Skip to content

Commit ba37947

Browse files
authored
Merge pull request #3041 from rlitinsky/docs-editor/activate-capabilities-1741255814
Update activate-capabilities.md
2 parents 156803e + 3d063d1 commit ba37947

File tree

4 files changed

+14
-9
lines changed

4 files changed

+14
-9
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -88,12 +88,16 @@ Activate the Defender for Identity from the [Microsoft Defender portal](https://
8888

8989
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
9090

91-
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
91+
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
92+
93+
:::image type="content" source="media/activate-capabilities/1.jpg" lightbox="media/activate-capabilities/1.jpg" alt-text="Screenshot that shows how to activate the new sensor.":::
9294

9395
> [!NOTE]
9496
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
9597
96-
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
98+
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
99+
100+
:::image type="content" source="media/activate-capabilities/2.jpg" lightbox="media/activate-capabilities/2.jpg" alt-text="Screenshot that shows how to seethe onboarded servers.":::
97101

98102
## Onboarding Confirmation
99103

@@ -104,7 +108,7 @@ To confirm the sensor has been onboarded:
104108
2. Check that the onboarded domain controller is listed.
105109

106110
> [!NOTE]
107-
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
111+
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
108112
109113
## Test activated capabilities
110114

@@ -126,7 +130,6 @@ In the Defender portal, select **Identities** > **Dashboard**, and review the de
126130

127131
For more information, see [Work with Defender for Identity's ITDR dashboard](../dashboard.md).
128132

129-
130133
### Confirm entity page details
131134

132135
Confirm that entities, such as domain controllers, users, and groups, are populated as expected.
@@ -139,7 +142,7 @@ In the Defender portal, check for the following details:
139142

140143
- **Group entities**: Use the global search to find a user group, or pivot from a user or device details page where group details are shown. Check for details of group membership, view group users, and group timeline data.
141144

142-
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
145+
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
143146

144147
For more information, see [Investigate assets](../investigate-assets.md).
145148

@@ -205,18 +208,20 @@ Test remediation actions on a test user. For example:
205208
206209
1. In the Defender portal, go to the user details page for a test user.
207210
208-
1. From the **Options** menu, select any of the available remediation actions.
211+
2. From the **Options** menu, select any of the available remediation actions.
209212
210-
1. Check Active Directory for the expected activity.
213+
3. Check Active Directory for the expected activity.
211214
212215
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
213216
214217
## Deactivate Defender for Identity capabilities on your domain controller
215218
216219
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
217220
218-
1. In the Defender portal, select **Settings > Identities > Sensors**.
219-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
221+
1. In the Defender portal, select **Settings** > **Identities** > **Sensors**.
222+
2. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
223+
224+
:::image type="content" source="media/activate-capabilities/3.jpg" lightbox="media/activate-capabilities/3.jpg" alt-text="Screenshot that shows how to deactivate a server.":::
220225
221226
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
222227
186 KB
Loading
144 KB
Loading
169 KB
Loading

0 commit comments

Comments
 (0)