You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/health-alerts.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Microsoft Defender for Identity health issues
3
3
description: This article describes all the health issues that can occur for each component, listing the cause and the steps needed to resolve the problem
4
-
ms.date: 07/09/2024
4
+
ms.date: 01/16/2025
5
5
ms.topic: how-to
6
6
---
7
7
@@ -191,6 +191,12 @@ Sensor-specific health issues are displayed in the **Sensor health issues** tab
191
191
|----|----|----|----|----|
192
192
|Radius accounting (VPN integration) data ingestion failures.|The listed Defender for Identity sensors have radius accounting (VPN integration) data ingestion failures.|Validate that the shared secret in the Defender for Identity configuration settings matches your VPN server, according to the guidance described [Configure VPN in Defender for Identity](vpn-integration.md#configure-vpn-in-defender-for-identity) section, in the [Defender for Identity VPN integration](vpn-integration.md) page.|Low|Health issues page|
193
193
194
+
### Auditing for AD CS servers is not enabled as required
|Auditing for AD CS servers is not enabled as required. (This configuration is validated once a day, per sensor).|The Advanced Auditing Policy Configuration or AD CS auditing is not enabled as required.|Enable the Advanced Auditing Policy Configuration and AD CS auditing according to the guidance as described in the [Configure auditing on AD CS](configure-windows-event-collection.md#configure-auditing-on-ad-cs) section, in the [Configure Windows Event collection](configure-windows-event-collection.md) page.|Medium|Sensors health issues tab|
199
+
194
200
### Sensor failed to retrieve Microsoft Entra Connect service configuration
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/activity-filters-queries.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,8 +20,11 @@ Below is a list of the activity filters that can be applied. Most filters suppor
20
20
- Activity objects – Search for the objects the activity was done on. This filter applies to files, folders, users, or app objects.
21
21
- Activity object ID - the ID of the object (file, folder, user, or app ID).
22
22
23
-
- Item - Enables you to search by the name or ID of any activity object (for example, user names, files, parameters, sites). For the **Activity object Item** filter, you can select whether to filter for items that **Contain**, **Equal**, or **Starts with** the specific item.
23
+
- Item - Enables you to search by the name or ID of any activity object (for example, user names, files, parameters, sites). For the **Activity object Item** filter, you can select whether to filter for items that **Contains**, **Equals**, or **Starts with** the specific item.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/app-governance-manage-app-governance.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ Cyber attacks have become increasingly sophisticated in the ways they exploit th
11
11
12
12
To understand the potential risks and stop these types of attacks, you need to gain clear visibility into your organization’s app compliance posture. You need to be able to quickly identify when an app exhibits anomalous behaviors and respond when these behaviors present risks to your environment, data, and users. <br><br>
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/app-governance-predefined-policies.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ description: Get started learning about predefined app policies.
10
10
App governance contains a set of out of the box policies to detect anomalous app behaviors. These policies are activated by default, but you can deactivate them if you choose to.<br>
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/behaviors.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,22 +26,22 @@ While behaviors might be related to security scenarios, they're not necessarily
26
26
27
27
Behaviors currently support low-fidelity, Defender for Cloud Apps detections, that may not meet the standard for alerts but are still useful in providing context during an investigation. Currently supported detections include:
28
28
29
-
|Alert name |Policy name |
30
-
|---------|---------|
31
-
|**Activity from infrequent country**|Activity from infrequent country/region |
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/discovery-docker-ubuntu-azure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,7 +105,7 @@ This procedure describes how to deploy your machine with Ubuntu. The deployment
105
105
106
106
1. Change to root privileges using `sudo -i`.
107
107
108
-
1. If you accept the [software license terms](https://go.microsoft.com/fwlink/?linkid=862492), uninstall old versions and install Docker CE by running the commands appropriate for your environment:
108
+
1. If you accept the software license terms, uninstall old versions and install Docker CE by running the commands appropriate for your environment:
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/discovery-docker-ubuntu.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,7 +105,7 @@ The following steps describe the deployment in Ubuntu. The deployment steps for
105
105
export https_proxy='<IP>:<PORT>'
106
106
```
107
107
108
-
1. If you accept the [software license terms](https://go.microsoft.com/fwlink/?linkid=862492), uninstall old versions and install Docker CE by running the commands appropriate for your environment:
108
+
1. If you accept the software license terms, uninstall old versions and install Docker CE by running the commands appropriate for your environment:
0 commit comments