Skip to content

Commit b415cb9

Browse files
Merge branch 'main' into patch-54
2 parents 3c2ba9c + 564b9a4 commit b415cb9

File tree

240 files changed

+14955
-10923
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

240 files changed

+14955
-10923
lines changed

.acrolinx-config.edn

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ If you need a scoring exception for content in this PR, add the *Sign off* and t
3535
- Escalate the exception request to the Acrolinx Review Team for review.
3636
- Approve the exception and work with the GitHub Admin Team to merge the PR to the default branch.
3737
38-
For more information about the exception criteria and exception process, see [Minimum Acrolinx topic scores for publishing](https://review.docs.microsoft.com/en-us/office-authoring-guide/acrolinx-min-score?branch=main).
38+
For more information about the exception criteria and exception process, see [Minimum Acrolinx topic scores for publishing](https://review.learn.microsoft.com/en-us/office-authoring-guide/acrolinx-min-score?branch=main).
3939
4040
Select the total score link to review all feedback on clarity, consistency, tone, brand, terms, spelling, grammar, readability, and inclusive language. _You should fix all spelling errors regardless of your total score_. Fixing spelling errors helps maintain customer trust in overall content quality.
4141
@@ -54,7 +54,7 @@ Select the total score link to review all feedback on clarity, consistency, tone
5454
- [Install Acrolinx locally for VSCode for Magic](https://review.learn.microsoft.com/office-authoring-guide/acrolinx-vscode?branch=main)
5555
- [False positives or issues](https://aka.ms/acrolinxbug)
5656
- [Request a new Acrolinx term](https://microsoft.sharepoint.com/teams/M365Dev2/SitePages/M365-terminology.aspx)
57-
- [Troubleshooting issues with Acrolinx](https://review.learn.microsoft.com/help/platform/acrolinx-troubleshoot?branch)
57+
- [Troubleshooting issues with Acrolinx](https://review.learn.microsoft.com/help/platform/acrolinx-troubleshoot?branch=main)
5858
5959
"
6060
}

.openpublishing.redirection.ata-atp.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,31 @@
140140
"redirect_url": "manage-security-alerts",
141141
"redirect_document_id": false
142142
},
143+
{
144+
"source_path": "ATPDocs/credential-access-alerts.md",
145+
"redirect_url": "alerts-overview",
146+
"redirect_document_id": false
147+
},
148+
{
149+
"source_path": "ATPDocs/persistence-privilege-escalation-alerts.md",
150+
"redirect_url": "alerts-overview",
151+
"redirect_document_id": false
152+
},
153+
{
154+
"source_path": "ATPDocs/reconnaissance-discovery-alerts.md",
155+
"redirect_url": "alerts-overview",
156+
"redirect_document_id": false
157+
},
158+
{
159+
"source_path": "ATPDocs/lateral-movement-alerts.md",
160+
"redirect_url": "alerts-overview",
161+
"redirect_document_id": false
162+
},
163+
{
164+
"source_path": "ATPDocs/other-alerts.md",
165+
"redirect_url": "alerts-overview",
166+
"redirect_document_id": false
167+
},
143168
{
144169
"source_path": "ATPDocs/classic-activities-filtering-mcas.md",
145170
"redirect_url": "/previous-versions/defender-for-identity/classic-activities-filtering-mcas",

.openpublishing.redirection.defender-office-365.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,11 @@
5959
"source_path": "defender-office-365/step-by-step-guides/deploy-and-configure-the-report-message-add-in.md",
6060
"redirect_url": "/defender-office-365/submissions-outlook-report-messages",
6161
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "defender-office-365/tenant-wide-setup-for-increased-security.md",
65+
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-overview",
66+
"redirect_document_id": false
6267
}
6368
]
6469
}

ATADocs/suspicious-activity-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -536,9 +536,9 @@ Apply the latest patches to all of your machines, and check all security updates
536536

537537
1. [Remove WannaCry](https://support.microsoft.com/help/890830/remove-specific-prevalent-malware-with-windows-malicious-software-remo)
538538

539-
1. Data in the control of some ransom software can sometimes be decrypted. Decryption is only possible if the user hasn't restarted or turned off the computer. For more information, see [Wanna Cry Ransomware](https://answers.microsoft.com/en-us/windows/forum/windows_10-security/wanna-cry-ransomware/5afdb045-8f36-4f55-a992-53398d21ed07?auth=1)
539+
1. Data in the control of some ransom software can sometimes be decrypted. Decryption is only possible if the user hasn't restarted or turned off the computer. For more information, see [WannaCrypt ransomware worm targets out-of-date systems](https://www.microsoft.com/security/blog/2017/05/12/wannacrypt-ransomware-worm-targets-out-of-date-systems/)
540540

541-
>[!NOTE]
541+
> [!NOTE]
542542
> To disable a suspicious activity alert, contact support.
543543
544544
## See also

ATPDocs/alerts-mdi-classic.md

Lines changed: 145 additions & 0 deletions
Large diffs are not rendered by default.

ATPDocs/alerts-overview.md

Lines changed: 20 additions & 92 deletions
Large diffs are not rendered by default.

ATPDocs/alerts-xdr.md

Lines changed: 144 additions & 0 deletions
Large diffs are not rendered by default.

ATPDocs/assign-multi-factor-authentication-okta-privileged-user-accounts.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,11 @@ ms.reviewer: Himanch
1212

1313
This report lists any Okta privileged accounts that don't have any multifactor authentication (MFA) methods assigned. 
1414

15+
## Prerequisites
16+
17+
To use this security assessment, you must first connect your Okta instance in the Microsoft Defender portal.
18+
For setup instructions, see [Connect your Okta instance](/defender-for-identity/okta-integration#connect-okta-to-defender-for-identity).
19+
1520
## Why is a privileged account without MFA a security risk?
1621

1722
All privileged accounts should have multifactor authentication (MFA) enabled to strengthen security. By ensuring that privileged accounts such as Super Admin or Org Admin roles are secured with MFA, organizations can significantly reduce the risk of unauthorized access from compromised credentials. This strategy helps prevent attackers from gaining elevated access, safeguarding sensitive resources and protecting critical administrative functions from abuse.

ATPDocs/cef-format-sa.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,14 +40,14 @@ The cs2 field identifies if the alert is new or updated.
4040
The cs3 field identifies the fully qualified domain name of the source computer name.
4141

4242
> [!NOTE]
43-
> If you plan to create automation or scripts for Defender for Identity SIEM logs, we recommend using the **externalId** field to identify the alert type instead of using the alert name for this purpose. Alert names may occasionally be modified, while the **externalId** of each alert is permanent. For a list of external IDs, see [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
43+
> If you plan to create automation or scripts for Defender for Identity SIEM logs, we recommend using the **externalId** field to identify the alert type instead of using the alert name for this purpose. Alert names may occasionally be modified, while the **externalId** of each alert is permanent. For a list of external IDs, see [Security alerts](alerts-overview.md).
4444
4545
## Sample logs
4646

4747
The log examples comply with RFC 5424, but Defender for Identity also supports RFC 3164.
4848

4949
>[!NOTE]
50-
>The list below is a sample of logs sent to a SIEM. For a full list of alert details, see [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
50+
>The list below is a sample of logs sent to a SIEM. For a full list of alert details, see [Security alerts](alerts-overview.md).
5151
5252
Priorities:
5353

@@ -197,7 +197,7 @@ Priorities:
197197

198198
## See Also
199199

200-
- [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
200+
- [Security alerts](alerts-overview.md).
201201
- [Configure event collection](deploy/configure-event-collection.md)
202202
- [Configuring Windows event forwarding](deploy/configure-event-forwarding.md)
203203
- [Check out the Defender for Identity forum](https://aka.ms/MDIcommunity)

ATPDocs/change-okta-password-privileged-user-accounts.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,11 @@ ms.reviewer: Himanch
1111

1212
This recommendation lists any Okta privileged accounts that use outdated passwords that were last set over 180 days ago.
1313

14+
## Prerequisites
15+
16+
To use this security assessment, you must first connect your Okta instance in the Microsoft Defender portal.
17+
For setup instructions, see [Connect your Okta instance](/defender-for-identity/okta-integration#connect-okta-to-defender-for-identity).
18+
1419
## Why is a privileged account with an old password a security risk?
1520

1621
Privileged accounts with old passwords create a significant security risk, as older credentials are more likely to be exposed through data breaches or other attack vectors. Enforcing regular password updates for privileged accounts reduces the likelihood of unauthorized access and strengthens overall security. Applying stringent password policies to accounts with elevated privileges protects sensitive resources and lowers the risk of exploitation.

0 commit comments

Comments
 (0)