You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/activate-capabilities.md
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ Microsoft Defender for Endpoint customers, who have already onboarded their doma
12
12
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
13
13
14
14
> [!IMPORTANT]
15
-
> Information in this article relates to a feature that is currently in limited availability for a select set of use cases. If you weren't directed to use the Defender for Identity **Activation** page, use our [main deployment guide](deploy-defender-identity.md) instead.
15
+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor.
16
16
17
17
## Prerequisites
18
18
@@ -29,10 +29,8 @@ Make sure that the domain controller where you're planning to activate Defender
29
29
30
30
Direct Defender for Identity capabilities are supported on domain controllers only, using the one of the following operating systems:
31
31
32
-
- Windows Server 2019
33
-
- Windows Server 2022
34
-
35
-
You must also have the [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) installed.
32
+
- Windows Server 2019 or above
33
+
-[March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) or later
36
34
37
35
> [!IMPORTANT]
38
36
>After installing the March 2024 Cumulative Update, LSASS might experience a memory leak on domain controllers when on-premises and cloud-based Active Directory Domain Controllers service Kerberos authentication requests.
> The configuration container audit is requried only for environments that currently have or previously had Microsoft Exchange, as these environments have an Exchange container located within the domain's Configuration section.
331
+
> The configuration container audit is required only for environments that currently have or previously had Microsoft Exchange, as these environments have an Exchange container located within the domain's Configuration section.
332
332
333
333
**Related health issue:** [Auditing on the Configuration container is not enabled as required](../health-alerts.md#auditing-on-the-configuration-container-is-not-enabled-as-required)
334
334
@@ -340,6 +340,8 @@ To configure auditing on Microsoft Entra Connect servers:
340
340
341
341
1. Expand the **Configuration** container to show the **Configuration** node, which begins with **"CN=Configuration,DC=..."**.
342
342
343
+
:::image type="content" source="../media/cn-configuration.png" alt-text="Screenshot of selections for opening properties for the CN Configuration node.":::
344
+
343
345
1. Right-click the **Configuration** node and select **Properties**.
344
346
345
347

Copy file name to clipboardExpand all lines: ATPDocs/deploy/event-collection-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ The following event is required for Microsoft Entra Connect servers:
50
50
51
51
- 4624: An account was successfully logged on
52
52
53
-
For more information, see [Configure auditing on Microsoft Entra Connect](../configure-windows-event-collection.md#configure-auditing-for-entra-connect).
53
+
For more information, see [Configure auditing on Microsoft Entra Connect](../configure-windows-event-collection.md#configure-auditing-on-microsoft-entra-connect).
Copy file name to clipboardExpand all lines: ATPDocs/deploy/remote-calls-sam.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,12 +34,16 @@ To ensure that Windows clients and servers allow your Defender for Identity Dire
34
34
35
35
**To configure required permissions**:
36
36
37
-
1. Locate the policy. In your **Computer configuration > Windows settings > Security settings > Local policies > Security options**, select the **Network access - Restrict clients allowed to make remote calls to SAM** policy. For example:
37
+
1. Create a new group policy or use an existing one.
38
+
1. In your **Computer configuration > Windows settings > Security settings > Local policies > Security options**, select the **Network access - Restrict clients allowed to make remote calls to SAM** policy. For example:
38
39
39
40
:::image type="content" source="../media/samr-policy-location.png" alt-text="Screenshot of the Network access policy selected." lightbox="../media/samr-policy-location.png":::
40
41
41
42
1. Add the DSA to the list of approved accounts able to perform this action, together with any other account that you've discovered during audit mode.
42
43
44
+
:::image type="content" source="../media/restrict-clients-allowed-to-make-remote-calls-to-sam.png" alt-text="Screenshot of the Network access policy settings." lightbox="../media/restrict-clients-allowed-to-make-remote-calls-to-sam.png":::
45
+
46
+
43
47
For more information, see [Network access: Restrict clients allowed to make remote calls to SAM](/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls).
44
48
45
49
## Make sure the DSA is allowed to access computers from the network (optional)
@@ -60,6 +64,8 @@ To ensure that Windows clients and servers allow your Defender for Identity Dire
60
64
>
61
65
> The [Microsoft Security Compliance Toolkit](https://www.microsoft.com/download/details.aspx?id=55319) recommends replacing the default *Everyone* with *Authenticated Users* to prevent anonymous connections from performing network sign-ins. Review your local policy settings before managing the [Access this computer from the network](/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network) setting from a GPO, and consider including *Authenticated Users* in the GPO if needed.
62
66
67
+
:::image type="content" source="../media/define-security-policy-setting.png" alt-text="Screenshot of Security Policy Settings." lightbox="../media/define-security-policy-setting.png":::
68
+
63
69
## Configure a Device profile for Microsoft Entra hybrid joined devices only
64
70
65
71
This procedure describes how to use the [Microsoft Intune admin center](https://intune.microsoft.com/) to configure the policies in a Device profile if you're working with Microsoft Entra hybrid joined devices.
- Support for getting, testing, and setting the Active Directory Recycle Bin in Get/Set/Test MDIConfiguration.
31
+
- Support for getting, testing, and setting the proxy configuration on new MDI sensor.
32
+
- The Active Directory Certificate Services registry value for audit filtering now properly sets the type.
33
+
- New-MDIConfigurationReport now shows the name of the tested GPO and supports Server and Identity arguments.
34
+
35
+
Bug Fixes:
36
+
- Improved reliability for DeletedObjects container permissions on non-English operating systems.
37
+
- Fixed extraneous output for KDS root key creation.
38
+
- Other reliability fixes.
39
+
27
40
### New attack paths tab on the Identity profile page
28
41
29
42
This tab provides visibility into potential attack paths leading to a critical identity or involving it within the path, helping assess security risks. For more information, see [Overview of attack path within Exposure Management.](/security-exposure-management/work-attack-paths-overview)
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/app-governance-app-policies-create.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,7 +99,7 @@ Use a custom app policy when you need to do something not already done by one of
99
99
> [!NOTE]
100
100
> Some policy conditions are only applicable to apps that access Graph API permissions. When evaluating apps that access only non-Graph APIs, app governance skips these policy conditions and proceed to check only other policy conditions.
101
101
102
-
5. Here are the available conditions for a custom app policy:
102
+
1. Here are the available conditions for a custom app policy:
@@ -123,9 +123,9 @@ Use a custom app policy when you need to do something not already done by one of
123
123
|**Sensitivity labels accessed**|Select one or more sensitivity labels from the list|Apps that accessed data with specific sensitivity labels in the last 30 days.||
124
124
|**Services accessed** (Graph only)|Exchange and/or OneDrive and/or SharePoint and/or Teams|Apps that have accessed OneDrive, SharePoint, or Exchange Online using Microsoft Graph and EWS APIs|Multiple selections allowed.|
125
125
|**Error rate** (Graph only)|Error rate is greater than X% in the last seven days|Apps whose Graph API error rates in the last seven days are greater than a specified percentage||
126
-
|**App origin** (Preview)|External or Internal|Apps that originated within the tenant or registered in an external tenant||
127
-
128
-
All of the specified conditions must be met for this app policy to generate an alert.
126
+
|**App origin**|External or Internal|Apps that originated within the tenant or registered in an external tenant||
127
+
128
+
All of the specified conditions must be met for this app policy to generate an alert.
129
129
130
130
6. When you're done specifying the conditions, select **Save**, and then select **Next**.
131
131
@@ -166,7 +166,7 @@ Policies for OAuth apps trigger alerts only on policies that are authorized by u
166
166
1. Go to **Microsoft Defender XDR > App governance > Policies > Other apps**. For example:
2. Filter the apps according to your needs. For example, you might want to view all apps that request **Permission** to **Modify calendars in your mailbox**.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/app-governance-get-started.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ description: Get started with app governance capabilities to govern your apps in
10
10
This article describes how to turn on Microsoft Defender for Cloud Apps app governance.
11
11
12
12
> [!NOTE]
13
-
> By default, the Microsoft Defender for Cloud Apps instance in the US Government environments cannot connect to resources in Azure commercial and is FedRAMP compliant. However, App Governance is not FedRAMP certified. App Governance will only store and process data in secure locations within the United States and the data will only be accessible by approved Microsoft employees.
13
+
> By default, the Microsoft Defender for Cloud Apps instance in the US Government environments can't connect to resources in Azure commercial and is FedRAMP compliant. However, App Governance isn't FedRAMP certified. App Governance will only store and process data in secure locations within the United States and the data will only be accessible by approved Microsoft employees.
14
14
## Prerequisites
15
15
16
16
Before you start, verify that you satisfy the following prerequisites:
@@ -21,15 +21,16 @@ Before you start, verify that you satisfy the following prerequisites:
21
21
22
22
- You must have [one of the appropriate roles](#roles) to turn on app governance and access it.
23
23
24
-
- Your organization's billing address must be in a region **other than** Brazil, Singapore, Latin America, South Korea, Switzerland, Norway, South Africa, Sweden or United Arab Emirates.
24
+
25
+
- Your organization's billing address must be in a region **other than** Brazil, Singapore, Latin America, South Korea, Switzerland, Norway, Poland, Italy, Qatar, Israel, Spain, Mexico, South Africa, Sweden, or United Arab Emirates.
25
26
26
27
## Turn on app governance
27
28
28
29
If your organization satisfies the [prerequisites](#prerequisites), go to [Microsoft Defender XDR > Settings > Cloud Apps > App governance](https://security.microsoft.com/cloudapps/settings) and select **Use app governance**. For example:
29
30
30
31
:::image type="content" source="media/app-governance-get-started/app-governance-service-status2.png" alt-text="Screenshot of the App governance toggle in Microsoft Defender XDR." lightbox="media/app-governance-get-started/app-governance-service-status2.png":::
31
32
32
-
After you've signed up for app governance, you'll need to wait up to 10 hours to see and use the product.
33
+
After signing up for app governance, you'll need to wait up to 10 hours to see and use the product.
33
34
34
35
If you're unable to see the app governance option in the settings page, it might be due to one or more of the following reasons:
35
36
@@ -76,7 +77,7 @@ For more information about each role, see [Administrator role permissions](/azur
76
77
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
77
78
78
79
> [!NOTE]
79
-
> App governance alerts will not flow to Microsoft Defender XDR or show up in app governance until you have provisioned both Defender for Cloud Apps and Microsoft Defender XDR by accessing their respective portals at least once.
80
+
> App governance alerts won't flow to Microsoft Defender XDR or show up in app governance until you have provisioned both Defender for Cloud Apps and Microsoft Defender XDR by accessing their respective portals at least once.
0 commit comments