Skip to content

Commit ba06b4f

Browse files
authored
Merge branch 'main' into aditisrivastava07-patch-1
2 parents 5ba7841 + 62751f9 commit ba06b4f

38 files changed

+693
-2025
lines changed

.openpublishing.redirection.ata-atp.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,31 @@
140140
"redirect_url": "manage-security-alerts",
141141
"redirect_document_id": false
142142
},
143+
{
144+
"source_path": "ATPDocs/credential-access-alerts.md",
145+
"redirect_url": "alerts-overview",
146+
"redirect_document_id": false
147+
},
148+
{
149+
"source_path": "ATPDocs/persistence-privilege-escalation-alerts.md",
150+
"redirect_url": "alerts-overview",
151+
"redirect_document_id": false
152+
},
153+
{
154+
"source_path": "ATPDocs/reconnaissance-discovery-alerts.md",
155+
"redirect_url": "alerts-overview",
156+
"redirect_document_id": false
157+
},
158+
{
159+
"source_path": "ATPDocs/lateral-movement-alerts.md",
160+
"redirect_url": "alerts-overview",
161+
"redirect_document_id": false
162+
},
163+
{
164+
"source_path": "ATPDocs/other-alerts.md",
165+
"redirect_url": "alerts-overview",
166+
"redirect_document_id": false
167+
},
143168
{
144169
"source_path": "ATPDocs/classic-activities-filtering-mcas.md",
145170
"redirect_url": "/previous-versions/defender-for-identity/classic-activities-filtering-mcas",

ATPDocs/alerts-mdi-classic.md

Lines changed: 145 additions & 0 deletions
Large diffs are not rendered by default.

ATPDocs/alerts-overview.md

Lines changed: 20 additions & 92 deletions
Large diffs are not rendered by default.

ATPDocs/alerts-xdr.md

Lines changed: 144 additions & 0 deletions
Large diffs are not rendered by default.

ATPDocs/assign-multi-factor-authentication-okta-privileged-user-accounts.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,11 @@ ms.reviewer: Himanch
1212

1313
This report lists any Okta privileged accounts that don't have any multifactor authentication (MFA) methods assigned. 
1414

15+
## Prerequisites
16+
17+
To use this security assessment, you must first connect your Okta instance in the Microsoft Defender portal.
18+
For setup instructions, see [Connect your Okta instance](/defender-for-identity/okta-integration#connect-okta-to-defender-for-identity).
19+
1520
## Why is a privileged account without MFA a security risk?
1621

1722
All privileged accounts should have multifactor authentication (MFA) enabled to strengthen security. By ensuring that privileged accounts such as Super Admin or Org Admin roles are secured with MFA, organizations can significantly reduce the risk of unauthorized access from compromised credentials. This strategy helps prevent attackers from gaining elevated access, safeguarding sensitive resources and protecting critical administrative functions from abuse.

ATPDocs/cef-format-sa.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,14 +40,14 @@ The cs2 field identifies if the alert is new or updated.
4040
The cs3 field identifies the fully qualified domain name of the source computer name.
4141

4242
> [!NOTE]
43-
> If you plan to create automation or scripts for Defender for Identity SIEM logs, we recommend using the **externalId** field to identify the alert type instead of using the alert name for this purpose. Alert names may occasionally be modified, while the **externalId** of each alert is permanent. For a list of external IDs, see [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
43+
> If you plan to create automation or scripts for Defender for Identity SIEM logs, we recommend using the **externalId** field to identify the alert type instead of using the alert name for this purpose. Alert names may occasionally be modified, while the **externalId** of each alert is permanent. For a list of external IDs, see [Security alerts](alerts-overview.md).
4444
4545
## Sample logs
4646

4747
The log examples comply with RFC 5424, but Defender for Identity also supports RFC 3164.
4848

4949
>[!NOTE]
50-
>The list below is a sample of logs sent to a SIEM. For a full list of alert details, see [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
50+
>The list below is a sample of logs sent to a SIEM. For a full list of alert details, see [Security alerts](alerts-overview.md).
5151
5252
Priorities:
5353

@@ -197,7 +197,7 @@ Priorities:
197197

198198
## See Also
199199

200-
- [Security alert name mapping and unique external IDs](alerts-overview.md#map-security-alerts-to-unique-external-id-and-mitre-attck-matrix-tactics).
200+
- [Security alerts](alerts-overview.md).
201201
- [Configure event collection](deploy/configure-event-collection.md)
202202
- [Configuring Windows event forwarding](deploy/configure-event-forwarding.md)
203203
- [Check out the Defender for Identity forum](https://aka.ms/MDIcommunity)

ATPDocs/change-okta-password-privileged-user-accounts.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,11 @@ ms.reviewer: Himanch
1111

1212
This recommendation lists any Okta privileged accounts that use outdated passwords that were last set over 180 days ago.
1313

14+
## Prerequisites
15+
16+
To use this security assessment, you must first connect your Okta instance in the Microsoft Defender portal.
17+
For setup instructions, see [Connect your Okta instance](/defender-for-identity/okta-integration#connect-okta-to-defender-for-identity).
18+
1419
## Why is a privileged account with an old password a security risk?
1520

1621
Privileged accounts with old passwords create a significant security risk, as older credentials are more likely to be exposed through data breaches or other attack vectors. Enforcing regular password updates for privileged accounts reduces the likelihood of unauthorized access and strengthens overall security. Applying stringent password policies to accounts with elevated privileges protects sensitive resources and lowers the risk of exploitation.

0 commit comments

Comments
 (0)