Skip to content

Commit b548dea

Browse files
authored
Merge branch 'public' into patch-2
2 parents 41d2904 + b3a0de7 commit b548dea

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

ATPDocs/whats-new.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## August 2025
2727

28-
**Suspected Brute Force attack (Kerberos, NTLM):** Improved detection logic now includes scenarios where accounts were locked during the attacks - note that the number of triggered alerts may increase.
28+
**Suspected Brute Force attack (Kerberos, NTLM):** Improved detection logic now includes scenarios where accounts were locked during the attacks. As a result, the number of triggered alerts might increase.
2929

3030
## July 2025
3131

@@ -37,17 +37,17 @@ For more information, see [Configure scoped access for Microsoft Defender for Id
3737

3838
### New security posture assessments for unmonitored identity servers
3939

40-
Microsoft Defender for Identity now includes three security posture assessments that detect when Microsoft Entra Connect, Active Directory Federation Services (ADFS), or Active Directory Certificate Services (ADCS) servers are present in your environment but aren't monitored.
40+
Microsoft Defender for Identity three new security posture assessments detect when Microsoft Entra Connect, Active Directory Federation Services (ADFS), or Active Directory Certificate Services (ADCS) servers are present in your environment but aren't monitored.
4141

4242
Use these assessments to improve monitoring coverage and strengthen your hybrid identity security posture.
4343

44-
For more details, see:
44+
For more information, see:
4545

4646
[Security Assessment: Unmonitored ADCS servers](unmonitored-active-directory-certificate-services-server.md)
4747

4848
[Security Assessment: Unmonitored ADFS servers](unmonitored-active-directory-federation-services-servers.md)
4949

50-
[Security Assessment: Unmonitored Entra Connect servers](unmonitored-entra-connect-servers.md)
50+
[Security Assessment: Unmonitored Microsoft Entra Connect servers](unmonitored-entra-connect-servers.md)
5151

5252

5353

@@ -65,7 +65,7 @@ Scoping by Active Directory domains helps:
6565

6666
- Support operational boundaries: Align access for SOC analysts, identity administrators, and regional teams.
6767

68-
For more information see: [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
68+
For more information, see: [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
6969

7070

7171
### Okta integration is now available in Microsoft Defender for Identity
@@ -106,7 +106,7 @@ Defender for Identity now supports deploying its new sensor on Domain Controller
106106
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify noneligible servers and take action to update and onboard them for enhanced identity protection.
107107

108108

109-
### Local administrators collection (using SAM-R queries) feature will be disabled
109+
### Local administrators collection (using SAM-R queries) feature is disabled
110110
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change occurs automatically by the specified date, and no administrative action is required.
111111

112112
### New Health Issue
@@ -152,7 +152,7 @@ For more information, see: [Investigate and protect Service Accounts | Microsoft
152152

153153
### Enhanced Identity Inventory
154154

155-
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment.
155+
The Identities page under *Assets* was updated to provide better visibility and management of identities across your environment.
156156
The updated Identities Inventory page now includes the following tabs:
157157

158158
- Identities: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.

0 commit comments

Comments
 (0)