You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/activate-capabilities.md
+27-15Lines changed: 27 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,20 +7,20 @@ ms.topic: how-to
7
7
8
8
# Activate Microsoft Defender for Identity capabilities directly on a domain controller
9
9
10
-
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
10
+
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using [Microsoft Defender for Identity classic sensor](deploy-defender-identity.md).
11
11
12
12
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
13
13
14
14
> [!IMPORTANT]
15
-
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor.
15
+
> The new Defender for Identity sensor (version 3.x) is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor[here](quick-installation-guide.md).
16
16
17
17
## Prerequisites
18
18
19
19
Before activating the Defender for Identity capabilities on your domain controller, make sure that your environment complies with the prerequisites in this section.
20
20
21
21
### Defender for Identity sensor conflicts
22
22
23
-
The configuration described in this article doesn't support side-by-side installation with an existing Defender for Identity sensor, and isn't recommended as a replacement for the Defender for Identity sensor.
23
+
The configuration described in this article doesn't support side-by-side installation with an existing Defender for Identity sensor, and isn't recommended as a replacement for the Defender for Identity classic sensor.
24
24
25
25
Make sure that the domain controller where you're planning to activate Defender for Identity capabilities doesn't have a [Defender for Identity sensor](deploy-defender-identity.md) deployed.
26
26
@@ -43,7 +43,7 @@ Your domain controller must be onboarded to Microsoft Defender for Endpoint.
43
43
44
44
For more information, see [Onboard a Windows server](/microsoft-365/security/defender-endpoint/onboard-windows-server).
45
45
46
-
### Required permissions
46
+
### Permissions requirements
47
47
48
48
To access the Defender for Identity **Activation** page, you must either be a [Security Administrator](/entra/identity/role-based-access-control/permissions-reference), or have the following Unified RBAC permissions:
49
49
@@ -80,15 +80,31 @@ Set-MDIConfiguration -Mode Domain -Configuration All
80
80
81
81
## Activate Defender for Identity capabilities
82
82
83
-
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
83
+
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
84
84
85
-
1. In the [Defender portal](https://security.microsoft.com), select **Settings > Identities > [Activation](https://security.microsoft.com/settings/identities?tabid=onboarding)**.
85
+
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
86
86
87
-
The**Activation**page lists any detected and eligible domain controllers.
87
+
1. Navigate to **System** >**Settings**> **Identities** > **Activation**.
88
88
89
-
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
89
+
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
90
90
91
-
When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
91
+
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
92
+
93
+
> [!NOTE]
94
+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
95
+
96
+
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
97
+
98
+
## Onboarding Confirmation
99
+
100
+
To confirm the sensor has been onboarded:
101
+
102
+
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
103
+
104
+
2. Check that the onboarded domain controller is listed.
105
+
106
+
> [!NOTE]
107
+
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
92
108
93
109
## Test activated capabilities
94
110
@@ -106,9 +122,9 @@ Use the following procedures to test your environment for Defender for Identity
106
122
107
123
### Check the ITDR dashboard
108
124
109
-
In the Defender portal, select **Identities > Dashboard** and review the details shown, checking for expected results from your environment.
125
+
In the Defender portal, select **Identities** > **Dashboard**, and review the details shown, checking for expected results from your environment.
110
126
111
-
For more information, see [Work with Defender for Identity's ITDR dashboard (Preview)](../dashboard.md).
127
+
For more information, see [Work with Defender for Identity's ITDR dashboard](../dashboard.md).
112
128
113
129
114
130
### Confirm entity page details
@@ -193,10 +209,6 @@ Test remediation actions on a test user. For example:
193
209
194
210
1. Check Active Directory for the expected activity.
195
211
196
-
> [!NOTE]
197
-
> The current version doesn't collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
198
-
199
-
200
212
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
201
213
202
214
## Deactivate Defender for Identity capabilities on your domain controller
Copy file name to clipboardExpand all lines: ATPDocs/deploy/deploy-defender-identity.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,14 +53,17 @@ Use the following steps to prepare for deploying Defender for Identity:
53
53
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if the servers in your environment have the necessary prerequisites.
54
54
> You can use the [DefenderForIdentity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/) to add the required auditing and configure the necessary settings.
55
55
56
-
## Deploy Defender for Identity
56
+
> [!IMPORTANT]
57
+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
58
+
59
+
## Deploy Defender for Identity classic sensor
57
60
58
61
After you've prepared your system, use the following steps to deploy Defender for Identity:
59
62
60
63
1.[Verify connectivity to the Defender for Identity service](configure-proxy.md).
61
-
1.[Download the Defender for Identity sensor](download-sensor.md).
62
-
1.[Install the Defender for Identity sensor](install-sensor.md).
63
-
1.[Configure the Defender for Identity sensor](configure-sensor-settings.md) to start receiving data.
64
+
1.[Download the Defender for Identity classic sensor](download-sensor.md).
65
+
1.[Install the Defender for Identity classic sensor](install-sensor.md).
66
+
1.[Configure the Defender for Identity classic sensor](configure-sensor-settings.md) to start receiving data.
Copy file name to clipboardExpand all lines: ATPDocs/deploy/download-sensor.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,9 +5,12 @@ ms.date: 06/13/2023
5
5
ms.topic: how-to
6
6
---
7
7
8
-
# Download the Microsoft Defender for Identity sensor
8
+
# Download the Microsoft Defender for Identity classic sensor
9
9
10
-
This article describes how to download the Microsoft Defender for Identity sensor for your domain controllers or AD CS / AD FS servers.
10
+
This article describes how to download the Microsoft Defender for Identity classic sensor for your domain controllers or AD CS / AD FS and Entra Connect servers.
11
+
12
+
> [!IMPORTANT]
13
+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
11
14
12
15
## Add a sensor and download sensor software
13
16
@@ -17,7 +20,7 @@ This article describes how to download the Microsoft Defender for Identity senso
17
20
18
21
[](../media/sensor-page.png#lightbox)
19
22
20
-
1. Select **Add sensor**. Then, in the **Add a new sensor** pane, select **Download installer** and save the installation package locally. The downloaded zip file includes the following files:
23
+
1. Select **Add sensor**. Then, in the **Add a new sensor** pane, select **Download installer**, and save the installation package locally. The downloaded zip file includes the following files:
Copy file name to clipboardExpand all lines: ATPDocs/deploy/install-sensor.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,10 @@ ms.topic: how-to
7
7
8
8
# Install a Microsoft Defender for Identity sensor
9
9
10
-
This article describes how to install a Microsoft Defender for Identity sensor, including a standalone sensor. The default recommendation is to use the UI. However:
10
+
> [!IMPORTANT]
11
+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
12
+
13
+
This article describes how to install a Microsoft Defender for Identity classic sensor, including a standalone sensor. The default recommendation is to use the UI. However:
11
14
12
15
- When you're installing the sensor on Windows Server Core, or to deploy the sensor via a software deployment system, follow the steps for [silent installation](#perform-a-defender-for-identity-silent-installation) instead.
13
16
@@ -29,9 +32,9 @@ Before you start, make sure that you have:
29
32
30
33
- Trusted root certificates on your machine. If your trusted root CA-signed certificates are missing, [you might receive a connection error](../troubleshooting-known-issues.md#proxy-authentication-problem-presents-as-a-connection-error).
31
34
32
-
## Install the sensor by using the UI
35
+
## Install the classic sensor by using the UI
33
36
34
-
Perform the following steps on the domain controller, Active Directory Federation Services (AD FS) server, or Active Directory Certificate Services (AD CS) server.
37
+
Perform the following steps on the domain controller, Active Directory Federation Services (AD FS) server, Active Directory Certificate Services (AD CS) server or Entra Connect server.
35
38
36
39
1. Verify that the machine has connectivity to the relevant [Defender for Identity cloud service endpoints](configure-proxy.md#enable-access-to-defender-for-identity-service-urls-in-the-proxy-server).
Copy file name to clipboardExpand all lines: ATPDocs/deploy/quick-installation-guide.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,16 +67,19 @@ During installation, if .NET Framework 4.7 or later isn't installed, the .NET Fr
67
67
68
68
When installing your sensors, consider scheduling a maintenance window for your domain controllers.
69
69
70
-
## Install Defender for Identity
70
+
> [!IMPORTANT]
71
+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
72
+
73
+
## Install Defender for Identity classic sensor
71
74
72
75
73
76
This procedure describes how to install the Defender for Identity sensor on a Windows server version 2016 or higher. Make sure that your server has the [minimum system requirements](#minimum-system-requirements).
74
77
75
78
> [!NOTE]
76
-
> Defender for Identity sensors should be installed on all domain controllers, including read-only domain controllers (RODC). If you're installing on an AD FS / AD CS farm or cluster, we recommend installing the sensor on each AD FS / AD CS server.
79
+
> Defender for Identity sensors should be installed on all domain controllers, including read-only domain controllers (RODC). If you're installing on an AD FS / AD CS / Entra Connect farm or cluster, we recommend installing the sensor on each AD FS / AD CS / Entra Connect server.
77
80
>
78
81
79
-
**To download and install the sensor**:
82
+
**To download and install the classic sensor**:
80
83
81
84
1. Download the Defender for Identity sensor from the [Microsoft Defender portal](https://security.microsoft.com).
0 commit comments