Skip to content

Commit c875848

Browse files
Merge branch 'main' into repo-health-check-Q1
2 parents a84fff9 + 10ee6c5 commit c875848

File tree

198 files changed

+1692
-1380
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

198 files changed

+1692
-1380
lines changed

.openpublishing.redirection.defender-office-365.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,16 @@
4949
"source_path": "defender-office-365/pilot-deploy-defender-office-365.md",
5050
"redirect_url": "/defender-xdr/pilot-deploy-defender-office-365",
5151
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "defender-office-365/submissions-error-messages.md",
55+
"redirect_url": "/defender-office-365/submissions-result-definitions",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "defender-office-365/step-by-step-guides/deploy-and-configure-the-report-message-add-in.md",
60+
"redirect_url": "/defender-office-365/submissions-outlook-report-messages",
61+
"redirect_document_id": false
5262
}
5363
]
5464
}

ATPDocs/deploy/activate-capabilities.md

Lines changed: 27 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -7,20 +7,20 @@ ms.topic: how-to
77

88
# Activate Microsoft Defender for Identity capabilities directly on a domain controller
99

10-
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
10+
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using [Microsoft Defender for Identity classic sensor](deploy-defender-identity.md).
1111

1212
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
1313

1414
> [!IMPORTANT]
15-
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor.
15+
> The new Defender for Identity sensor (version 3.x) is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](quick-installation-guide.md).
1616
1717
## Prerequisites
1818

1919
Before activating the Defender for Identity capabilities on your domain controller, make sure that your environment complies with the prerequisites in this section.
2020

2121
### Defender for Identity sensor conflicts
2222

23-
The configuration described in this article doesn't support side-by-side installation with an existing Defender for Identity sensor, and isn't recommended as a replacement for the Defender for Identity sensor.
23+
The configuration described in this article doesn't support side-by-side installation with an existing Defender for Identity sensor, and isn't recommended as a replacement for the Defender for Identity classic sensor.
2424

2525
Make sure that the domain controller where you're planning to activate Defender for Identity capabilities doesn't have a [Defender for Identity sensor](deploy-defender-identity.md) deployed.
2626

@@ -43,7 +43,7 @@ Your domain controller must be onboarded to Microsoft Defender for Endpoint.
4343

4444
For more information, see [Onboard a Windows server](/microsoft-365/security/defender-endpoint/onboard-windows-server).
4545

46-
### Required permissions
46+
### Permissions requirements
4747

4848
To access the Defender for Identity **Activation** page, you must either be a [Security Administrator](/entra/identity/role-based-access-control/permissions-reference), or have the following Unified RBAC permissions:
4949

@@ -80,15 +80,31 @@ Set-MDIConfiguration -Mode Domain -Configuration All
8080

8181
## Activate Defender for Identity capabilities
8282

83-
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
83+
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
8484

85-
1. In the [Defender portal](https://security.microsoft.com), select **Settings > Identities > [Activation](https://security.microsoft.com/settings/identities?tabid=onboarding)**.
85+
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
8686

87-
The **Activation** page lists any detected and eligible domain controllers.
87+
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
8888

89-
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
89+
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
9090

91-
When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
91+
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
92+
93+
> [!NOTE]
94+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
95+
96+
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
97+
98+
## Onboarding Confirmation
99+
100+
To confirm the sensor has been onboarded:
101+
102+
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
103+
104+
2. Check that the onboarded domain controller is listed.
105+
106+
> [!NOTE]
107+
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
92108
93109
## Test activated capabilities
94110

@@ -106,9 +122,9 @@ Use the following procedures to test your environment for Defender for Identity
106122

107123
### Check the ITDR dashboard
108124

109-
In the Defender portal, select **Identities > Dashboard** and review the details shown, checking for expected results from your environment.
125+
In the Defender portal, select **Identities** > **Dashboard**, and review the details shown, checking for expected results from your environment.
110126

111-
For more information, see [Work with Defender for Identity's ITDR dashboard (Preview)](../dashboard.md).
127+
For more information, see [Work with Defender for Identity's ITDR dashboard](../dashboard.md).
112128

113129

114130
### Confirm entity page details
@@ -193,10 +209,6 @@ Test remediation actions on a test user. For example:
193209
194210
1. Check Active Directory for the expected activity.
195211
196-
> [!NOTE]
197-
> The current version doesn't collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
198-
199-
200212
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
201213
202214
## Deactivate Defender for Identity capabilities on your domain controller

ATPDocs/deploy/deploy-defender-identity.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,17 @@ Use the following steps to prepare for deploying Defender for Identity:
5353
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if the servers in your environment have the necessary prerequisites.
5454
> You can use the [DefenderForIdentity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/) to add the required auditing and configure the necessary settings.
5555
56-
## Deploy Defender for Identity
56+
> [!IMPORTANT]
57+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
58+
59+
## Deploy Defender for Identity classic sensor
5760

5861
After you've prepared your system, use the following steps to deploy Defender for Identity:
5962

6063
1. [Verify connectivity to the Defender for Identity service](configure-proxy.md).
61-
1. [Download the Defender for Identity sensor](download-sensor.md).
62-
1. [Install the Defender for Identity sensor](install-sensor.md).
63-
1. [Configure the Defender for Identity sensor](configure-sensor-settings.md) to start receiving data.
64+
1. [Download the Defender for Identity classic sensor](download-sensor.md).
65+
1. [Install the Defender for Identity classic sensor](install-sensor.md).
66+
1. [Configure the Defender for Identity classic sensor](configure-sensor-settings.md) to start receiving data.
6467

6568
## Post-deployment configuration
6669

ATPDocs/deploy/download-sensor.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,12 @@ ms.date: 06/13/2023
55
ms.topic: how-to
66
---
77

8-
# Download the Microsoft Defender for Identity sensor
8+
# Download the Microsoft Defender for Identity classic sensor
99

10-
This article describes how to download the Microsoft Defender for Identity sensor for your domain controllers or AD CS / AD FS servers.
10+
This article describes how to download the Microsoft Defender for Identity classic sensor for your domain controllers or AD CS / AD FS and Entra Connect servers.
11+
12+
> [!IMPORTANT]
13+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
1114
1215
## Add a sensor and download sensor software
1316

@@ -17,7 +20,7 @@ This article describes how to download the Microsoft Defender for Identity senso
1720

1821
[![Screenshot of the Sensors tab.](../media//sensor-page.png)](../media/sensor-page.png#lightbox)
1922

20-
1. Select **Add sensor**. Then, in the **Add a new sensor** pane, select **Download installer** and save the installation package locally. The downloaded zip file includes the following files:
23+
1. Select **Add sensor**. Then, in the **Add a new sensor** pane, select **Download installer**, and save the installation package locally. The downloaded zip file includes the following files:
2124

2225
- The Defender for Identity sensor installer
2326

ATPDocs/deploy/install-sensor.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,10 @@ ms.topic: how-to
77

88
# Install a Microsoft Defender for Identity sensor
99

10-
This article describes how to install a Microsoft Defender for Identity sensor, including a standalone sensor. The default recommendation is to use the UI. However:
10+
> [!IMPORTANT]
11+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
12+
13+
This article describes how to install a Microsoft Defender for Identity classic sensor, including a standalone sensor. The default recommendation is to use the UI. However:
1114

1215
- When you're installing the sensor on Windows Server Core, or to deploy the sensor via a software deployment system, follow the steps for [silent installation](#perform-a-defender-for-identity-silent-installation) instead.
1316

@@ -29,9 +32,9 @@ Before you start, make sure that you have:
2932

3033
- Trusted root certificates on your machine. If your trusted root CA-signed certificates are missing, [you might receive a connection error](../troubleshooting-known-issues.md#proxy-authentication-problem-presents-as-a-connection-error).
3134

32-
## Install the sensor by using the UI
35+
## Install the classic sensor by using the UI
3336

34-
Perform the following steps on the domain controller, Active Directory Federation Services (AD FS) server, or Active Directory Certificate Services (AD CS) server.
37+
Perform the following steps on the domain controller, Active Directory Federation Services (AD FS) server, Active Directory Certificate Services (AD CS) server or Entra Connect server.
3538

3639
1. Verify that the machine has connectivity to the relevant [Defender for Identity cloud service endpoints](configure-proxy.md#enable-access-to-defender-for-identity-service-urls-in-the-proxy-server).
3740

55 KB
Loading
49.7 KB
Loading
37.7 KB
Loading

ATPDocs/deploy/prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ This article lists prerequisites required for a basic installation. Additional p
121121

122122
For more information, see:
123123

124-
- [Deploying Microsoft Defender for Identity on AD FS and AD CS servers](active-directory-federation-services.md)
124+
- [Deploying Microsoft Defender for Identity on AD FS, AD CS and Entra Connect servers](active-directory-federation-services.md)
125125
- [Microsoft Defender for Identity multi-forest support](multi-forest.md)
126126
- [Microsoft Defender for Identity standalone sensor prerequisites](prerequisites-standalone.md)
127127
- [Defender for Identity architecture](../architecture.md)

ATPDocs/deploy/quick-installation-guide.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -67,16 +67,19 @@ During installation, if .NET Framework 4.7 or later isn't installed, the .NET Fr
6767

6868
When installing your sensors, consider scheduling a maintenance window for your domain controllers.
6969

70-
## Install Defender for Identity
70+
> [!IMPORTANT]
71+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
72+
73+
## Install Defender for Identity classic sensor
7174

7275

7376
This procedure describes how to install the Defender for Identity sensor on a Windows server version 2016 or higher. Make sure that your server has the [minimum system requirements](#minimum-system-requirements).
7477

7578
> [!NOTE]
76-
> Defender for Identity sensors should be installed on all domain controllers, including read-only domain controllers (RODC). If you're installing on an AD FS / AD CS farm or cluster, we recommend installing the sensor on each AD FS / AD CS server.
79+
> Defender for Identity sensors should be installed on all domain controllers, including read-only domain controllers (RODC). If you're installing on an AD FS / AD CS / Entra Connect farm or cluster, we recommend installing the sensor on each AD FS / AD CS / Entra Connect server.
7780
>
7881
79-
**To download and install the sensor**:
82+
**To download and install the classic sensor**:
8083

8184
1. Download the Defender for Identity sensor from the [Microsoft Defender portal](https://security.microsoft.com).
8285
1. Browse to **System** > **Settings** > **Identities** > **Sensors** > **Add sensor**

0 commit comments

Comments
 (0)