP address and add to allowlist
123124
- Set as a Risky IP and add to blocklist
124125

125-
:::image type="content" source="media/activity-filters/ip-address-insights.png" alt-text="Screenshot that shows Ip address activities over the last 30 days." lightbox="media/activity-filters/ip-address-insights.png":::
126+
:::image type="content" source="media/activity-filters/ip-address-insights.png" alt-text="Screenshot that shows IP address activities over the last 30 days." lightbox="media/activity-filters/ip-address-insights.png":::
126127

127128

128129
> [!NOTE]

CloudAppSecurityDocs/admin-settings.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Configure admin notifications
33
description: This article provides instructions for setting admin preferences in Defender for Cloud Apps.
44
ms.date: 01/29/2023
55
ms.topic: how-to
6+
ms.reviewer: Naama-Goldbart
67
---
78
# Configure admin notifications
89

CloudAppSecurityDocs/anomaly-detection-policy.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Create anomaly detection policies | Microsoft Defender for Cloud Apps
33
description: This article provides a description of Anomaly detection policies and provides reference information about the building blocks of an anomaly detection policy.
44
ms.date: 03/01/2023
55
ms.topic: how-to
6+
ms.reviewer: Ronen-Refaeli
67
---
78

89
# Create Defender for Cloud Apps anomaly detection policies

CloudAppSecurityDocs/api-activities-investigate-script.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Investigate activities using the API
33
description: This article provides information on how to use the API to investigate user activity in Defender for Cloud Apps.
44
ms.date: 01/29/2023
55
ms.topic: how-to
6+
ms.reviewer: Naama-Goldbart
67
---
78
# Investigate activities using the API
89

@@ -18,7 +19,7 @@ The activities API mode is optimized for scanning and retrieval of large quantit
1819
## To use the activity scan script
1920

2021
1. Run the query on your data.
21-
1. If there are more records than could be listed in a single scan, you will get a return command with `nextQueryFilters` that you should run. You will get this command each time you scan until the query has returned all the results.
22+
1. If there are more records than could be listed in a single scan, you'll get a return command with `nextQueryFilters` that you should run. You'll get this command each time you scan until the query has returned all the results.
2223

2324
## Request body parameters
2425

@@ -32,9 +33,9 @@ The activities API mode is optimized for scanning and retrieval of large quantit
3233

3334
## Response parameters
3435

35-
- "data": the returned data. Will contain up to "limit" number of records each iteration. If there are more records to be pulled (hasNext=true), the last few records will be dropped to ensure that all data is listed only once.
36+
- "data": the returned data. Will contain up to "limit" number of records each iteration. If there are more records to be pulled (hasNext=true), the last few records are dropped to ensure that all data is listed only once.
3637
- "hasNext": Boolean. Denotes whether another iteration on the data is needed.
37-
- "nextQueryFilters": If another iteration is needed, it contains the consecutive JSON query to be run. Use this as the "filters" parameter in the next request. Note that if the "hasNext" parameter is set to False, this parameter will be missing since you've iterated over all of the data.
38+
- "nextQueryFilters": If another iteration is needed, it contains the consecutive JSON query to be run. Use this as the "filters" parameter in the next request. If the "hasNext" parameter is set to False, this parameter will be missing since you've iterated over all of the data.
3839

3940
The following Python example gets all the activities from the past day from Exchange Online.
4041

CloudAppSecurityDocs/app-activity-threat-hunting.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Hunt for threats in app activities | Microsoft Defender for Cloud Apps
3-
ms.date: 05/23/2025
3+
ms.date: 08/18/2025
44
ms.topic: how-to
55
description: Learn how app governance in Microsoft Defender for Cloud Apps helps you hunt for resources accessed and activities carried out by apps in your environment.
6+
ms.reviewer: shragar
67
---
78

89
# Hunt for threats in app activities

CloudAppSecurityDocs/app-governance-anomaly-detection-alerts.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
11
---
22
title: Investigate app governance threat detection alerts | Microsoft Defender for Cloud Apps
3-
ms.date: 05/23/2025
3+
ms.date: 08/18/2025
44
ms.topic: how-to
55
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
66
description: Learn how to investigate threat detection alerts from app governance in Microsoft Defender XDR with Microsoft Defender for Cloud Apps.
7+
ms.reviewer: shragar
78
---
89

910
# Investigate app governance threat detection alerts

0 commit comments

Comments
 (0)