Skip to content

Commit bf810bf

Browse files
authored
Merge branch 'main' into patch-4
2 parents 5ed7035 + 2ef02e9 commit bf810bf

9 files changed

+33
-31
lines changed

ATPDocs/remove-discoverable-passwords-active-directory-account-attributes.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: 'Security Assessment: Remove Discoverable Passwords in Active Directory Account Attributes (Preview)'
33
description: Learn how to identify and address discoverable passwords in Active Directory account attributes to mitigate security risks and improve your organization's security posture.
4-
ms.date: 08/04/2025
4+
ms.date: 08/12/2025
55
ms.topic: how-to
66
---
77

@@ -10,7 +10,7 @@ ms.topic: how-to
1010

1111
## Why do discoverable passwords in Active Directory account attributes pose a risk?
1212

13-
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges—often without triggering traditional alerts.
13+
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges.
1414

1515
Attackers seek low-friction paths to expand access. Exposed passwords in these attributes represent an easy win because:
1616

@@ -26,12 +26,12 @@ Removing exposed credentials from these attributes reduces the risk of identity
2626
## How does Microsoft Defender for Identity detect discoverable passwords?
2727

2828
> [!NOTE]
29-
> This security recommendation is part of Microsoft Defender for Identity and is powered by AI-based analysis of free-text attributes in Active Directory.
3029
> Findings can include false positives. Always validate the results before taking action.
3130
32-
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse. Microsoft Defender for Identity detects indicators such as:
31+
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse.
32+
This recommendation uses GenAI-powered analysis of Active directory attributes to detect:
3333

34-
- Plaintext passwords or variations. For example, '`Password=Summer2024!'`
34+
- Plaintext passwords or variations. For example, '`Password=Summer2025!'`
3535

3636
- Credential patterns, reset hints, or sensitive account information.
3737

defender-endpoint/ios-whatsnew.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.reviewer: sunasing; denishdonga
88
ms.localizationpriority: medium
9-
ms.date: 05/15/2025
9+
ms.date: 08/12/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -125,7 +125,7 @@ Defender for Endpoint is ending support for iOS/iPadOS 15 on January 31, 2025. M
125125

126126
**How does this affect you or your users?**
127127

128-
New users won't be able to install the Microsoft Defender app on devices running iOS/iPadOS 15 and earlier versions. Similarly, existing users won't be to upgrade to the latest version of the app.
128+
New users won't be able to install the Microsoft Defender app on devices running iOS/iPadOS 15 and earlier versions. Similarly, existing users will be able to upgrade till April-Mid Release version (1.1.64030101) of the app and not beyond it.
129129

130130
To check which devices support iOS 16 or iPadOS 16 (if applicable), see the following Apple documentation:
131131

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ For more information on what's new with other Microsoft Defender security produc
4949
## July 2025
5050

5151
- (GA) [Microsoft Defender Core service](/defender-endpoint/microsoft-defender-core-service-overview) is now generally available on Windows Server 2019 or later. Helps with the stability and performance of Microsoft Defender Antivirus.
52+
- Support for Azure Stack HCI OS is rolling out across commercial and government clouds.
5253

5354
## April 2025
5455

defender-xdr/advanced-hunting-messageevents-table.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@ ms.service: defender-xdr
66
ms.subservice: adv-hunting
77
f1.keywords:
88
- NOCSH
9-
ms.author: maccruz
10-
author: schmurky
9+
ms.author: pauloliveria
10+
author: poliveria
1111
ms.localizationpriority: medium
12-
manager: dansimp
12+
manager: orspodek
1313
audience: ITPro
1414
ms.collection:
1515
- m365-security
@@ -21,16 +21,13 @@ appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
2323
ms.topic: reference
24-
ms.date: 03/18/2025
24+
ms.date: 08/13/2025
2525
---
2626

27-
# MessageEvents (Preview)
27+
# MessageEvents
2828

2929
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
3030

31-
> [!IMPORTANT]
32-
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
33-
3431
The `MessageEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains details about messages sent and received within your organization at the time of delivery. Use this reference to construct queries that return information from this table.
3532

3633
This advanced hunting table is populated by records from Microsoft Defender for Office 365. If your organization hasn’t deployed the service in Microsoft Defender XDR, queries that use the table aren’t going to work or return any results. For more information about how to deploy Defender for Office 365 in Defender XDR, read [Deploy supported services](deploy-supported-services.md).

defender-xdr/advanced-hunting-messagepostdeliveryevents-table.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@ ms.service: defender-xdr
66
ms.subservice: adv-hunting
77
f1.keywords:
88
- NOCSH
9-
ms.author: maccruz
10-
author: schmurky
9+
ms.author: pauloliveria
10+
author: poliveria
1111
ms.localizationpriority: medium
12-
manager: dansimp
12+
manager: orspodek
1313
audience: ITPro
1414
ms.collection:
1515
- m365-security
@@ -21,15 +21,14 @@ appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
2323
ms.topic: reference
24-
ms.date: 03/18/2025
24+
ms.date: 08/13/2025
2525
---
2626

27-
# MessagePostDeliveryEvents (Preview)
27+
# MessagePostDeliveryEvents
2828

2929
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
3030

31-
> [!IMPORTANT]
32-
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
31+
3332

3433
The `MessagePostDeliveryEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about security events that occurred after the delivery of a Microsoft Teams message in your organization.
3534

defender-xdr/advanced-hunting-messageurlinfo-table.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@ ms.service: defender-xdr
66
ms.subservice: adv-hunting
77
f1.keywords:
88
- NOCSH
9-
ms.author: maccruz
10-
author: schmurky
9+
ms.author: pauloliveria
10+
author: poliveria
1111
ms.localizationpriority: medium
12-
manager: dansimp
12+
manager: orspodek
1313
audience: ITPro
1414
ms.collection:
1515
- m365-security
@@ -21,10 +21,10 @@ appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
2323
ms.topic: reference
24-
ms.date: 03/18/2025
24+
ms.date: 08/13/2025
2525
---
2626

27-
# MessageUrlInfo (Preview)
27+
# MessageUrlInfo
2828

2929
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
3030

defender-xdr/advanced-hunting-schema-tables.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
2323
ms.topic: reference
24-
ms.date: 08/05/2025
24+
ms.date: 08/13/2025
2525
---
2626

2727
# Understand the advanced hunting schema
@@ -104,9 +104,9 @@ The following reference lists all the tables in the schema. Each table name link
104104
| **[IdentityInfo](advanced-hunting-identityinfo-table.md)** | Account information from various sources, including Microsoft Entra ID |
105105
| **[IdentityLogonEvents](advanced-hunting-identitylogonevents-table.md)** | Authentication events on Active Directory and Microsoft online services |
106106
| **[IdentityQueryEvents](advanced-hunting-identityqueryevents-table.md)** | Queries for Active Directory objects, such as users, groups, devices, and domains |
107-
| **[MessageEvents](advanced-hunting-messageevents-table.md)** (Preview) | Messages sent and received within your organization at the time of delivery |
108-
| **[MessagePostDeliveryEvents](advanced-hunting-messagepostdeliveryevents-table.md)** (Preview) | Security events that occurred after the delivery of a Microsoft Teams message in your organization |
109-
| **[MessageUrlInfo](advanced-hunting-messageurlinfo-table.md)** (Preview) | URLs sent through Microsoft Teams messages in your organization |
107+
| **[MessageEvents](advanced-hunting-messageevents-table.md)** | Messages sent and received within your organization at the time of delivery |
108+
| **[MessagePostDeliveryEvents](advanced-hunting-messagepostdeliveryevents-table.md)** | Security events that occurred after the delivery of a Microsoft Teams message in your organization |
109+
| **[MessageUrlInfo](advanced-hunting-messageurlinfo-table.md)** | URLs sent through Microsoft Teams messages in your organization |
110110
| **[OAuthAppInfo](advanced-hunting-oauthappinfo-table.md)** (Preview) | Microsoft 365-connected OAuth applications registered with Microsoft Entra ID and available in the Defender for Cloud Apps app governance capability |
111111
| **[UrlClickEvents](advanced-hunting-urlclickevents-table.md)** | Safe Links clicks from email messages, Teams, and Office 365 apps |
112112

@@ -117,4 +117,5 @@ The following reference lists all the tables in the schema. Each table name link
117117
- [Use shared queries](advanced-hunting-shared-queries.md)
118118
- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)
119119
- [Apply query best practices](advanced-hunting-best-practices.md)
120+
120121
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/custom-detection-rules.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,7 @@ To create a custom detection rule, the query must return the following columns:
8989
- `RecipientEmailAddress`
9090
- `SenderFromAddress` (envelope sender or Return-Path address)
9191
- `SenderMailFromAddress` (sender address displayed by email client)
92+
- `SenderObjectId`
9293
- `RecipientObjectId`
9394
- `AccountObjectId`
9495
- `AccountSid`

unified-secops-platform/microsoft-sentinel-onboard.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,8 @@ When you switch the primary workspace for Microsoft Sentinel, the Defender XDR c
161161

162162
If you decide to offboard a workspace from the Defender portal, disconnect the workspace from the settings for Microsoft Sentinel.
163163

164+
If your workspace has the [Microsoft Defender XDR connector](/azure/sentinel/connect-microsoft-365-defender) configured, offboarding the workspace from the Defender portal will also disconnect the Microsoft Defender XDR connector.
165+
164166
1. Go to the [Microsoft Defender portal](https://security.microsoft.com/) and sign in.
165167
1. In the Defender portal, under **System**, select **Settings** > **Microsoft Sentinel**.
166168
1. On the **Workspaces** page, select the connected workspace and **Disconnect workspace**.
@@ -178,3 +180,4 @@ If you want to connect to a different workspace, from the **Workspaces** page, s
178180
- [Automatic attack disruption in Microsoft Defender XDR](/defender-xdr/automatic-attack-disruption)
179181
- [Investigate incidents in Microsoft Defender portal](/defender-xdr/investigate-incidents)
180182
- [Optimize your security operations](/azure/sentinel/soc-optimization/soc-optimization-access?tabs=defender-portal)
183+

0 commit comments

Comments
 (0)