Skip to content

Commit b5c2480

Browse files
authored
Merge branch 'main' into 1c4245c1-ab45-4c2b-bb00-c5e57dc43c42_39
2 parents 6130fe4 + d62a93f commit b5c2480

File tree

124 files changed

+186
-204
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

124 files changed

+186
-204
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -87,44 +87,47 @@ Activate the Defender for Identity from the [Microsoft Defender portal](https://
8787

8888
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
8989

90-
:::image type="content" source="media/activate-capabilities/1.jpg" lightbox="media/activate-capabilities/1.jpg" alt-text="Screenshot that shows how to activate the new sensor.":::
90+
[![Screenshot that shows how to activate the new sensor.](media/activate-capabilities/1.jpg)](media/activate-capabilities/1.jpg#lightbox)
9191

92-
> [!NOTE]
93-
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
92+
93+
> [!NOTE]
94+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
9495
9596
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
9697

97-
:::image type="content" source="media/activate-capabilities/2.jpg" lightbox="media/activate-capabilities/2.jpg" alt-text="Screenshot that shows how to see the onboarded servers.":::
98+
99+
[![Screenshot that shows how to see the onboarded servers.](media/activate-capabilities/2.jpg)](media/activate-capabilities/2.jpg#lightbox)
98100

99101
### Customers without domain controllers onboarded to Defender for Endpoint
100102

101103
### Connectivity requirements
102104

103-
Defender for Identity capabilities directly on domain controllers use Defender for Endpoint URL endpoints for communication, including simplified URLs.
105+
Defender for Identity capabilities directly on domain controllers use Defender for Endpoint URL endpoints for communication, including streamlined URLs.
104106

105-
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).
107+
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server), [Configure connectivity using streamlined connection](/microsoft-365/security/defender-endpoint/configure-device-connectivity#option-1-configure-connectivity-using-the-simplified-domain).
106108

107109
### Onboard Defender for Identity capabilities
108110

109111
Download the Defender for Identity onboarding package from the [Microsoft Defender portal](https://security.microsoft.com)
110112

111113
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
112114

113-
1. Select Download onboarding package and save the file in a location you can access from your domain controller.
114-
115-
:::image type="content" source="media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor.png" alt-text="Screenshot that shows how to onboard the new sensor" lightbox="media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor.png":::
115+
2. Select Download onboarding package and save the file in a location you can access from your domain controller.
116116

117-
1. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOnboardingScript.cmd` script as an Administrator.
117+
118+
[![Screenshot that shows how to onboard the new sensor.](media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor.png)](media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor.png#lightbox)
119+
120+
3. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOnboardingScript.cmd` script as an Administrator.
118121

119-
<img width="474" alt="Screenshot that shows the script." src="https://github.com/user-attachments/assets/ff2d73d4-7285-403e-979a-520e05cbf1d1" />
122+
[![screenshot that shows the onboarding script.](media/activate-capabilities/screenshot-2025-06-04-170500.png)](media/activate-capabilities/screenshot-2025-06-04-170500.png#lightbox)
120123

121124
## Onboarding Confirmation
122125

123126
To confirm the sensor has been onboarded:
124127

125128
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
126129

127-
1. Check that the onboarded domain controller is listed.
130+
2. Check that the onboarded domain controller is listed.
128131

129132
> [!NOTE]
130133
> The onboarding doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
@@ -242,7 +245,7 @@ If you want to deactivate Defender for Identity capabilities on your domain cont
242245
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
243246
244247
![Screenshot that shows how to delete a sensor.](media/activate-capabilities/screenshot-that-shows-how-to-delete-a-sensor.png)
245-
248+
246249
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
247250
248251
### Customers without domain controllers onboarded to Defender for Endpoint
374 KB
Loading

ATPDocs/security-assessment-laps.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,10 @@ LAPS provides a solution to the issue of using a common local account with an id
2020

2121
LAPS simplifies password management while helping customers implement more recommended defenses against cyberattacks. In particular, the solution mitigates the risk of lateral escalation that results when customers use the same administrative local account and password combination on their computers. LAPS stores the password for each computer's local administrator account in AD, secured in a confidential attribute in the computer's corresponding AD object. The computer can update its own password data in AD, and domain administrators can grant read access to authorized users or groups, such as workstation helpdesk administrators.
2222

23+
> [!NOTE]
24+
> In some cases, [Microsoft Entra hybrid joined](/azure/active-directory/devices/concept-hybrid-join) machines may still appear in the security posture assessment even if LAPS is configured in Microsoft Entra ID. This can be due to how the policy is applied or how the device reports its state.
25+
> If this occurs, we suggest reviewing the LAPS configuration in Microsoft Entra ID to confirm everything is set up as expected. You can find more details [here](https://techcommunity.microsoft.com/blog/microsoft-entra-blog/windows-local-administrator-password-solution-with-microsoft-entra-id-now-genera/3911999).
26+
2327
## How do I use this security assessment?
2428

2529
1. Review the recommended action at <https://security.microsoft.com/securescore?viewid=actions> to discover which of your domains have some (or all) compatible Windows devices that aren't protected by LAPS, or that haven't had their LAPS managed password changed in the last 60 days.
@@ -33,7 +37,7 @@ LAPS simplifies password management while helping customers implement more recom
3337
1. Take appropriate action on those devices by downloading, installing, and configuring or troubleshooting [Microsoft LAPS](https://go.microsoft.com/fwlink/?linkid=2104282) or [Windows LAPS](/windows-server/identity/laps/laps-overview).
3438

3539
![Remediate devices unprotected by LAPS.](media/laps-unprotected-devices.png)
36-
40+
3741
> [!NOTE]
3842
> While assessments are updated in near real time, scores and statuses are updated every 24 hours. While the list of impacted entities is updated within a few minutes of your implementing the recommendations, the status may still take time until it will be marked as **Completed**.
3943

CloudAppSecurityDocs/protect-workplace.md

Lines changed: 3 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Protect your Workplace environment | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your Workplace app to Defender for Cloud Apps using the API connector.
44
ms.topic: how-to
5-
ms.date: 12/08/2024
5+
ms.date: 06/09/2025
66
---
77

88
# How Defender for Cloud Apps helps protect your Workplace environment (Preview)
@@ -59,44 +59,8 @@ For more information, see:
5959

6060
## Connect Workplace to Microsoft Defender for Cloud Apps
6161

62-
This section provides instructions for connecting Microsoft Defender for Cloud Apps to your existing Workplace account using the App Connector APIs. This connection gives you visibility into and control over your organization's Workplace use.
63-
64-
> [!NOTE]
65-
> The Workplace API connector is rolling out gradually. If you don't see the connector yet in your environment and want to onboard soon, please fill the [Workplace API connector intake form](https://forms.microsoft.com/r/euj3pEmiM4).
66-
67-
**Prerequisites**:
68-
69-
- You must be signed-in as a system admin to Workplace by Meta.
70-
71-
> [!NOTE]
72-
> A Workplace account can be connected to a single instance of Defender for Cloud Apps. Please make sure that your Workplace account is not connected to any other Defender for Cloud Apps instance.
73-
74-
**To connect Workplace to Defender for Cloud Apps**:
75-
76-
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**.
77-
1. In the **App connectors** page, select **+Connect an app**, by **Workplace by Meta**.
78-
1. In the pop-up, give the connector a descriptive name, and select **Next**.
79-
![Give connector a name.](media/workplace-connector.png)
80-
81-
1. In the **External Link** page, select **Connect Workplace by Meta**:
82-
![Connect to Workplace.](media/connect-workplace.png)
83-
84-
1. You'll be redirected to Workplace by Meta page.
85-
86-
>[!NOTE]
87-
>Make sure you are logged into Workplace as System admin.
88-
89-
1. On the Workplace authorization page, make sure to choose the correct organization from the dropdown.
90-
91-
1. In the app consent page, make sure to choose **All groups** and then select **Add to Workplace.**
92-
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
93-
94-
> [!NOTE]
95-
>
96-
> - The first connection can take up to 4 hours to get all users and their activities.
97-
> - The activities that will show are the activities that were generated from the moment the connector is connected.
98-
> - After the connector's **Status** is marked as **Connected**, the connector is live and works.
99-
> - Before deleting the app in Workplace, make sure to disconnect the connector in Defender for Cloud Apps.
62+
> [!NOTE]
63+
> Due to the [planned deprecation](https://www.workplace.com/help/work/1167689491269151) by Meta of Workplace from Meta, we no longer support new connections to the Workplace from Meta API connector. If you have an existing Workplace from Meta connection, it will continue to work as expected.
10064
10165
## Next steps
10266

defender-endpoint/amsi-on-mdav.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
manager: deniseb
77
ms.reviewer: yongrhee
88
ms.date: 12/05/2024
9-
ms.topic: conceptual
9+
ms.topic: concept-article
1010
ms.service: defender-endpoint
1111
ms.subservice: ngp
1212
ms.custom:

defender-endpoint/analyzer-report.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier3
15-
ms.topic: conceptual
15+
ms.topic: concept-article
1616
ms.subservice: onboard
1717
search.appverid: met150
1818
ms.date: 03/27/2025

defender-endpoint/android-intune.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
- mde-android
1414
ms.custom: partner-contribution
15-
ms.topic: conceptual
15+
ms.topic: install-set-up-deploy
1616
ms.subservice: android
1717
search.appverid: met150
1818
ms.date: 03/24/2025

defender-endpoint/application-deployment-via-mecm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier1
15-
ms.topic: conceptual
15+
ms.topic: install-set-up-deploy
1616
ms.date: 03/27/2025
1717
---
1818

defender-endpoint/attack-surface-reduction-rules-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.author: deniseb
1010
ms.reviewer: sugamar
1111
manager: deniseb
1212
ms.custom: asr
13-
ms.topic: conceptual
13+
ms.topic: concept-article
1414
ms.collection:
1515
- m365-security
1616
- m365solution-asr-rules

defender-endpoint/azure-server-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- tier3
15-
ms.topic: conceptual
15+
ms.topic: concept-article
1616
ms.date: 03/27/2025
1717
---
1818

0 commit comments

Comments
 (0)