You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ This API allows customers to:
35
35
* Enable or disable the automatic activation of eligible servers
36
36
* Activate or deactivate the agent on eligible servers
37
37
38
-
For more information, see [Managing response actions through Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta).
38
+
For more information, see [Managing unified agent actions through Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta).
39
39
40
40
### Microsoft Defender for Identity sensor version updates
41
41
@@ -182,7 +182,7 @@ For prerequisites and configuration steps, see [Integrate Okta with Microsoft De
182
182
### Service account classification rules now available
183
183
184
184
You can now create custom classification rules to identify service accounts based on your organization’s specific criteria. This complements automatic discovery, enabling more accurate identification of service accounts.
185
-
For more information, see [Service account discovery](service-account-discovery.md)
185
+
For more information, see [Service account discovery](service-account-discovery.md).
186
186
187
187
### Defender For Identity PowerShell module updates (version 1.0.0.4)
188
188
@@ -323,7 +323,7 @@ Defender for Identity has added the new **Prevent Certificate Enrollment with ar
323
323
324
324
This recommendation directly addresses the recently published [CVE-2024-49019](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49019), which highlights security risks associated with vulnerable AD CS configurations. This security posture assessment lists all vulnerable certificate templates found in customer environments due to unpatched AD CS servers.
325
325
326
-
The new recommendation is added to other AD CS-related recommendations. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that post risks to the entire organization, together with related detections.
326
+
The new recommendation is added to other AD CS-related recommendations. Together, these assessments offer security posture reports that surface security issues and severe misconfigurations that pose risks to the entire organization, together with related detections.
0 commit comments