You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/capacity-planning.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ This article describes how to use the Microsoft Defender for Identity sizing too
11
11
12
12
While domain controller performance may not be affected if the server doesn't have required resources, the Defender for Identity sensor may not operate as expected. For more information, see [Microsoft Defender for Identity prerequisites](prerequisites.md).
13
13
14
-
The sizing tool measures the capacity needed for domain controllers only. There is no need to run it against AD FS / AD CS servers, as the performance impact on AD FS / AD CS servers is extremely minimal to not existent.
14
+
The sizing tool measures the capacity needed for domain controllers only. There is no need to run it against AD FS / AD CS / Entra Connect servers, as the performance impact on these servers is extremely minimal to not existent.
15
15
16
16
> [!TIP]
17
17
> By default, Defender for Identity supports up to 350 sensors. To install more sensors, contact Defender for Identity support.
@@ -47,17 +47,17 @@ Common results include:
47
47
48
48
|Result |Description |
49
49
|---------|---------|
50
-
|**Yes**| The sensor is supported on your server |
50
+
|**Yes**| The sensor is supported on your server.|
51
51
|**Yes, but additional resources required**| The sensor is supported on your server as long you add any specified missing resources. |
52
-
|**Maybe**| The current **Busy Packets/Second** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
53
-
|**Maybe, but additional resources required**|The sensor may be supported on your server as long you add any specified missing resources, or the **Busy packets / Second** may be above 60K |
54
-
|**No**| The sensor isn't supported on your server. <br><br>The current **Busy Packets/Second** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
55
-
|**Missing OS Data**| There was an issue reading the operating system data. Make sure the connection to your server is able to query WMI remotely. |
56
-
|**Missing Traffic Data**| There was an issue reading the traffic data. Make sure the connection to your server is able to query performance counters remotely. |
57
-
|**Missing RAM data**| There was an issue reading the RAM data. Make sure the connection to your server is able to query WMI remotely. |
52
+
|**Maybe**| The current **Busy Packets/sec** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
53
+
|**Maybe, but additional resources required**|The sensor may be supported on your server as long you add any specified missing resources, or the **Busy packets/sec** may be above 60K.|
54
+
|**No**| The sensor isn't supported on your server. <br><br>The current **Busy Packets/sec** value may be significantly higher at that point than average. Check the timestamps to understand the processes running at that time, and whether you can limit the bandwidth for those processes under normal circumstances. |
55
+
|**Missing OS Data**| There was an issue reading the operating system data. Make sure the connection to your server is able to query WMI remotely. |
56
+
|**Missing Traffic Data**| There was an issue reading the traffic data. Make sure the connection to your server is able to query performance counters remotely. |
57
+
|**Missing RAM data**| There was an issue reading the RAM data. Make sure the connection to your server is able to query WMI remotely. |
58
58
|**Missing core data**| There was an issue reading the core data. Make sure the connection to your server is able to query WMI remotely. |
59
59
60
-
For example, the following image shows a set of results where the **Maybe** indicates that the **Busy Packets/Second** value is significantly higher at that point than average. Note that the **Display DC Times as UTC/Local** is set to *Local DC Time*. This setting helps highlight the fact that the values were taken at around 3:30 AM.
60
+
For example, the following image shows a set of results where the **Maybe** indicates that the **Busy Packets/sec** value is significantly higher at that point than average. Note that the **Display DC Times as UTC/Local** is set to *Local DC Time*. This setting helps highlight the fact that the values were taken at around 3:30 AM.
61
61
62
62
:::image type="content" source="../media/capacity-tool-maybe.png" alt-text="Screenshot of a capacity tool results showing Maybe values." lightbox="../media/capacity-tool-maybe.png":::
Copy file name to clipboardExpand all lines: ATPDocs/troubleshooting-using-logs.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
9
9
10
10
The Defender for Identity logs provide insight into what each component of Microsoft Defender for Identity sensor is doing at any given point in time.
11
11
12
-
The Defender for Identity logs are located in a subfolder called **Logs** where Defender for Identity is installed; the default location is: **C:\Program Files\Azure Advanced Threat Protection Sensor\\**. In the default installation location, it can be found at: **C:\Program Files\Azure Advanced Threat Protection Sensor\version number\Logs**.
12
+
The Defender for Identity logs are located in a subfolder called **Logs** where Defender for Identity is installed; the default location is: `C:\Program Files\Azure Advanced Threat Protection Sensor`. In the default installation location, it can be found at: `C:\Program Files\Azure Advanced Threat Protection Sensor\version number\Logs`.
13
13
14
14
## Defender for Identity sensor logs
15
15
@@ -28,7 +28,7 @@ The Defender for Identity sensor has the following logs:
28
28
29
29
## Defender for Identity deployment logs
30
30
31
-
The Defender for Identity deployment logs are located in the temp directory of the user who installed the product. It will usually be found at **%USERPROFILE%\AppData\Local\Temp**. If it was deployed by a service, it might be found at **C:\Windows\Temp**.
31
+
The Defender for Identity deployment logs are located in the temp directory of the user who installed the product. Typically, you can find these logs at `%USERPROFILE%\AppData\Local\Temp`. If the deployment was performed by a service, the logs might be located in `C:\Windows\Temp` or `C:\Windows\SystemTemp`, depending on your Windows version and patch level.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/mde-govern.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ Apps marked as **Unsanctioned** in Defender for Cloud Apps are automatically syn
20
20
21
21
- One of the following licenses:
22
22
23
-
- Defender for Cloud Apps (E5, AAD-P1m CAS-D) and Microsoft Defender for Endpoint [Plan 2](/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1-2), with endpoints onboarded to Defender for Endpoint
23
+
- Defender for Cloud Apps + Endpoint
24
24
- Microsoft 365 E5
25
25
26
26
- Microsoft Defender Antivirus. For more information, see:
0 commit comments