Skip to content

Commit b4fff4d

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into painbar-macos-offline-security-intelligence-update
2 parents 4cb18c7 + fe2ba5c commit b4fff4d

File tree

63 files changed

+473
-145
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

63 files changed

+473
-145
lines changed

.openpublishing.redirection.ata-atp.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,17 +17,17 @@
1717
},
1818
{
1919
"source_path": "ATPDocs/deploy/quick-installation-guide.md",
20-
"redirect_url": "deploy/deploy-defender-identity",
20+
"redirect_url": "deploy-defender-identity",
2121
"redirect_document_id": false
2222
},
2323
{
2424
"source_path": "ATPDocs/deploy/prerequisites.md",
25-
"redirect_url": "deploy/prerequisites-sensor-version-2",
25+
"redirect_url": "prerequisites-sensor-version-2",
2626
"redirect_document_id": false
2727
},
2828
{
2929
"source_path": "ATPDocs/deploy/activate-capabilities.md",
30-
"redirect_url": "deploy/activate-sensor",
30+
"redirect_url": "activate-sensor",
3131
"redirect_document_id": false
3232
},
3333
{
456 KB
Loading

ATPDocs/remove-discoverable-passwords-active-directory-account-attributes.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: 'Security Assessment: Remove Discoverable Passwords in Active Directory Account Attributes (Preview)'
33
description: Learn how to identify and address discoverable passwords in Active Directory account attributes to mitigate security risks and improve your organization's security posture.
4-
ms.date: 08/04/2025
4+
ms.date: 08/12/2025
55
ms.topic: how-to
66
---
77

@@ -10,7 +10,7 @@ ms.topic: how-to
1010

1111
## Why do discoverable passwords in Active Directory account attributes pose a risk?
1212

13-
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges—often without triggering traditional alerts.
13+
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges.
1414

1515
Attackers seek low-friction paths to expand access. Exposed passwords in these attributes represent an easy win because:
1616

@@ -26,12 +26,12 @@ Removing exposed credentials from these attributes reduces the risk of identity
2626
## How does Microsoft Defender for Identity detect discoverable passwords?
2727

2828
> [!NOTE]
29-
> This security recommendation is part of Microsoft Defender for Identity and is powered by AI-based analysis of free-text attributes in Active Directory.
3029
> Findings can include false positives. Always validate the results before taking action.
3130
32-
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse. Microsoft Defender for Identity detects indicators such as:
31+
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse.
32+
This recommendation uses GenAI-powered analysis of Active directory attributes to detect:
3333

34-
- Plaintext passwords or variations. For example, '`Password=Summer2024!'`
34+
- Plaintext passwords or variations. For example, '`Password=Summer2025!'`
3535

3636
- Credential patterns, reset hints, or sensitive account information.
3737

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: 'Security Assessment: Remove Inactive Service Account (Preview)'
3+
description: Learn how to identify and address inactive Active Directory service accounts to mitigate security risks and improve your organization's security posture.
4+
ms.date: 08/17/2025
5+
ms.topic: how-to
6+
#customer intent: As a security administrator, I want to improve security posture in my organization by removing inactive service accounts
7+
---
8+
9+
# Security Assessment: Remove Inactive Service Accounts (Preview)
10+
11+
This recommendation lists Active Directory service accounts detected as inactive (stale) within the past 180 days.
12+
13+
## Why do inactive service accounts pose a risk?
14+
15+
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Dormant service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
16+
17+
This exposure creates several risks:
18+
19+
- Unauthorized access to sensitive applications and data.
20+
21+
- Lateral movement across the network without detection.
22+
23+
24+
## How do I use this security assessment to improve my organizational security posture?
25+
26+
To use this security assessment effectively, follow these steps:
27+
28+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions ) for Remove inactive service account.
29+
1. Review the list of exposed entities to discover which of your service account is inactive.
30+
31+
:::image type="content" source="media/okta-integration/remove-inactive-service-accounts.png" alt-text="Screenshot that shows the recommendation action to remove inactive service accounts." lightbox="media/okta-integration/remove-inactive-service-accounts.png":::
32+
33+
1. Take appropriate actions on those entities by removing the service account. For example:
34+
35+
- **Disable the account:** Prevent any usage by disabling the account identified as exposed.
36+
37+
- **Monitor for impact:** Wait several weeks and monitor for operational issues, such as service disruptions or errors.
38+
39+
- **Delete the account:** If no issues are observed, delete the account and fully remove its access.
40+
41+
> [!NOTE]
42+
> Assessments are updated in near real time, and scores and statuses are updated every 24 hours. The list of impacted entities is updated within a few minutes of your implementing the recommendations. The status might take time until it's marked as **Completed**.
43+
44+
## Related articles
45+
46+
- [Learn more about Microsoft Secure Score](/defender-xdr/microsoft-secure-score)

ATPDocs/toc.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -249,10 +249,12 @@ items:
249249
href: security-assessment-clear-text.md
250250
- name: LAPS usage assessment
251251
href: security-assessment-laps.md
252-
- name: Riskiest lateral movement paths
253-
href: security-assessment-riskiest-lmp.md
254252
- name: Remove discoverable passwords in Active Directory account attributes
255253
href: remove-discoverable-passwords-active-directory-account-attributes.md
254+
- name: Remove inactive service accounts
255+
href: remove-inactive-service-account.md
256+
- name: Riskiest lateral movement paths
257+
href: security-assessment-riskiest-lmp.md
256258
- name: Unsecure Kerberos delegation assessment
257259
href: security-assessment-unconstrained-kerberos.md
258260
- name: Unsecure SID History attributes

ATPDocs/whats-new.md

Lines changed: 23 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,27 @@ For updates about versions and features released six months ago or earlier, see
2626
## August 2025
2727

2828

29-
## New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
29+
### New security assessment: Remove inactive service accounts (Preview)
30+
31+
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been inactive (stale) for the past 180 days, to help you mitigate security risks associated with unused accounts.
32+
33+
For more information, see: [Security Assessment: Remove Inactive Service Accounts (Preview)](remove-inactive-service-account.md)
34+
35+
### New Graph based API for response actions (preview)
36+
37+
We’re excited to announce a new Graph-based API for initiating and managing remediation actions in Microsoft Defender for Identity.
38+
39+
This capability is currently in preview and available in API Beta version.
40+
41+
For more information, see [Managing response actions through Graph API](/graph/api/resources/security-identityaccounts?view=graph-rest-beta&preserve-view=true).
42+
43+
### Identity scoping is now generally available (GA)
44+
45+
Identity scoping is now generally available across all environments. Organizations can now define and refine the scope of MDI monitoring and gain granular control over which entities and resources are included in security analysis.
46+
47+
For more information, see [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
48+
49+
### New security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
3050

3151
The new security posture assessment highlights unsecured Active Directory attributes that contain passwords or credential clues and recommends steps to remove them, helping reduce the risk of identity compromise.
3252

@@ -47,11 +67,11 @@ Improved detection logic to include scenarios where accounts were locked during
4767

4868
## July 2025
4969

50-
**Expanded coverage in ITDR deployment health widget**
70+
### Expanded coverage in ITDR deployment health widget
5171

5272
The Identity Threat Detection and Response (ITDR) deployment health widget now provides visibility into the deployment status of additional server types. Previously, it only reflected the status for Active Directory domain controllers. With this update, the widget also includes deployment status for ADFS, ADCS, and Microsoft Entra Connect servers - making it easier to track and ensure full sensor coverage across all supported identity infrastructure.
5373

54-
**Time limit added to Recommended test mode**
74+
### Time limit added to Recommended test mode
5575

5676
Recommended test mode configuration on the [Adjust alert thresholds page](/defender-for-identity/advanced-settings), now requires you to set an expiration time (up to 60 days) when enabling it. The end time is shown next to the toggle while test mode is active. For customers who already have Recommended test mode enabled, a 60-day expiration is automatically applied.
5777

CloudAppSecurityDocs/app-onboarding.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ All SaaS applications that exist in the Microsoft Entra ID catalog will be avail
2626

2727
Fully performing and testing the procedures in this article requires that you have a session or access policy configured. For more information, see:
2828

29-
- [Create Microsoft Defender for Cloud Apps access policies](https://example.com)
30-
- [Create Microsoft Defender for Cloud Apps session policies](https://example.com)
29+
- [Create Microsoft Defender for Cloud Apps access policies](access-policy-aad.md)
30+
- [Create Microsoft Defender for Cloud Apps session policies](session-policy-aad.md)
3131

3232
## Supported Apps
3333

CloudAppSecurityDocs/investigate-anomaly-alerts.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ ms.topic: how-to
88
# How to investigate anomaly detection alerts
99

1010

11-
1211
Microsoft Defender for Cloud Apps provides security detections and alerts for malicious activities. The purpose of this guide is to provide you with general and practical information on each alert, to help with your investigation and remediation tasks. Included in this guide is general information about the conditions for triggering alerts. However, it's important to note that since anomaly detections are nondeterministic by nature, they're only triggered when there's behavior that deviates from the norm. Finally, some alerts might be in preview, so regularly review the official documentation for updated alert status.
1312

1413
> [!IMPORTANT]

CloudAppSecurityDocs/protect-salesforce.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ You can use the following built-in policy templates to detect and notify you abo
5555

5656
| Type | Name |
5757
| ---- | ---- |
58-
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
58+
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user) (Temporarily not supported due to limitation in Salesforce API)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
5959
| Activity policy template | Logon from a risky IP address<br />Mass download by a single user|
6060
| File policy template | Detect a file shared with an unauthorized domain<br />Detect a file shared with personal email addresses|
6161

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -269,6 +269,8 @@
269269
items:
270270
- name: Installer script based deployment
271271
href: linux-installer-script.md
272+
- name: Enabling deployment to a custom location
273+
href: linux-custom-location-installation.md
272274
- name: Ansible based deployment
273275
href: linux-install-with-ansible.md
274276
- name: Chef based deployment

0 commit comments

Comments
 (0)