Skip to content

Commit bcc509e

Browse files
Merge pull request #5627 from MicrosoftDocs/main
[AutoPublish] main to live - 11/17 10:37 PST | 11/18 00:07 IST
2 parents c535114 + 23c5361 commit bcc509e

File tree

9 files changed

+206
-83
lines changed

9 files changed

+206
-83
lines changed

defender-for-cloud-apps/ai-agent-inventory.md

Lines changed: 8 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -43,34 +43,19 @@ When Copilot Studio AI Agents are connected, a green indicator appears in the **
4343

4444
## Identify misconfigured or risky AI agents using advanced hunting
4545

46-
After you give Microsoft Defender access to your custom agents, you can use advanced hunting to help identify misconfigured or risky agents and minimize organizational exposure to potential threats.
46+
After you give Microsoft Defender access to your custom agents, you can use advanced hunting to help identify misconfigured or risky agents and minimize organizational exposure to potential threats.
47+
48+
See [Proactively hunt for threats with advanced hunting in Microsoft Defender](/defender-xdr/advanced-hunting-overview) to learn how to use queries to proactively hunt for threats.
49+
4750
We recommend that you reach out to the owners of the risky agents for more information, and that you consider quarantining or deleting risky agents.
4851

4952
1. Sign in to the Defender portal, and go **Investigation & response** -> **Hunting** -> **Advanced hunting**.
5053
1. In the **Apps & identities** section, the [AIAgentsInfo table](/defender-xdr/advanced-hunting-aiagentsinfo-table) contains data for all your custom AI agents created using Copilot Studio. You can use this data to create custom queries.
54+
1. You can use the collection of community queries to identify misconfigured or risky agents.
55+
1. **Sign in to the [Microsoft Defender portal](https://security.microsoft.com)**.
56+
1. Go to **Investigation & response** -> **Hunting** -> **Advanced hunting**.
57+
1. In the **Queries** tab, select **Community queries**. The **AI Agents** folder contains queries related to AI agents. For more information, see [Sample queries](/defender-xdr/advanced-hunting-aiagentsinfo-table).
5158

52-
### Sample queries
53-
54-
Run this query to get a list of all the agents in your tenant:
55-
56-
```kusto
57-
AIAgentsInfo
58-
| summarize arg_max(Timestamp, *) by AIAgentId
59-
```
60-
61-
Run this query to identify all published agents that are configured with an incorrect authentication mechanism:
62-
63-
```kusto
64-
AIAgentsInfo
65-
| summarize arg_max(Timestamp, *) by AIAgentId
66-
| where AgentStatus != "Deleted"
67-
| where AgentStatus == "Published"
68-
| where UserAuthenticationType == "None" or AuthenticationTrigger == "As Needed"
69-
| project-reorder AgentCreationTime ,AIAgentId, AIAgentName, AgentStatus, CreatorAccountUpn, OwnerAccountUpns
70-
```
71-
72-
73-
See [Proactively hunt for threats with advanced hunting in Microsoft Defender](/defender-xdr/advanced-hunting-overview) to learn how to use queries to proactively hunt for threats.
7459

7560
## Related articles
7661

defender-for-cloud-apps/real-time-agent-protection-during-runtime.md

Lines changed: 10 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -22,26 +22,21 @@ If Microsoft Defender determines that a prompt is suspicious:
2222
## Enable real-time protection for Microsoft Copilot Studio agents during runtime
2323

2424
> [!NOTE]
25-
> - The onboarding process for real-time protection during agent runtime requires configuration in Power Platform and collaboration with other administrators.
26-
> - If the Microsoft 365 connector isn’t properly connected, real-time agent protection during runtime continues to block suspicious activity on the AI agent, but alerts and incidents related to these actions won't appear in the Microsoft Defender portal.
25+
> The onboarding process for real-time protection during agent runtime requires configuration in Power Platform and collaboration with other administrators.
2726
2827
1. Sign in to the **[Microsoft Defender portal](https://security.microsoft.com)**:
2928
1. Navigate to **System > Settings > Cloud Apps > Copilot Studio AI Agents**.
30-
1. Check the Microsoft 365 App Connector status:
31-
- **If the connector is already connected:** Continue to step 5.
32-
- **If the connector isn’t connected:**
33-
- Under **Microsoft 365 connector**, select **Connect** or **Edit**.
34-
- Select **Microsoft Entra ID Management events** and **Microsoft 365 activities**.
35-
- Select **Connect Microsoft 365**.
36-
1. Work together with a Power Platform administrator to and Enter the App ID provided by your Power Platform administrator and select **Save**.
37-
38-
:::image type="content" source="media/protect-ai-agents/turn-on-real-time-agent-protection.png" alt-text="Screenshot that shows how to turn on Real time agent protection during runtime in the Defender portal." lightbox="media/protect-ai-agents/turn-on-real-time-agent-protection.png":::
39-
29+
1. Check the Microsoft 365 App Connector status. If the Microsoft 365 connector is not connected, [Enable the Microsoft 365 app connector](protect-office-365.md#connect-microsoft-365-to-microsoft-defender-for-cloud-apps).
30+
> [!NOTE]
31+
> If the Microsoft 365 connector isn’t connected, real-time agent protection during runtime continues to block suspicious activity on the AI agent, but alerts and incidents related to these actions won't appear in the Microsoft Defender portal.
4032
1. Work together with a Power Platform administrator to complete these onboarding steps: [Enable external threat detection and protection for Copilot Studio custom agents](/microsoft-copilot-studio/external-security-provider#step-2-configure-the-threat-detection-system).
41-
- The Power Platform administrator must use the same App ID as the App ID used in [Microsoft Entra ID application](/microsoft-copilot-studio/external-security-provider#step-1-configure-microsoft-entra-application).
42-
- Share the URL provided in the Defender portal with the Power Platform administrator to help them complete the onboarding steps.
33+
- Share the URL provided in the Defender portal with the Power Platform administrator to help them complete their onboarding steps.
34+
- Make sure that the Power Platform administrator uses the same App ID as the App ID used in [Microsoft Entra ID application](/microsoft-copilot-studio/external-security-provider#step-1-configure-microsoft-entra-application).
35+
- Get the AppID from the Power Platform administrator, and enter it in the **App ID** field in the Defender portal, then select **Save**.
36+
37+
:::image type="content" source="media/protect-ai-agents/turn-on-real-time-agent-protection.png" alt-text="Screenshot that shows how to turn on Real time agent protection during runtime in the Defender portal." lightbox="media/protect-ai-agents/turn-on-real-time-agent-protection.png":::
4338

44-
Once the Power Platform administrator completes the onboarding steps, a green **Connected** status appears in the **Microsoft 365 connector** section.
39+
Once the Power Platform administrator completes the onboarding steps, a green **Connected** status appears in the **Microsoft 365 connector** section in the Defender portal.
4540

4641
## Related articles
4742

defender-for-identity/deploy/configure-windows-event-collection.md

Lines changed: 25 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,30 @@ ms.reviewer: rlitinsky
88

99
# Configure audit policies for Windows event logs
1010

11-
To enhance detections and gather more information on user actions like NTLM logons and security group changes, Microsoft Defender for Identity relies on specific entries in Windows event logs. Proper configuration of Advanced Audit Policy settings on your domain controllers is crucial to avoid gaps in the event logs and incomplete Defender for Identity coverage.
11+
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
12+
This article describes how to optimally configure the Advanced Audit Policy settings on your domain controllers to avoid gaps in the event logs and incomplete Defender for Identity coverage.
1213

13-
This article describes how to configure your Advanced Audit Policy settings as needed for a Defender for Identity sensor. It also describes other configurations for specific event types.
14+
## Configure Windows event auditing with the Defender for Identity sensor v3.x
1415

16+
Defender for Identity sensor v3.x can automatically configure Windows event auditing on your domain controllers, applying the required Windows event auditing settings to new sensors, and fixing misconfigurations on existing ones.
17+
18+
To turn on automatic windows auditing:
19+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings**, and then **Identities**.
20+
1. In the **General** section, select **Advanced features**.
21+
1. Turn on **Automatic Windows auditing configuration**.​
22+
23+
If you do not select automatic Windows event auditing, you must manually configure Windows event collection on your domain controller.
24+
25+
## Configure Windows event auditing with the Defender for Identity sensor v2.x
26+
27+
Configure Windows event auditing on your domain controllers to support Defender for Identity detections.
1528
Defender for Identity generates health issues for each of these scenarios if they're detected. For more information, see [Microsoft Defender for Identity health issues](../health-alerts.md).
1629

1730
## Prerequisites
1831

19-
- Before you run Defender for Identity PowerShell commands, make sure that you downloaded the [Defender for Identity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/).
32+
- Before you run Defender for Identity PowerShell commands, make sure that you download the [Defender for Identity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/).
33+
> [!NOTE]
34+
> The Active Directory PowerShell module is required when configuring Defender for Identity on domain controllers. It isn’t required on ADCS servers running the Certification Authority Role Service.
2035
2136
## Generate a report of current configurations via PowerShell
2237

@@ -47,7 +62,7 @@ For more information, see the [DefenderforIdentity PowerShell reference](/powers
4762
> [!TIP]
4863
> The `Domain` mode report includes only configurations set as group policies on the domain. If you have settings defined locally on your domain controllers, we recommend that you also run the [Test-MdiReadiness.ps1](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script.
4964
50-
## Configure auditing for domain controllers
65+
## Configure Windows event auditing for domain controllers
5166

5267
Update your Advanced Audit Policy settings and extra configurations for specific events and event types, such as users, groups, computers, and more. Audit configurations for domain controllers include:
5368

@@ -120,6 +135,12 @@ The following actions describe how to modify your domain controller's Advanced A
120135
121136
**Related health issue:** [Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
122137
138+
The following command defines all settings for the domain, creates group policy objects, and links them.
139+
140+
```powershell
141+
Set-MDIConfiguration -Mode Domain -Configuration All
142+
```
143+
123144
To configure your settings, run:
124145

125146
```powershell

defender-for-identity/deploy/prerequisites-sensor-version-2.md

Lines changed: 3 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -106,24 +106,11 @@ The following table describes memory requirements on the server used for the Def
106106
> [!IMPORTANT]
107107
> When running as a virtual machine, all memory must be allocated to the virtual machine at all times.
108108
109-
## Configure Windows auditing
109+
## Configure Windows event auditing
110110

111-
Defender for Identity detections rely on specific Windows Event Log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
111+
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
112112

113-
Configure Windows event collection on your domain controller to support Defender for Identity detections. For more information, see [Event collection with Microsoft Defender for Identity](event-collection-overview.md) and [Configure audit policies for Windows event logs](configure-windows-event-collection.md).
114-
115-
You might want to use the Defender for Identity PowerShell module to configure the required settings. For example, the following command defines all settings for the domain, creates group policy objects, and links them.
116-
117-
```powershell
118-
Set-MDIConfiguration -Mode Domain -Configuration All
119-
```
120-
> [!NOTE]
121-
> The Active Directory PowerShell module is required only when configuring Defender for Identity on domain controllers. It isn’t required on ADCS servers running the Certification Authority Role Service.
122-
123-
For more information, see:
124-
- [DefenderForIdentity Module](/powershell/module/defenderforidentity/)
125-
- [Defender for Identity in the PowerShell Gallery](https://www.powershellgallery.com/packages/DefenderForIdentity/)
126-
113+
[Configure Windows event auditing](configure-windows-event-collection.md) on your domain controller to support Defender for Identity detections in the Defender portal or using PowerShell.
127114

128115
## Test your prerequisites
129116

defender-for-identity/deploy/prerequisites-sensor-version-3.md

Lines changed: 4 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -97,22 +97,13 @@ Applying the **Unified Sensor RPC Audit** tag enables a new, tested capability o
9797
9898
Learn more about Asset Management Rule [here](/defender-xdr/configure-asset-rules).
9999

100-
## Configure Windows auditing
100+
## Configure Windows event auditing
101101

102-
Defender for Identity detections rely on specific Windows Event Log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
102+
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
103103

104-
Configure Windows event collection on your domain controller to support Defender for Identity detections. For more information, see [Event collection with Microsoft Defender for Identity](event-collection-overview.md) and [Configure audit policies for Windows event logs](configure-windows-event-collection.md).
105-
106-
You might want to use the Defender for Identity PowerShell module to configure the required settings. For example, the following command defines all settings for the domain, creates group policy objects, and links them.
107-
108-
```powershell
109-
Set-MDIConfiguration -Mode Domain -Configuration All
110-
```
111-
For more information, see:
112-
- [DefenderForIdentity Module](/powershell/module/defenderforidentity/)
113-
- [Defender for Identity in the PowerShell Gallery](https://www.powershellgallery.com/packages/DefenderForIdentity/)
104+
The Defender for Identity sensor v3.x can automatically configure Windows event auditing on your domain controllers, applying the required Windows event auditing settings to new sensors, and fixing misconfigurations on existing ones. See [Configure auditing with the Defender for Identity sensor v3.x](configure-windows-event-collection.md#configure-windows-event-auditing-with-the-defender-for-identity-sensor-v3x).
105+
If you do not select automatic Windows auditing configuration, you must [manually configure Windows event auditing](configure-windows-event-collection.md) in the Defender portal or using PowerShell.
114106

115-
116107
## Test your prerequisites
117108

118109
We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if your environment has the necessary prerequisites.

defender-for-identity/nnr-policy.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,17 @@ ms.topic: article
66
ms.reviewer: rlitinsky
77
---
88

9-
# Network Name Resolution in Microsoft Defender for Identity
9+
# Network Name Resolution (NNR) in Microsoft Defender for Identity
1010

1111
Network Name Resolution (NNR) is a main component of Microsoft Defender for Identity functionality. Defender for Identity captures activities based on network traffic, Windows events, and ETW - these activities normally contain IP data.
1212

1313
Using NNR, Defender for Identity can correlate between raw activities (containing IP addresses), and the relevant computers involved in each activity. Based on the raw activities, Defender for Identity profiles entities, including computers, and generates security alerts for suspicious activities.
1414

15-
> [!NOTE]
16-
> For optimal NNR, the Defender for Identity sensor version 3.x requires a Defender for Endpoint deployment.
15+
## NNR with the Defender for Identity sensor v3.x
16+
17+
The Defender for Identity sensor v3.x automatically performs Name Resolution using the Defender device inventory and events collected by the sensor​, without the need to open additional ports in your environment.​
18+
19+
## NNR with the Defender for Identity sensor v2.x
1720

1821
To resolve IP addresses to computer names, Defender for Identity sensors look up the IP addresses using the following methods:
1922

defender-for-identity/whats-new.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: What's new | Microsoft Defender for Identity
33
description: This article is updated frequently to let you know what's new in the latest release of Microsoft Defender for Identity.
4-
ms.date: 11/12/2025
4+
ms.date: 11/16/2025
55
ms.topic: overview
66
#CustomerIntent: As a Defender for Identity customer, I want to know what's new in the latest release of Defender for Identity, so that I can take advantage of new features and functionality.
77
ms.reviewer: AbbyMSFT
@@ -44,7 +44,7 @@ For more information, see: [Link or Unlink an Account to an Identity (Preview)](
4444
You can now perform remediation actions such as disabling accounts or resetting passwords on one or more accounts linked to an identity. For more information, see: [Remediation actions](remediation-actions.md#roles-and-permissions).
4545
Defender for Identity now offers an opt-in automatic event-auditing configuration for unified sensors (V3.x). This feature streamlines deployment by automatically applying required Windows auditing settings to new sensors and fixing misconfigurations on existing ones. Admins can enable the option in the Defender for Identity Settings -> Advanced Features or via Graph API. The capability and its related health alerts will roll out globally beginning mid-November 2025.
4646

47-
**Related Health alerts:**
47+
Releated Health alerts:
4848
- NTLM Auditing is not enabled
4949
- Directory Services Advanced Auditing is not enabled as required
5050
- Directory Services Object Auditing is not enabled as required
@@ -68,8 +68,8 @@ For more information, see [Configure scoped access for Microsoft Defender for Id
6868

6969
## October 2025
7070

71-
We’re excited to announce that the Microsoft Defender for Identity Unified Sensor (v3.x) is now generally available (GA).
72-
The [unified sensor](/defender-for-identity/deploy/activate-sensor) provides enhanced coverage, improved performance across your environment and offering easier deployment and management for domain controllers.
71+
We’re excited to announce that the Microsoft Defender for Identity Sensor (v3.x) is now generally available (GA).
72+
[Version 3.x of the sensor](/defender-for-identity/deploy/activate-sensor) provides enhanced coverage, improved performance across your environment and offering easier deployment and management for domain controllers.
7373

7474
### Microsoft Defender for Identity sensor version updates
7575

0 commit comments

Comments
 (0)