You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/StaleBranch.yml
+1Lines changed: 1 addition & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,7 @@ name: (Scheduled) Stale branch removal
2
2
3
3
permissions:
4
4
contents: write
5
+
pull-requests: read
5
6
6
7
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
7
8
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.
Copy file name to clipboardExpand all lines: ATPDocs/deploy/remote-calls-sam.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,10 +7,14 @@ ms.topic: how-to
7
7
8
8
# Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity
9
9
10
+
> [!IMPORTANT]
11
+
> Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. This change will happen automatically by the specified dates. No admin action is required.
12
+
>
13
+
10
14
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
11
15
12
16
> [!NOTE]
13
-
> This feature can potentially be exploited by an adversary to obtain the Net-NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
17
+
> This feature can potentially be exploited by an adversary to obtain the NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
14
18
> The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods.
15
19
>
16
20
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.
Copy file name to clipboardExpand all lines: ATPDocs/troubleshooting-known-issues.md
+3-23Lines changed: 3 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Troubleshooting known issues
3
3
description: Describes how you can troubleshoot issues in Microsoft Defender for Identity.
4
-
ms.date: 09/02/2024
4
+
ms.date: 05/08/2025
5
5
ms.topic: troubleshooting
6
6
---
7
7
@@ -117,31 +117,16 @@ The issue can be caused when the trusted root certification authorities certific
117
117
118
118
Run the following PowerShell cmdlet to verify that the required certificates are installed.
119
119
120
-
In the following example, use the "DigiCert Baltimore Root" certificate for all customers. In addition, use the "DigiCert Global Root G2" certificate for commercial customers or use the "DigiCert Global Root CA" certificate for US Government GCC High customers, as indicated.
120
+
In the following examplethe "DigiCert Global Root G2" certificate is for commercial customers and the "DigiCert Global Root CA" certificate for US Government GCC High customers, as indicated.
If you don't see the expected output, use the following steps:
170
155
171
-
1. Download the following certificates to the Server Core machine. For all customers, download the [Baltimore CyberTrust root](https://cacerts.digicert.com/BaltimoreCyberTrustRoot.crt) certificate.
172
-
173
-
In addition:
156
+
1. Download the following certificates to the machine:
174
157
175
158
- For commercial customers, download the [DigiCert Global Root G2](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt) certificate
176
159
- For US Government GCC High customers, download the [DigiCert Global Root CA](https://cacerts.digicert.com/DigiCertGlobalRootCA.crt) certificate
177
160
178
161
1. Run the following PowerShell cmdlet to install the certificate.
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,15 @@ For more information, see also:
22
22
23
23
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
24
24
25
+
## May 2025
26
+
27
+
### Local administrators collection (using SAM-R queries) feature will be disabled
28
+
Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. The details collected are used to build the potential lateral movement paths map. Alternative methods are currently being explored. This change will happen automatically by the specified dates. No admin action is required.
29
+
30
+
### New Health Issue
31
+
32
+
New [health issue](health-alerts.md#network-configuration-mismatch-for-sensors-running-on-vmware) for cases where sensors running on VMware have network configuration mismatch.
33
+
25
34
## April 2025
26
35
27
36
### Privileged Identity Tag Now Visible in Defender for Identity Inventory
@@ -47,7 +56,6 @@ For more information, see: [Integrations Defender for Identity and PAM services.
47
56
48
57
### New Service Account Discovery page
49
58
50
-
51
59
Microsoft Defender for Identity now includes a Service Account Discovery capability, offering you centralized visibility into service accounts across your Active Directory environment.
52
60
53
61
This update provides:
@@ -60,11 +68,6 @@ This update provides:
60
68
61
69
For more information, see: [Investigate and protect Service Accounts | Microsoft Defender for Identity](service-account-discovery.md).
62
70
63
-
64
-
### New Health Issue
65
-
66
-
New [health issue](health-alerts.md#network-configuration-mismatch-for-sensors-running-on-vmware) for cases where sensors running on VMware have network configuration mismatch.
67
-
68
71
### Enhanced Identity Inventory
69
72
70
73
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/activity-filters-queries.md
+14-1Lines changed: 14 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -170,8 +170,21 @@ You can export all activities from the past six months by clicking the Export bu
170
170
171
171

172
172
173
-
When exporting data:
173
+
> [!NOTE]
174
+
> **Required Permissions for Exporting Capabilities:** To utilize the exporting features, users must be assigned one of the following roles:
175
+
> -**Built-in admin roles in Defender for Cloud Apps-** These roles must be granted via [Microsoft Defender for Cloud Apps Permissions and roles settings](/defender-cloud-apps/manage-admins):
176
+
> - Global Admin
177
+
> - Cloud Discovery Global Admin
178
+
> - Security Operator
179
+
> - Compliance Admin
180
+
> - Security Reader
181
+
> -**Microsoft Entra ID Roles-** These roles must be assigned through [Microsoft Entra ID built-in roles](/entra/identity/role-based-access-control/permissions-reference):
182
+
> - Global Administrator
183
+
> - Security Administrator
184
+
> - Cloud App Security Administrator
185
+
> - Global Reader
174
186
187
+
When exporting data:
175
188
- You can choose a date range of up to six months.
176
189
- You can choose to exclude private activities.
177
190
- The exported file is limited to 100,000 records and is delivered in CSV format.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/anomaly-detection-policy.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,14 +64,14 @@ Use this detection to control file uploads and downloads in real time with sessi
64
64
65
65
By enabling file sandboxing, files that according to their metadata and based on proprietary heuristics to be potentially risky, will also be sandbox scanned in a safe environment. The Sandbox scan may detect files that were not detected based on threat intelligence sources.
66
66
67
-
Defender for Cloud Apps supports malware detection for the following apps:
67
+
Defender for Cloud Apps supports "File Sandboxing" malware detection for the following apps:
68
68
69
69
* Box
70
70
* Dropbox
71
71
* Google Workspace
72
72
73
73
> [!NOTE]
74
-
>* Proactively sandboxing will be done in third party applications (*Box*, *Dropbox* etc.). In *OneDrive* and *SharePoint* files are being scanned and sandboxed as part of the service itself.
74
+
>* Proactively sandboxing will be done in third party applications (*Box*, *Dropbox* etc.). **In *OneDrive* and *SharePoint* files are being scanned and sandboxed as part of the service itself**.
75
75
> * In *Box*, *Dropbox*, and *Google Workspace*, Defender for Cloud Apps doesn't automatically block the file, but blocking may be performed according to the app's capabilities and the app's configuration set by the customer.
76
76
> * If you're unsure about whether a detected file is truly malware or a false positive, go to the Microsoft Security Intelligence page at [https://www.microsoft.com/wdsi/filesubmission](https://www.microsoft.com/wdsi/filesubmission) and submit the file for further analysis.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/cloud-discovery-policies.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,8 +44,8 @@ Discovery policies enable you to set alerts that notify you when new apps are de
44
44
45
45
> [!NOTE]
46
46
>
47
-
> - Newly created discovery policies (or policies with updated continuous reports) trigger an alert once in 90 days per app per continuous report, regardless of whether there are existing alerts for the same app. So, for example, if you create a policy for discovering new popular apps, it may trigger additional alerts for apps that have already been discovered and alerted on.
48
-
> - Data from **snapshot reports**do not trigger alerts in app discovery policies.
47
+
> - Newly created discovery policies (or policies with updated continuous reports) trigger an alert once in 90 days per app per continuous report, regardless of whether there are existing alerts for the same app. So, for example, if you create a policy for discovering new popular apps, it might trigger additional alerts for apps that have already been discovered and alerted on.
48
+
> - Data from **snapshot reports**don't trigger alerts in app discovery policies.
49
49
50
50
For example, if you're interested in discovering risky hosting apps found in your cloud environment, set your policy as follows:
51
51
@@ -73,6 +73,11 @@ Defender for Cloud Apps searches all the logs in your cloud discovery for anomal
73
73
74
74
1. Under **Apply to** choose whether this policy applies **All continuous reports** or **Specific continuous reports**. Select whether the policy applies to **Users**, **IP addresses**, or both.
75
75
76
+
:::image type="content" source="media/apply-to-continous-reports.png" alt-text="Screenshot showing how to apply file polcies to specific continous reports" lightbox="media/apply-to-continous-reports.png":::
77
+
78
+
> [!IMPORTANT]
79
+
> When you configure an app discovery policy and select **Apply to > All continuous reports**, multiple alerts are generated for each discovery stream, including the global stream which aggregates data from all sources. To control alert volume, select **Apply to > Specific continuous reports** and choose only the relevant streams for your policy.
1. Select the dates during which the anomalous activity occurred to trigger the alert under **Raise alerts only for suspicious activities occurring after date.**
77
82
78
83
1. Set a **Daily alert limit** under **Alerts**. Select if the alert is sent as an email. Then provide email addresses as needed.
0 commit comments