Skip to content

Commit cb1f5a3

Browse files
authored
Merge branch 'main' into gary-restage-public-pr-ayush
2 parents 721f9db + aa4cfc8 commit cb1f5a3

File tree

351 files changed

+2714
-3151
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

351 files changed

+2714
-3151
lines changed

.github/workflows/AutoLabelMsftContributor.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,4 +31,5 @@ jobs:
3131
PayloadJson: ${{ needs.download-payload.outputs.WorkflowPayload }}
3232
secrets:
3333
AccessToken: ${{ secrets.GITHUB_TOKEN }}
34-
TeamReadAccessToken: ${{ secrets.ORG_READTEAMS_TOKEN }}
34+
ClientId: ${{ secrets.M365_APP_CLIENT_ID }}
35+
PrivateKey: ${{ secrets.M365_APP_PRIVATE_KEY }}

.openpublishing.redirection.defender-endpoint.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "defender-endpoint/threat-analytics-analyst-reports.md",
5+
"redirect_url": "/defender-xdr/threat-analytics-analyst-reports",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "defender-endpoint/threat-analytics.md",
10+
"redirect_url": "/defender-xdr/threat-analytics",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path": "defender-endpoint/configure-microsoft-threat-experts.md",
515
"redirect_url": "/defender-xdr/defender-experts-for-hunting",

.openpublishing.redirection.defender-office-365.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,16 @@
4949
"source_path": "defender-office-365/pilot-deploy-defender-office-365.md",
5050
"redirect_url": "/defender-xdr/pilot-deploy-defender-office-365",
5151
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "defender-office-365/submissions-error-messages.md",
55+
"redirect_url": "/defender-office-365/submissions-result-definitions",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "defender-office-365/step-by-step-guides/deploy-and-configure-the-report-message-add-in.md",
60+
"redirect_url": "/defender-office-365/submissions-outlook-report-messages",
61+
"redirect_document_id": false
5262
}
5363
]
5464
}

.openpublishing.redirection.defender-xdr.json

Lines changed: 51 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,6 +259,56 @@
259259
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
260260
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
261261
"redirect_document_id": false
262-
}
262+
},
263+
{
264+
"source_path": "defender-xdr/first-incident-path-phishing.md",
265+
"redirect_url": "/security/operations/incident-response-playbook-phishing",
266+
"redirect_document_id": false
267+
},
268+
{
269+
"source_path": "defender-xdr/first-incident-path-identity.md",
270+
"redirect_url": "/defender-for-identity/manage-security-alerts",
271+
"redirect_document_id": false
272+
},
273+
{
274+
"source_path": "defender-xdr/incident-response-overview.md",
275+
"redirect_url": "/defender-xdr/incidents-overview",
276+
"redirect_document_id": true
277+
},
278+
{
279+
"source_path": "defender-xdr/respond-first-incident-analyze.md",
280+
"redirect_url": "/defender-xdr/investigate-incidents",
281+
"redirect_document_id": true
282+
},
283+
{
284+
"source_path": "defender-xdr/respond-first-incident-365-defender.md",
285+
"redirect_url": "/defender-xdr/manage-incidents",
286+
"redirect_document_id": true
287+
},
288+
{
289+
"source_path": "defender-xdr/export-incidents-queue.md",
290+
"redirect_url": "/defender-xdr/incident-queue",
291+
"redirect_document_id": true
292+
},
293+
{
294+
"source_path": "defender-xdr/respond-first-incident-remediate.md",
295+
"redirect_url": "/defender-xdr/incidents-overview",
296+
"redirect_document_id": false
297+
},
298+
{
299+
"source_path": "defender-xdr/m365d-time-zone.md",
300+
"redirect_url": "/defender-xdr/m365d-enable-faq",
301+
"redirect_document_id": true
302+
},
303+
{
304+
"source_path": "defender-xdr/feedback.md",
305+
"redirect_url": "/defender-xdr/m365d-enable-faq",
306+
"redirect_document_id": false
307+
},
308+
{
309+
"source_path": "defender-xdr/microsoft-365-defender-integration-with-azure-sentinel.md",
310+
"redirect_url": "/azure/sentinel/microsoft-365-defender-sentinel-integration",
311+
"redirect_document_id": false
312+
}
263313
]
264314
}

ATPDocs/deploy/activate-capabilities.md

Lines changed: 38 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -7,20 +7,20 @@ ms.topic: how-to
77

88
# Activate Microsoft Defender for Identity capabilities directly on a domain controller
99

10-
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
10+
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using [Microsoft Defender for Identity classic sensor](deploy-defender-identity.md).
1111

1212
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
1313

1414
> [!IMPORTANT]
15-
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](https://learn.microsoft.com/defender-for-identity/deploy/quick-installation-guide)
15+
> The new Defender for Identity sensor (version 3.x) is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](quick-installation-guide.md).
1616
1717
## Prerequisites
1818

1919
Before activating the Defender for Identity capabilities on your domain controller, make sure that your environment complies with the prerequisites in this section.
2020

2121
### Defender for Identity sensor conflicts
2222

23-
The configuration described in this article doesn't support side-by-side installation with an existing Defender for Identity sensor, and isn't recommended as a replacement for the Defender for Identity sensor.
23+
The configuration described in this article doesn't support side-by-side installation with an existing Defender for Identity sensor, and isn't recommended as a replacement for the Defender for Identity classic sensor.
2424

2525
Make sure that the domain controller where you're planning to activate Defender for Identity capabilities doesn't have a [Defender for Identity sensor](deploy-defender-identity.md) deployed.
2626

@@ -43,7 +43,7 @@ Your domain controller must be onboarded to Microsoft Defender for Endpoint.
4343

4444
For more information, see [Onboard a Windows server](/microsoft-365/security/defender-endpoint/onboard-windows-server).
4545

46-
### Required permissions
46+
### Permissions requirements
4747

4848
To access the Defender for Identity **Activation** page, you must either be a [Security Administrator](/entra/identity/role-based-access-control/permissions-reference), or have the following Unified RBAC permissions:
4949

@@ -80,15 +80,35 @@ Set-MDIConfiguration -Mode Domain -Configuration All
8080

8181
## Activate Defender for Identity capabilities
8282

83-
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
83+
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
8484

85-
1. In the [Defender portal](https://security.microsoft.com), select **Settings > Identities > [Activation](https://security.microsoft.com/settings/identities?tabid=onboarding)**.
85+
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
8686

87-
The **Activation** page lists any detected and eligible domain controllers.
87+
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
8888

89-
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
89+
The Activation page lists servers discovered in Device Inventory and identified as eligible domain controllers.
9090

91-
When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
91+
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
92+
93+
:::image type="content" source="media/activate-capabilities/1.jpg" lightbox="media/activate-capabilities/1.jpg" alt-text="Screenshot that shows how to activate the new sensor.":::
94+
95+
> [!NOTE]
96+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
97+
98+
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
99+
100+
:::image type="content" source="media/activate-capabilities/2.jpg" lightbox="media/activate-capabilities/2.jpg" alt-text="Screenshot that shows how to seethe onboarded servers.":::
101+
102+
## Onboarding Confirmation
103+
104+
To confirm the sensor has been onboarded:
105+
106+
1. Navigate to **System** > **Settings** > **Identities** > **Sensors**.
107+
108+
2. Check that the onboarded domain controller is listed.
109+
110+
> [!NOTE]
111+
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
92112
93113
## Test activated capabilities
94114

@@ -106,10 +126,9 @@ Use the following procedures to test your environment for Defender for Identity
106126

107127
### Check the ITDR dashboard
108128

109-
In the Defender portal, select **Identities > Dashboard** and review the details shown, checking for expected results from your environment.
110-
111-
For more information, see [Work with Defender for Identity's ITDR dashboard (Preview)](../dashboard.md).
129+
In the Defender portal, select **Identities** > **Dashboard**, and review the details shown, checking for expected results from your environment.
112130

131+
For more information, see [Work with Defender for Identity's ITDR dashboard](../dashboard.md).
113132

114133
### Confirm entity page details
115134

@@ -123,7 +142,7 @@ In the Defender portal, check for the following details:
123142

124143
- **Group entities**: Use the global search to find a user group, or pivot from a user or device details page where group details are shown. Check for details of group membership, view group users, and group timeline data.
125144

126-
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
145+
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
127146

128147
For more information, see [Investigate assets](../investigate-assets.md).
129148

@@ -189,22 +208,20 @@ Test remediation actions on a test user. For example:
189208
190209
1. In the Defender portal, go to the user details page for a test user.
191210
192-
1. From the **Options** menu, select any of the available remediation actions.
193-
194-
1. Check Active Directory for the expected activity.
195-
196-
> [!NOTE]
197-
> The current version doesn't collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
211+
2. From the **Options** menu, select any of the available remediation actions.
198212
213+
3. Check Active Directory for the expected activity.
199214
200215
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).
201216
202217
## Deactivate Defender for Identity capabilities on your domain controller
203218
204219
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
205220
206-
1. In the Defender portal, select **Settings > Identities > Sensors**.
207-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
221+
1. In the Defender portal, select **Settings** > **Identities** > **Sensors**.
222+
2. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
223+
224+
:::image type="content" source="media/activate-capabilities/3.jpg" lightbox="media/activate-capabilities/3.jpg" alt-text="Screenshot that shows how to deactivate a server.":::
208225
209226
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
210227
186 KB
Loading
55 KB
Loading
144 KB
Loading
49.7 KB
Loading
169 KB
Loading

0 commit comments

Comments
 (0)