Skip to content

Commit c82c12e

Browse files
committed
August release note suspected brute force attack
1 parent b577f9c commit c82c12e

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

ATPDocs/whats-new.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,9 @@ For more information, see also:
2323

2424
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2525

26+
## August 2025
27+
28+
**Suspected Brute Force attack (Kerberos, NTLM):** Improved detection logic now includes scenarios where accounts were locked during the attacks. As a result, the number of triggered alerts may increase.
2629

2730
## July 2025
2831

@@ -44,7 +47,7 @@ For more details, see:
4447

4548
[Security Assessment: Unmonitored ADFS servers](unmonitored-active-directory-federation-services-servers.md)
4649

47-
[Security Assessment: Unmonitored Entra Connect servers](unmonitored-entra-connect-servers.md)
50+
[Security Assessment: Unmonitored Microsoft Entra Connect servers](unmonitored-entra-connect-servers.md)
4851

4952

5053

@@ -62,7 +65,7 @@ Scoping by Active Directory domains helps:
6265

6366
- Support operational boundaries: Align access for SOC analysts, identity administrators, and regional teams.
6467

65-
For more information see: [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
68+
For more information, see: [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
6669

6770

6871
### Okta integration is now available in Microsoft Defender for Identity
@@ -103,7 +106,7 @@ Defender for Identity now supports deploying its new sensor on Domain Controller
103106
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify noneligible servers and take action to update and onboard them for enhanced identity protection.
104107

105108

106-
### Local administrators collection (using SAM-R queries) feature will be disabled
109+
### Local administrators collection (using SAM-R queries) feature is disabled
107110
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change occurs automatically by the specified date, and no administrative action is required.
108111

109112
### New Health Issue

0 commit comments

Comments
 (0)