Skip to content

Commit b088d5f

Browse files
authored
Merge branch 'main' into docs-editor/advanced-hunting-overview-1736362252
2 parents 38fb132 + ebdcfc2 commit b088d5f

File tree

576 files changed

+5304
-2517
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

576 files changed

+5304
-2517
lines changed

.acrolinx-config.edn

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,10 @@ Select the total score link to review all feedback on clarity, consistency, tone
5151
"
5252
**More information about Acrolinx**
5353
54-
- [Install Acrolinx locally for VSCode for Magic](https://review.docs.microsoft.com/office-authoring-guide/acrolinx-vscode?branch=main)
54+
- [Install Acrolinx locally for VSCode for Magic](https://review.learn.microsoft.com/office-authoring-guide/acrolinx-vscode?branch=main)
5555
- [False positives or issues](https://aka.ms/acrolinxbug)
5656
- [Request a new Acrolinx term](https://microsoft.sharepoint.com/teams/M365Dev2/SitePages/M365-terminology.aspx)
57-
- [Troubleshooting issues with Acrolinx](https://review.docs.microsoft.com/help/contribute/acrolinx-error-messages)
57+
- [Troubleshooting issues with Acrolinx](https://review.learn.microsoft.com/help/platform/acrolinx-troubleshoot?branch)
5858
5959
"
6060
}

.github/workflows/AutoPublish.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,21 +3,23 @@ name: (Scheduled) Publish to live
33
permissions:
44
contents: write
55
pull-requests: write
6+
checks: read
67

78
on:
89
schedule:
9-
- cron: "25 5,11,17,22 * * *" # Times are UTC based on Daylight Saving Time. Need to be adjusted for Standard Time. Scheduling at :25 to account for queuing lag.
10+
- cron: "25 2,5,8,11,14,17,20,22 * * *" # Times are UTC based on Daylight Saving Time. Need to be adjusted for Standard Time. Scheduling at :25 to account for queuing lag.
1011

1112
workflow_dispatch:
1213

1314
jobs:
1415

1516
auto-publish:
1617
if: github.repository_owner == 'MicrosoftDocs' && contains(github.event.repository.topics, 'build')
17-
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-AutoPublish.yml@workflows-prod
18+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-AutoPublishV2.yml@workflows-prod
1819
with:
1920
PayloadJson: ${{ toJSON(github) }}
2021
EnableAutoPublish: true
22+
EnableAutoMerge: true
2123

2224
secrets:
2325
AccessToken: ${{ secrets.GITHUB_TOKEN }}

.github/workflows/StaleBranch.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ name: (Scheduled) Stale branch removal
22

33
permissions:
44
contents: write
5+
pull-requests: read
56

67
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
78
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1009,6 +1009,11 @@
10091009
"source_path": "CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md",
10101010
"redirect_url": "/defender-cloud-apps/troubleshooting-api-connectors-errors",
10111011
"redirect_document_id": true
1012-
}
1012+
},
1013+
{
1014+
"source_path": "CloudAppSecurityDocs/connector-platform.md",
1015+
"redirect_url": "/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps",
1016+
"redirect_document_id": true
1017+
},
10131018
]
10141019
}

ATPDocs/accounts-with-non-default-pgid.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ ms.author: liorshapira
1010
ms.service: microsoft-defender-for-identity
1111
ms.topic: article
1212
ms.date: 10/05/2024
13+
ms.reviewer: LiorShapiraa
1314
---
1415

1516
# Security Assessment: Accounts with non-default Primary Group ID

ATPDocs/advanced-settings.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ description: Learn how to configure the number of Microsoft Defender for Identit
44
ms.date: 02/11/2024
55
ms.topic: how-to
66
#CustomerIntent: As a Microsoft Defender for Identity customer, I want to reduce the number of false positives by adjusting thresholds for specific alerts.
7+
ms.reviewer: rlitinsky
78
---
89

910
# Adjust alert thresholds

ATPDocs/alerts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Security alerts
33
description: This article provides a list of the security alerts issued by Microsoft Defender for Identity.
44
ms.date: 03/23/2023
55
ms.topic: conceptual
6+
ms.reviewer: morRubin
67
---
78

89
# Security alerts in Microsoft Defender for Identity
@@ -97,7 +98,6 @@ The following table lists the mapping between alert names, their corresponding u
9798
| [Suspicious modifications to the AD CS security permissions/settings](persistence-privilege-escalation-alerts.md#suspicious-modifications-to-the-ad-cs-security-permissionssettings--external-id-2435) | 2435 | Medium | Privilege escalation |
9899
| [Account Enumeration reconnaissance (LDAP)](reconnaissance-discovery-alerts.md#account-enumeration-reconnaissance-ldap-external-id-2437-preview) (Preview) | 2437 | Medium | Account Discovery, Domain Account |
99100
| [Directory Services Restore Mode Password Change](other-alerts.md#directory-services-restore-mode-password-change-external-id-2438) | 2438 | Medium | Persistence, Account Manipulation |
100-
| [Honeytoken was queried via SAM-R](reconnaissance-discovery-alerts.md#honeytoken-was-queried-via-sam-r-external-id-2439) | 2439 | Low | Discovery |
101101
|[Group Policy Tampering ](/defender-for-identity/other-alerts)|2440|Medium|Defense evasion|
102102

103103
> [!NOTE]

ATPDocs/architecture.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ description: Learn about the Microsoft Defender for Identity system architecture
44
ms.date: 09/14/2023
55
ms.topic: overview
66
#CustomerIntent: As a Defender for Identity user, I want to understand the relevant components and how they interact with the rest of my environment so that I can best use Defender for Identity features.
7+
ms.reviewer: morRubin
78
---
89

910
# Microsoft Defender for Identity architecture

ATPDocs/built-in-active-directory-guest-account-is-enabled.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ ms.author: liorshapira
1010
ms.service: microsoft-defender-for-identity
1111
ms.topic: article
1212
ms.date: 10/05/2024
13+
ms.reviewer: LiorShapiraa
1314
---
1415

1516
# Security Assessment: Built-in Active Directory Guest account is enabled
@@ -27,11 +28,11 @@ The on-premises Guest account is a built-in, non-nominative account that allows
2728

2829
1. Take appropriate action on those accounts by **disabling** the account.
2930

30-
For example:
31+
For example:
3132

32-
![Screenshot showing guest account in AD.](media/built-in-active-directory-guest-account-is-enabled/guest-account.png)
33+
![Screenshot showing guest account in AD.](media/built-in-active-directory-guest-account-is-enabled/guest-account.png)
3334

34-
![Screenshot showing security report.](media/built-in-active-directory-guest-account-is-enabled/security-report.png)
35+
![Screenshot showing security report.](media/built-in-active-directory-guest-account-is-enabled/security-report.png)
3536

3637
## Next steps
3738

ATPDocs/cef-format-sa.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: SIEM log reference
33
description: Provides samples of logs sent from Microsoft Defender for Identity to your SIEM.
44
ms.date: 09/22/2024
55
ms.topic: conceptual
6+
ms.reviewer: rlitinsky
67
---
78

89
# Microsoft Defender for Identity SIEM log reference

0 commit comments

Comments
 (0)