Skip to content

Commit b88c041

Browse files
Merge branch 'main' into docs-editor/accounts-1742201200
2 parents 53ec462 + d0fdc45 commit b88c041

File tree

251 files changed

+2678
-2301
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

251 files changed

+2678
-2301
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 28 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,8 @@
8282
},
8383
{
8484
"source_path": "defender-endpoint/linux-support-rhel.md",
85-
"redirect_url": "/defender-endpoint/comprehensive-guidance-on-linux-deployment",
86-
"redirect_document_id": true
85+
"redirect_url": "/defender-endpoint/linux-installer-script",
86+
"redirect_document_id": false
8787
},
8888
{
8989
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
@@ -94,6 +94,31 @@
9494
"source_path": "defender-endpoint/monthly-security-summary-report.md",
9595
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
9696
"redirect_document_id": true
97-
}
97+
},
98+
{
99+
"source_path": "defender-endpoint/run-analyzer-macos-linux.md",
100+
"redirect_url": "/defender-endpoint/overview-client-analyzer",
101+
"redirect_document_id": true
102+
},
103+
{
104+
"source_path": "defender-endpoint/download-client-analyzer.md",
105+
"redirect_url": "/defender-endpoint/overview-client-analyzer",
106+
"redirect_document_id": false
107+
},
108+
{
109+
"source_path": "defender-endpoint/schedule-antivirus-scan-in-mde.md",
110+
"redirect_url": "/defender-endpoint/schedule-antivirus-scan-anacron",
111+
"redirect_document_id": true
112+
},
113+
{
114+
"source_path": "defender-endpoint/comprehensive-guidance-on-linux-deployment.md",
115+
"redirect_url": "/defender-endpoint/linux-installer-script",
116+
"redirect_document_id": true
117+
},
118+
{
119+
"source_path": "defender-endpoint/linux-schedule-scan-mde.md",
120+
"redirect_url": "/defender-endpoint/schedule-antivirus-scan-crontab",
121+
"redirect_document_id": true
122+
}
98123
]
99124
}

ATPDocs/manage-security-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88
# Investigate Defender for Identity security alerts in Microsoft Defender XDR
99

1010
> [!NOTE]
11-
> Defender for Identity is not designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
11+
> Defender for Identity isn't designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
1212
1313
This article explains the basics of how to work with Microsoft Defender for Identity security alerts in [Microsoft Defender XDR](/microsoft-365/security/defender/overview-security-center).
1414

@@ -87,7 +87,7 @@ On the right pane, you'll see the **Alert details**. Here you can see more detai
8787
You can also export the alert to an Excel file. To do this, select **Export.**
8888

8989
> [!NOTE]
90-
> In the Excel file, you now have two links available: **View in Microsoft Defender for Identity** and **View in Microsoft Defender XDR**. Each link will bring you to the relevant portal, and provide information about the alert there.
90+
> Alert export option is limited to Microsoft Defender for Identity Alerts with the "aa" prefix, for more information refer to [XDR Alert Sources](https://learn.microsoft.com/defender-xdr/investigate-alerts?tabs=settings#alert-sources).
9191
9292
## Tuning alerts
9393

ATPDocs/remove-rbcd-microsoft-entra-seamless-single-sign-on-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: 'Security assessment: Remove Resource Based Constrained Delegation for Microsoft Entra seamless SSO account'
33
description: This article describes Microsoft Defender for Identity's Microsoft Entra Seamless Single sign-on (SSO) account with Resource Based Constrained Delegation (RBCD) applied security posture assessment report.
44
author: RonitLitinsky
5-
ms.author: t-rlitinsky
5+
ms.author: rlitinsky
66
ms.service: microsoft-defender-for-identity
77
ms.topic: article
88
ms.date: 08/22/2024

ATPDocs/toc.yml

Lines changed: 293 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,293 @@
1-
- name: Replace Enterprise or Domain Admin account for Entra Connect AD DS
2-
Connector account
3-
href: replace-entra-connect-default-admin.md
4-
displayName: MDI
1+
items:
2+
- name: Microsoft Defender for Identity Documentation
3+
href: index.yml
4+
- name: Overview
5+
items:
6+
- name: Welcome to Defender for Identity
7+
href: what-is.md
8+
- name: What's new?
9+
href: whats-new.md
10+
- name: Deploy and monitor for Zero Trust
11+
href: zero-trust.md
12+
- name: System architecture
13+
href: architecture.md
14+
- name: Defender for Identity in the Microsoft Defender portal
15+
href: microsoft-365-security-center-mdi.md
16+
- name: Defender for Identity for US Government
17+
href: us-govt-gcc-high.md
18+
- name: Deploy
19+
expanded: true
20+
items:
21+
- name: Quick installation guide
22+
href: deploy/quick-installation-guide.md
23+
- name: Pilot and deploy Microsoft Defender XDR
24+
href: /defender-xdr/pilot-deploy-overview?toc=/defender-for-identity/toc.json&bc=/defender-for-identity/breadcrumb/toc.json
25+
- name: Defender for Identity deployment overview
26+
href: deploy/deploy-defender-identity.md
27+
- name: Plan and prepare
28+
items:
29+
- name: Defender for Identity prerequisites
30+
href: deploy/prerequisites.md
31+
- name: Plan your Defender for Identity capacity
32+
href: deploy/capacity-planning.md
33+
- name: Deploy Defender for Identity
34+
items:
35+
- name: Configure connectivity settings
36+
href: deploy/configure-proxy.md
37+
displayName: proxy
38+
- name: Test connectivity settings
39+
href: deploy/test-connectivity.md
40+
- name: Download the Defender for Identity sensor
41+
href: deploy/download-sensor.md
42+
- name: Install the Defender for Identity sensor
43+
href: deploy/install-sensor.md
44+
- name: Configure the Defender for Identity sensor
45+
href: deploy/configure-sensor-settings.md
46+
- name: Post-deployment configuration
47+
items:
48+
- name: Configure event collection
49+
items:
50+
- name: Event collection overview
51+
href: deploy/event-collection-overview.md
52+
- name: Configure audit policies for Windows event logs
53+
href: deploy/configure-windows-event-collection.md
54+
- name: Roles and permissions
55+
href: role-groups.md
56+
- name: Configure a Directory Service account
57+
items:
58+
- name: Overview
59+
href: deploy/directory-service-accounts.md
60+
displayName: Directory Service Account, DSA
61+
- name: Configure a DSA with a gMSA
62+
href: deploy/create-directory-service-account-gmsa.md
63+
- name: Configure remote calls to SAM
64+
href: deploy/remote-calls-sam.md
65+
- name: Extra deployment scenarios
66+
items:
67+
- name: Install on Microsoft AD FS / AD CS / Entra Connect servers
68+
href: deploy/active-directory-federation-services.md
69+
- name: Configure action accounts
70+
href: deploy/manage-action-accounts.md
71+
- name: Deploy for multiple Active Directory forests
72+
href: deploy/multi-forest.md
73+
- name: Configure a standalone sensor
74+
items:
75+
- name: Prerequisites for a standalone sensor
76+
href: deploy/prerequisites-standalone.md
77+
- name: Configure port mirroring
78+
href: deploy/configure-port-mirroring.md
79+
displayName: standalone
80+
- name: Configure Windows Event Forwarding
81+
href: deploy/configure-event-forwarding.md
82+
displayName: standalone
83+
- name: Listen for SIEM events
84+
href: deploy/configure-event-collection.md
85+
displayName: standalone
86+
- name: Activate Defender for Identity capabilities on your domain controller
87+
href: deploy/activate-capabilities.md
88+
- name: Manage
89+
items:
90+
- name: View the ITDR dashboard
91+
href: dashboard.md
92+
- name: View and manage health issues
93+
href: health-alerts.md
94+
- name: Defender for Identity reports
95+
href: reports.md
96+
- name: Settings
97+
items:
98+
- name: About page
99+
href: settings-about.md
100+
- name: Manage and update sensors
101+
href: sensor-settings.md
102+
- name: Uninstall a sensor
103+
href: uninstall-sensor.md
104+
- name: VPN integration
105+
href: vpn-integration.md
106+
- name: Set entity tags
107+
href: entity-tags.md
108+
- name: Configure detection exclusions
109+
href: exclusions.md
110+
- name: Automated response exclusions
111+
href: automated-response-exclusions.md
112+
- name: Email and syslog notifications
113+
href: notifications.md
114+
- name: Adjust alert thresholds
115+
href: advanced-settings.md
116+
displayName: advanced settings
117+
- name: Troubleshooting
118+
items:
119+
- name: Troubleshooting known issues
120+
href: troubleshooting-known-issues.md
121+
- name: Troubleshoot using logs
122+
href: troubleshooting-using-logs.md
123+
- name: Investigate and respond
124+
items:
125+
- name: Assets
126+
items:
127+
- name: Identity inventory
128+
href: identity-inventory.md
129+
- name: Investigate assets
130+
href: investigate-assets.md
131+
- name: Lateral movement paths
132+
items:
133+
- name: Understand and investigate lateral movement paths
134+
href: understand-lateral-movement-paths.md
135+
- name: Alerts
136+
items:
137+
- name: Alerts overview
138+
href: alerts-overview.md
139+
- name: Understanding security alerts
140+
href: understanding-security-alerts.md
141+
- name: Investigate security alerts
142+
href: manage-security-alerts.md
143+
- name: Monitored activities
144+
href: monitored-activities.md
145+
- name: Understanding Network Name Resolution (NNR)
146+
href: nnr-policy.md
147+
- name: Reconnaissance and discovery alerts
148+
href: reconnaissance-discovery-alerts.md
149+
- name: Persistence and privilege escalation alerts
150+
href: persistence-privilege-escalation-alerts.md
151+
- name: Credential access alerts
152+
href: credential-access-alerts.md
153+
- name: Lateral movement alerts
154+
href: lateral-movement-alerts.md
155+
- name: Other alerts
156+
href: other-alerts.md
157+
- name: Remediation
158+
items:
159+
- name: Remediation actions
160+
href: remediation-actions.md
161+
- name: Security posture
162+
items:
163+
- name: Overview
164+
href: security-assessment.md
165+
- name: Hybrid security
166+
items:
167+
- name: Change password for Microsoft Entra seamless SSO account
168+
href: change-password-microsoft-entra-seamless-single-sign-on.md
169+
displayName: Microsoft Entra connect
170+
- name: Rotate password for Microsoft Entra Connect connector account
171+
href: rotate-password-microsoft-entra-connect.md
172+
displayName: Microsoft Entra Connect
173+
- name: Remove unnecessary replication permissions for Microsoft Entra Connect connector account
174+
href: remove-replication-permissions-microsoft-entra-connect.md
175+
- name: Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account
176+
href: replace-entra-connect-default-admin.md
177+
- name: Identity infrastructure
178+
items:
179+
- name: Built-in Active Directory Guest account is enabled
180+
href: built-in-active-directory-guest-account-is-enabled.md
181+
- name: Change Domain Controller computer account old password
182+
href: domain-controller-account-password-change.md
183+
- name: Domain controllers with Print spooler service available assessment
184+
href: security-assessment-print-spooler.md
185+
- name: Remove local admins on identity assets
186+
href: security-assessment-remove-local-admins.md
187+
- name: Unmonitored domain controllers
188+
href: security-assessment-unmonitored-domain-controller.md
189+
- name: Unsecure domain configurations
190+
href: security-assessment-unsecure-domain-configurations.md
191+
- name: Certificates
192+
items:
193+
- name: Enforce encryption for RPC certificate enrollment interface (ESC8)
194+
href: security-assessment-enforce-encryption-rpc.md
195+
- name: Insecure ADCS certificate enrollment IIS endpoints (ESC8)
196+
href: security-assessment-insecure-adcs-certificate-enrollment.md
197+
- name: Misconfigured certificate templates owner (ESC4)
198+
href: security-assessment-edit-misconfigured-owner.md
199+
- name: Misconfigured Certificate Authority ACL (ESC7)
200+
href: security-assessment-edit-misconfigured-ca-acl.md
201+
- name: Misconfigured certificate templates ACL (ESC4)
202+
href: security-assessment-edit-misconfigured-acl.md
203+
- name: Misconfigured enrollment agent certificate template (ESC3)
204+
href: security-assessment-edit-misconfigured-enrollment-agent.md
205+
- name: Overly permissive certificate template with privileged EKU (ESC2)
206+
href: security-assessment-edit-overly-permissive-template.md
207+
- name: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
208+
href: prevent-certificate-enrollment-esc15.md
209+
- name: Prevent requests for certificates valid for arbitrary users (ESC1)
210+
href: security-assessment-prevent-users-request-certificate.md
211+
- name: Vulnerable Certificate Authority setting (ESC6)
212+
href: security-assessment-edit-vulnerable-ca-setting.md
213+
- name: Group policy
214+
items:
215+
- name: GPO assigns unprivileged identities to local groups with elevated privileges
216+
href: gpo-assigns-unprivileged-identities.md
217+
- name: GPO can be modified by unprivileged accounts
218+
href: modified-unprivileged-accounts-gpo.md
219+
- name: Reversible passwords found in GPOs
220+
href: reversible-passwords-group-policy.md
221+
- name: Accounts
222+
items:
223+
- name: Accounts with non-default Primary Group ID
224+
href: accounts-with-non-default-pgid.md
225+
- name: Admin SDHolder permissions
226+
href: security-assessment-remove-suspicious-access-rights.md
227+
- name: Change password for krbtgt account
228+
href: change-password-krbtgt-account.md
229+
- name: Change password of built-in domain Administrator account
230+
href: change-password-domain-administrator-account.md
231+
- name: Dormant entities in sensitive groups assessment
232+
href: security-assessment-dormant-entities.md
233+
- name: DCSync permissions
234+
href: security-assessment-non-admin-accounts-dcsync.md
235+
- name: Ensure privileged accounts are not delegated
236+
href: ensure-privileged-accounts-with-sensitive-flag.md
237+
- name: Entities exposing credentials in clear text assessment
238+
href: security-assessment-clear-text.md
239+
- name: LAPS usage assessment
240+
href: security-assessment-laps.md
241+
- name: Riskiest lateral movement paths
242+
href: security-assessment-riskiest-lmp.md
243+
- name: Unsecure Kerberos delegation assessment
244+
href: security-assessment-unconstrained-kerberos.md
245+
- name: Unsecure SID History attributes
246+
href: security-assessment-unsecure-sid-history-attribute.md
247+
- name: Unsecure account attributes
248+
href: security-assessment-unsecure-account-attributes.md
249+
- name: Weak cipher usage assessment
250+
href: security-assessment-weak-cipher.md
251+
- name: Reference
252+
items:
253+
- name: Operations guide
254+
items:
255+
- name: Overview
256+
displayName: operations guide
257+
href: ops-guide/ops-guide.md
258+
- name: Daily activities
259+
href: ops-guide/ops-guide-daily.md
260+
- name: Weekly activities
261+
href: ops-guide/ops-guide-weekly.md
262+
- name: Monthly activities
263+
href: ops-guide/ops-guide-monthly.md
264+
- name: Quarterly / Ad-hoc activities
265+
href: ops-guide/ops-guide-quarterly.md
266+
- name: Frequently asked questions
267+
href: technical-faq.yml
268+
- name: SIEM log reference
269+
href: cef-format-sa.md
270+
- name: PowerShell
271+
href: /powershell/defenderforidentity/overview-defenderforidentity
272+
- name: Support
273+
href: support.md
274+
- name: Defender for Identity data security and privacy
275+
href: privacy-compliance.md
276+
- name: Security baseline
277+
href: /security/benchmark/azure/baselines/defender-for-identity-security-baseline?toc=/defender-for-identity/toc.json
278+
- name: What's new archive
279+
href: whats-new-archive.md
280+
- name: Migrate from Advanced Threat Analytics (ATA)
281+
href: migrate-from-ata-overview.md
282+
- name: Microsoft Defender XDR Docs
283+
items:
284+
- name: Microsoft Defender XDR
285+
href: /microsoft-365/security/defender/
286+
- name: Microsoft Defender for Office 365
287+
href: /microsoft-365/security/office-365-security/
288+
- name: Microsoft Defender for Endpoint
289+
href: /microsoft-365/security/defender-endpoint/
290+
- name: Microsoft Defender for Cloud Apps
291+
href: /cloud-app-security/
292+
- name: Microsoft Defender Vulnerability Management
293+
href: /microsoft-365/security/defender-vulnerability-management/

ATPDocs/whats-new.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,17 @@ For updates about versions and features released six months ago or earlier, see
2424

2525
## March 2025
2626

27+
### Enhanced Identity Inventory (Preview)
28+
29+
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment.
30+
The updated Identities Inventory page now includes the following tabs:
31+
32+
- Identities: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.
33+
34+
- Cloud application accounts: Displays a list of cloud application accounts, including those from application connectors and third-party sources (original available in the previous version based on Microsoft Defender for Cloud Apps).
35+
36+
For more information, see [Identity inventory details](/defender-for-identity/identity-inventory).
37+
2738
### New LDAP query events added to the IdentityQueryEvents table in Advanced Hunting
2839
New LDAP query events were added to the `IdentityQueryEvents` table in Advanced Hunting to provide more visibility into additional LDAP search queries running in the customer environment.
2940

CloudAppSecurityDocs/activity-filters-queries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Below is a list of the activity filters that can be applied. Most filters suppor
3535
- Administrative activity – Search only for administrative activities.
3636

3737
>[!NOTE]
38-
> Defender for Cloud Apps can't mark Google Cloud Platform (GCP) administrative activities as administrative activities.
38+
> Defender for Cloud Apps classifies all GCP activities as administrative activities.
3939
4040
- Alert ID - Search by alert ID.
4141

0 commit comments

Comments
 (0)