You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/ai-agent-inventory.md
+8-23Lines changed: 8 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,34 +43,19 @@ When Copilot Studio AI Agents are connected, a green indicator appears in the **
43
43
44
44
## Identify misconfigured or risky AI agents using advanced hunting
45
45
46
-
After you give Microsoft Defender access to your custom agents, you can use advanced hunting to help identify misconfigured or risky agents and minimize organizational exposure to potential threats.
46
+
After you give Microsoft Defender access to your custom agents, you can use advanced hunting to help identify misconfigured or risky agents and minimize organizational exposure to potential threats.
47
+
48
+
See [Proactively hunt for threats with advanced hunting in Microsoft Defender](/defender-xdr/advanced-hunting-overview) to learn how to use queries to proactively hunt for threats.
49
+
47
50
We recommend that you reach out to the owners of the risky agents for more information, and that you consider quarantining or deleting risky agents.
48
51
49
52
1. Sign in to the Defender portal, and go **Investigation & response** -> **Hunting** -> **Advanced hunting**.
50
53
1. In the **Apps & identities** section, the [AIAgentsInfo table](/defender-xdr/advanced-hunting-aiagentsinfo-table) contains data for all your custom AI agents created using Copilot Studio. You can use this data to create custom queries.
54
+
1. You can use the collection of community queries to identify misconfigured or risky agents.
55
+
1.**Sign in to the [Microsoft Defender portal](https://security.microsoft.com)**.
56
+
1. Go to **Investigation & response** -> **Hunting** -> **Advanced hunting**.
57
+
1. In the **Queries** tab, select **Community queries**. The **AI Agents** folder contains queries related to AI agents. For more information, see [Sample queries](/defender-xdr/advanced-hunting-aiagentsinfo-table).
51
58
52
-
### Sample queries
53
-
54
-
Run this query to get a list of all the agents in your tenant:
55
-
56
-
```kusto
57
-
AIAgentsInfo
58
-
| summarize arg_max(Timestamp, *) by AIAgentId
59
-
```
60
-
61
-
Run this query to identify all published agents that are configured with an incorrect authentication mechanism:
62
-
63
-
```kusto
64
-
AIAgentsInfo
65
-
| summarize arg_max(Timestamp, *) by AIAgentId
66
-
| where AgentStatus != "Deleted"
67
-
| where AgentStatus == "Published"
68
-
| where UserAuthenticationType == "None" or AuthenticationTrigger == "As Needed"
See [Proactively hunt for threats with advanced hunting in Microsoft Defender](/defender-xdr/advanced-hunting-overview) to learn how to use queries to proactively hunt for threats.
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/real-time-agent-protection-during-runtime.md
+10-15Lines changed: 10 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,26 +22,21 @@ If Microsoft Defender determines that a prompt is suspicious:
22
22
## Enable real-time protection for Microsoft Copilot Studio agents during runtime
23
23
24
24
> [!NOTE]
25
-
> - The onboarding process for real-time protection during agent runtime requires configuration in Power Platform and collaboration with other administrators.
26
-
> - If the Microsoft 365 connector isn’t properly connected, real-time agent protection during runtime continues to block suspicious activity on the AI agent, but alerts and incidents related to these actions won't appear in the Microsoft Defender portal.
25
+
> The onboarding process for real-time protection during agent runtime requires configuration in Power Platform and collaboration with other administrators.
27
26
28
27
1. Sign in to the **[Microsoft Defender portal](https://security.microsoft.com)**:
29
28
1. Navigate to **System > Settings > Cloud Apps > Copilot Studio AI Agents**.
30
-
1. Check the Microsoft 365 App Connector status:
31
-
-**If the connector is already connected:** Continue to step 5.
32
-
-**If the connector isn’t connected:**
33
-
- Under **Microsoft 365 connector**, select **Connect** or **Edit**.
34
-
- Select **Microsoft Entra ID Management events** and **Microsoft 365 activities**.
35
-
- Select **Connect Microsoft 365**.
36
-
1. Work together with a Power Platform administrator to and Enter the App ID provided by your Power Platform administrator and select **Save**.
37
-
38
-
:::image type="content" source="media/protect-ai-agents/turn-on-real-time-agent-protection.png" alt-text="Screenshot that shows how to turn on Real time agent protection during runtime in the Defender portal." lightbox="media/protect-ai-agents/turn-on-real-time-agent-protection.png":::
39
-
29
+
1. Check the Microsoft 365 App Connector status. If the Microsoft 365 connector is not connected, [Enable the Microsoft 365 app connector](protect-office-365.md#connect-microsoft-365-to-microsoft-defender-for-cloud-apps).
30
+
> [!NOTE]
31
+
> If the Microsoft 365 connector isn’t connected, real-time agent protection during runtime continues to block suspicious activity on the AI agent, but alerts and incidents related to these actions won't appear in the Microsoft Defender portal.
40
32
1. Work together with a Power Platform administrator to complete these onboarding steps: [Enable external threat detection and protection for Copilot Studio custom agents](/microsoft-copilot-studio/external-security-provider#step-2-configure-the-threat-detection-system).
41
-
- The Power Platform administrator must use the same App ID as the App ID used in [Microsoft Entra ID application](/microsoft-copilot-studio/external-security-provider#step-1-configure-microsoft-entra-application).
42
-
- Share the URL provided in the Defender portal with the Power Platform administrator to help them complete the onboarding steps.
33
+
- Share the URL provided in the Defender portal with the Power Platform administrator to help them complete their onboarding steps.
34
+
- Make sure that the Power Platform administrator uses the same App ID as the App ID used in [Microsoft Entra ID application](/microsoft-copilot-studio/external-security-provider#step-1-configure-microsoft-entra-application).
35
+
- Get the AppID from the Power Platform administrator, and enter it in the **App ID** field in the Defender portal, then select **Save**.
36
+
37
+
:::image type="content" source="media/protect-ai-agents/turn-on-real-time-agent-protection.png" alt-text="Screenshot that shows how to turn on Real time agent protection during runtime in the Defender portal." lightbox="media/protect-ai-agents/turn-on-real-time-agent-protection.png":::
43
38
44
-
Once the Power Platform administrator completes the onboarding steps, a green **Connected** status appears in the **Microsoft 365 connector** section.
39
+
Once the Power Platform administrator completes the onboarding steps, a green **Connected** status appears in the **Microsoft 365 connector** section in the Defender portal.
Copy file name to clipboardExpand all lines: defender-for-identity/deploy/configure-windows-event-collection.md
+25-4Lines changed: 25 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,15 +8,30 @@ ms.reviewer: rlitinsky
8
8
9
9
# Configure audit policies for Windows event logs
10
10
11
-
To enhance detections and gather more information on user actions like NTLM logons and security group changes, Microsoft Defender for Identity relies on specific entries in Windows event logs. Proper configuration of Advanced Audit Policy settings on your domain controllers is crucial to avoid gaps in the event logs and incomplete Defender for Identity coverage.
11
+
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
12
+
This article describes how to optimally configure the Advanced Audit Policy settings on your domain controllers to avoid gaps in the event logs and incomplete Defender for Identity coverage.
12
13
13
-
This article describes how to configure your Advanced Audit Policy settings as needed for a Defender for Identity sensor. It also describes other configurations for specific event types.
14
+
## Configure Windows event auditing with the Defender for Identity sensor v3.x
14
15
16
+
Defender for Identity sensor v3.x can automatically configure Windows event auditing on your domain controllers, applying the required Windows event auditing settings to new sensors, and fixing misconfigurations on existing ones.
17
+
18
+
To turn on automatic windows auditing:
19
+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings**, and then **Identities**.
20
+
1. In the **General** section, select **Advanced features**.
21
+
1. Turn on **Automatic Windows auditing configuration**.
22
+
23
+
If you do not select automatic Windows event auditing, you must manually configure Windows event collection on your domain controller.
24
+
25
+
## Configure Windows event auditing with the Defender for Identity sensor v2.x
26
+
27
+
Configure Windows event auditing on your domain controllers to support Defender for Identity detections.
15
28
Defender for Identity generates health issues for each of these scenarios if they're detected. For more information, see [Microsoft Defender for Identity health issues](../health-alerts.md).
16
29
17
30
## Prerequisites
18
31
19
-
- Before you run Defender for Identity PowerShell commands, make sure that you downloaded the [Defender for Identity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/).
32
+
- Before you run Defender for Identity PowerShell commands, make sure that you download the [Defender for Identity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/).
33
+
> [!NOTE]
34
+
> The Active Directory PowerShell module is required when configuring Defender for Identity on domain controllers. It isn’t required on ADCS servers running the Certification Authority Role Service.
20
35
21
36
## Generate a report of current configurations via PowerShell
22
37
@@ -47,7 +62,7 @@ For more information, see the [DefenderforIdentity PowerShell reference](/powers
47
62
> [!TIP]
48
63
> The `Domain` mode report includes only configurations set as group policies on the domain. If you have settings defined locally on your domain controllers, we recommend that you also run the [Test-MdiReadiness.ps1](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script.
49
64
50
-
## Configure auditing for domain controllers
65
+
## Configure Windows event auditing for domain controllers
51
66
52
67
Update your Advanced Audit Policy settings and extra configurations for specific events and event types, such as users, groups, computers, and more. Audit configurations for domain controllers include:
53
68
@@ -120,6 +135,12 @@ The following actions describe how to modify your domain controller's Advanced A
120
135
121
136
**Related health issue:** [Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
122
137
138
+
The following command defines all settings for the domain, creates group policy objects, and links them.
139
+
140
+
```powershell
141
+
Set-MDIConfiguration -Mode Domain -Configuration All
Copy file name to clipboardExpand all lines: defender-for-identity/deploy/prerequisites-sensor-version-2.md
+3-16Lines changed: 3 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,24 +106,11 @@ The following table describes memory requirements on the server used for the Def
106
106
> [!IMPORTANT]
107
107
> When running as a virtual machine, all memory must be allocated to the virtual machine at all times.
108
108
109
-
## Configure Windows auditing
109
+
## Configure Windows event auditing
110
110
111
-
Defender for Identity detections rely on specific Windows Event Log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
111
+
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
112
112
113
-
Configure Windows event collection on your domain controller to support Defender for Identity detections. For more information, see [Event collection with Microsoft Defender for Identity](event-collection-overview.md) and [Configure audit policies for Windows event logs](configure-windows-event-collection.md).
114
-
115
-
You might want to use the Defender for Identity PowerShell module to configure the required settings. For example, the following command defines all settings for the domain, creates group policy objects, and links them.
116
-
117
-
```powershell
118
-
Set-MDIConfiguration -Mode Domain -Configuration All
119
-
```
120
-
> [!NOTE]
121
-
> The Active Directory PowerShell module is required only when configuring Defender for Identity on domain controllers. It isn’t required on ADCS servers running the Certification Authority Role Service.
-[Defender for Identity in the PowerShell Gallery](https://www.powershellgallery.com/packages/DefenderForIdentity/)
126
-
113
+
[Configure Windows event auditing](configure-windows-event-collection.md) on your domain controller to support Defender for Identity detections in the Defender portal or using PowerShell.
Copy file name to clipboardExpand all lines: defender-for-identity/deploy/prerequisites-sensor-version-3.md
+4-13Lines changed: 4 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -97,22 +97,13 @@ Applying the **Unified Sensor RPC Audit** tag enables a new, tested capability o
97
97
98
98
Learn more about Asset Management Rule [here](/defender-xdr/configure-asset-rules).
99
99
100
-
## Configure Windows auditing
100
+
## Configure Windows event auditing
101
101
102
-
Defender for Identity detections rely on specific Windows Event Log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
102
+
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
103
103
104
-
Configure Windows event collection on your domain controller to support Defender for Identity detections. For more information, see [Event collection with Microsoft Defender for Identity](event-collection-overview.md) and [Configure audit policies for Windows event logs](configure-windows-event-collection.md).
105
-
106
-
You might want to use the Defender for Identity PowerShell module to configure the required settings. For example, the following command defines all settings for the domain, creates group policy objects, and links them.
107
-
108
-
```powershell
109
-
Set-MDIConfiguration -Mode Domain -Configuration All
-[Defender for Identity in the PowerShell Gallery](https://www.powershellgallery.com/packages/DefenderForIdentity/)
104
+
The Defender for Identity sensor v3.x can automatically configure Windows event auditing on your domain controllers, applying the required Windows event auditing settings to new sensors, and fixing misconfigurations on existing ones. See [Configure auditing with the Defender for Identity sensor v3.x](configure-windows-event-collection.md#configure-windows-event-auditing-with-the-defender-for-identity-sensor-v3x).
105
+
If you do not select automatic Windows auditing configuration, you must [manually configure Windows event auditing](configure-windows-event-collection.md) in the Defender portal or using PowerShell.
114
106
115
-
116
107
## Test your prerequisites
117
108
118
109
We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if your environment has the necessary prerequisites.
Copy file name to clipboardExpand all lines: defender-for-identity/nnr-policy.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,14 +6,17 @@ ms.topic: article
6
6
ms.reviewer: rlitinsky
7
7
---
8
8
9
-
# Network Name Resolution in Microsoft Defender for Identity
9
+
# Network Name Resolution (NNR) in Microsoft Defender for Identity
10
10
11
11
Network Name Resolution (NNR) is a main component of Microsoft Defender for Identity functionality. Defender for Identity captures activities based on network traffic, Windows events, and ETW - these activities normally contain IP data.
12
12
13
13
Using NNR, Defender for Identity can correlate between raw activities (containing IP addresses), and the relevant computers involved in each activity. Based on the raw activities, Defender for Identity profiles entities, including computers, and generates security alerts for suspicious activities.
14
14
15
-
> [!NOTE]
16
-
> For optimal NNR, the Defender for Identity sensor version 3.x requires a Defender for Endpoint deployment.
15
+
## NNR with the Defender for Identity sensor v3.x
16
+
17
+
The Defender for Identity sensor v3.x automatically performs Name Resolution using the Defender device inventory and events collected by the sensor, without the need to open additional ports in your environment.
18
+
19
+
## NNR with the Defender for Identity sensor v2.x
17
20
18
21
To resolve IP addresses to computer names, Defender for Identity sensors look up the IP addresses using the following methods:
Copy file name to clipboardExpand all lines: defender-for-identity/whats-new.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: What's new | Microsoft Defender for Identity
3
3
description: This article is updated frequently to let you know what's new in the latest release of Microsoft Defender for Identity.
4
-
ms.date: 11/12/2025
4
+
ms.date: 11/16/2025
5
5
ms.topic: overview
6
6
#CustomerIntent: As a Defender for Identity customer, I want to know what's new in the latest release of Defender for Identity, so that I can take advantage of new features and functionality.
7
7
ms.reviewer: AbbyMSFT
@@ -44,7 +44,7 @@ For more information, see: [Link or Unlink an Account to an Identity (Preview)](
44
44
You can now perform remediation actions such as disabling accounts or resetting passwords on one or more accounts linked to an identity. For more information, see: [Remediation actions](remediation-actions.md#roles-and-permissions).
45
45
Defender for Identity now offers an opt-in automatic event-auditing configuration for unified sensors (V3.x). This feature streamlines deployment by automatically applying required Windows auditing settings to new sensors and fixing misconfigurations on existing ones. Admins can enable the option in the Defender for Identity Settings -> Advanced Features or via Graph API. The capability and its related health alerts will roll out globally beginning mid-November 2025.
46
46
47
-
**Related Health alerts:**
47
+
Releated Health alerts:
48
48
- NTLM Auditing is not enabled
49
49
- Directory Services Advanced Auditing is not enabled as required
50
50
- Directory Services Object Auditing is not enabled as required
@@ -68,8 +68,8 @@ For more information, see [Configure scoped access for Microsoft Defender for Id
68
68
69
69
## October 2025
70
70
71
-
We’re excited to announce that the Microsoft Defender for Identity Unified Sensor (v3.x) is now generally available (GA).
72
-
The [unified sensor](/defender-for-identity/deploy/activate-sensor) provides enhanced coverage, improved performance across your environment and offering easier deployment and management for domain controllers.
71
+
We’re excited to announce that the Microsoft Defender for Identity Sensor (v3.x) is now generally available (GA).
72
+
[Version 3.x of the sensor](/defender-for-identity/deploy/activate-sensor) provides enhanced coverage, improved performance across your environment and offering easier deployment and management for domain controllers.
73
73
74
74
### Microsoft Defender for Identity sensor version updates
0 commit comments