Skip to content

Commit baceac7

Browse files
authored
Merge branch 'main' into AruneemaXD-patch-3
2 parents 97f6dcb + ce522e9 commit baceac7

9 files changed

+606
-842
lines changed

ATPDocs/health-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Sensor-specific health issues are displayed in the **Sensor health issues** tab
103103

104104
|Alert|Description|Resolution|Severity|Displayed in|
105105
|----|----|----|----|----|
106-
|There has been no communication from the Defender for Identity sensor. The default time span for this alert is 5 minutes.|Network traffic is no longer captured by the network adapter on the Defender for Identity sensor. This affects Defender for Identity's ability to detect suspicious activities, since network traffic isn't able to reach the Defender for Identity cloud service.|Check that the port used for the communication between the Defender for Identity sensor and Defender for Identity cloud service isn't blocked by any routers or firewalls.|Medium|Sensors health issues tab|
106+
|There has been no communication from the Defender for Identity sensor. The default time span for this alert is 5 minutes.|This indicates that the sensor failed to send data or a keep-alive signal to the Defender for Identity services for a period exceeding the allowed time. This typically suggests either a network issue in the environment that prevented data transmission or a server restart that took longer than the acceptable time frame, impacting Defender for Identity's ability to detect suspicious activities.|Check the communication between the Defender for Identity sensor and Defender for Identity cloud service isn't blocked by any routers or firewalls.|Medium|Sensors health issues tab|
107107

108108
### Some Windows events are not being analyzed
109109

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,19 @@
11
---
2-
title: include file
3-
description: include file
4-
ms.topic: include
2+
title: Include file
3+
description: Include file
4+
ms.topic: Include
55
ms.date: 09/26/2023
66
---
77

88
Defender for Identity sensors can be installed on the following operating systems:
99

1010
- **Windows Server 2016**
11-
- **Windows Server 2019**. Requires [KB4487044](https://support.microsoft.com/topic/february-12-2019-kb4487044-os-build-17763-316-6502eb5d-dde8-6902-e149-27ef359ed616) or a newer cumulative update. Sensors installed on Server 2019 without this update will be automatically stopped if the *ntdsai.dll* file version found in the system directory is older than *10.0.17763.316*
11+
- **Windows Server 2019**. Requires [KB4487044](https://support.microsoft.com/topic/february-12-2019-kb4487044-os-build-17763-316-6502eb5d-dde8-6902-e149-27ef359ed616) or a newer cumulative update. Sensors installed on Server 2019 without this update will be automatically stopped if the `ntdsai.dll` file version found in the system directory is older `than 10.0.17763.316`
1212
- **Windows Server 2022**
13+
- **Windows Server 2025**
1314

1415
For all operating systems:
1516

1617
- Both servers with desktop experience and server cores are supported.
17-
- Nano servers are not supported.
18+
- Nano servers aren't supported.
1819
- Installations are supported for domain controllers, AD FS, and AD CS servers.

ATPDocs/index.yml

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
### YamlMime:Landing
22

3-
title: Microsoft Defender for Identity documentation
4-
summary: Microsoft Defender for Identity cloud service helps protect your enterprise hybrid environments from multiple types of advanced targeted cyber attacks and insider threats.
3+
title: Microsoft Defender for Identity documentation
4+
summary: Microsoft Defender for Identity cloud service helps protect your enterprise hybrid environments from multiple types of advanced targeted cyber attacks and insider threats.
55
metadata:
66
title: Microsoft Defender for Identity documentation
7-
description: Microsoft Defender for Identity cloud service helps protect your enterprise hybrid environments from multiple types of advanced targeted cyber attacks and insider threats.
7+
description: Microsoft Defender for Identity cloud service helps protect your enterprise hybrid environments from multiple types of advanced targeted cyber attacks and insider threats.
88
services: service
99
ms.service: azure-advanced-threat-protection
1010
ms.subservice: subservice
11-
ms.topic: landing-page
11+
ms.topic: landing-page
1212
ms.collection: M365-security-compliance
13-
author: batamig
14-
ms.author: bagol
15-
ms.date: 09/23/2019
13+
author: batamig
14+
ms.author: bagol
15+
ms.date: 09/23/2019
1616

1717
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
1818

@@ -32,7 +32,7 @@ landingContent:
3232
links:
3333
- text: Releases
3434
url: whats-new.md
35-
- title: Check out Defender for Identity alerts
35+
- title: Check out Defender for Identity alerts
3636
linkLists:
3737
- linkListType: get-started
3838
links:
@@ -47,21 +47,21 @@ landingContent:
4747
- linkListType: how-to-guide
4848
links:
4949
- text: Security posture assessments
50-
url: security-assessment.md
50+
url: security-assessment.md
5151
- text: Configure detection exclusions
5252
url: exclusions.md
53-
- text: Search and filter monitored activities
53+
- text: Search and filter monitored activities
5454
url: monitored-activities.md
5555
- text: Set entity tags
5656
url: entity-tags.md
5757
- text: Advanced Threat Analytics (ATA) to Defender for Identity migration
5858
url: migrate-from-ata-overview.md
59-
- title: Investigate threats
59+
- title: Investigate threats
6060
linkLists:
6161
- linkListType: tutorial
6262
links:
6363
- text: Investigate assets
64-
url: investigate-assets.md
64+
url: investigate-assets.md
6565
- text: Investigate lateral movement paths
6666
url: understand-lateral-movement-paths.md
6767
- text: Remediation actions
@@ -74,5 +74,5 @@ landingContent:
7474
url: technical-faq.yml
7575
- text: Support
7676
url: support.md
77-
- text: Defender for Identity data security and privacy
77+
- text: Defender for Identity data security and privacy
7878
url: privacy-compliance.md

defender-business/mdb-manage-subscription.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: chrisda
77
manager: deniseb
88
audience: ITPro
99
ms.topic: overview
10-
ms.date: 01/03/2024
10+
ms.date: 12/30/2024
1111
ms.service: defender-business
1212
ms.localizationpriority: medium
1313
ms.reviewer: shlomiakirav, efratka
@@ -48,12 +48,12 @@ This article describes how to apply either Defender for Business or Defender for
4848

4949
> [!IMPORTANT]
5050
> Keep the following important points in mind before you save your changes:
51-
>
5251
> - Make sure you have enough licenses for the subscription you're using for all users in your organization.
5352
> - If you select **Only Microsoft Defender for Endpoint Plan 2**, the simplified configuration experience for Defender for Business is replaced with advanced settings that you can configure in Defender for Endpoint. If this change is applied, you can't undo it.
54-
> - It can take up to three hours for your changes to be applied.
53+
> - It can take up to six hours for your changes to be applied.
5554
> - Make sure to review your security policies and settings. To get help with Defender for Endpoint policies and settings, see [Configure Defender for Endpoint capabilities](/defender-endpoint/onboard-configure). To get help with Defender for Business policies and settings, see [Review and edit your security policies and settings in Defender for Business](mdb-configure-security-settings.md).
5655
56+
5757
## Review license usage
5858

5959
The license usage report is estimated based on sign-in activities on the device. Defender for Endpoint Plan 2 licenses are assigned to users, and each user can have up to five concurrent, onboarded devices. To learn more about license terms, see [Microsoft Licensing](https://www.microsoft.com/licensing/default).

defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.custom: nextgen
99
ms.reviewer: pahuijbr
1010
manager: deniseb
1111
ms.subservice: ngp
12-
ms.date: 11/01/2024
12+
ms.date: 12/26/2024
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -75,6 +75,9 @@ For details on configuring Microsoft Configuration Manager (current branch), see
7575
> [!NOTE]
7676
> If real-time protection is turned on, files are scanned before they are accessed and executed. The scanning scope includes all files, including files on mounted removable media, such as USB drives. If the device performing the scan has real-time protection or on-access protection turned on, the scan also includes network shares.
7777
78+
> [!TIP]
79+
> If you have a Network-Attached Storage (NAS) or Storage Area Network (SAN), you can use Internet Content Adaption Protocol (ICAP) scanning with the Microsoft Defender Antivirus engine. For more information, see **[Tech Community Blog: MetaDefender ICAP with Windows Defender Antivirus: World-class security for hybrid environments](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/metadefender-icap-with-windows-defender-antivirus-world-class/ba-p/800234)**.
80+
7881
## Use PowerShell to configure scanning options
7982

8083
For more information on how to use PowerShell with Microsoft Defender Antivirus, see the following articles:

0 commit comments

Comments
 (0)