Skip to content

Commit cbda6fb

Browse files
Merge branch 'main' into docs-editor/microsoft-defender-endpoint-io-1742981282
2 parents 5b024a4 + 40b266d commit cbda6fb

File tree

3 files changed

+30
-9
lines changed

3 files changed

+30
-9
lines changed

ATPDocs/troubleshooting-known-issues.md

Lines changed: 18 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ Suggested possible workarounds:
224224

225225
## VMware virtual machine sensor issue
226226

227-
If you have a Defender for Identity sensor on VMware virtual machines, you might receive one or both of the following health alerts **Some network traffic is not being analyzed** and **Network configuratuin mismatch for sensors running on VMware**. This can happen because of a configuration mismatch in VMware.
227+
If you have a Defender for Identity sensor on VMware virtual machines, you might receive one or both of the following health alerts **Some network traffic is not being analyzed** and **Network configuration mismatch for sensors running on VMware**. This can happen because of a configuration mismatch in VMware.
228228

229229
To resolve the issue:
230230

@@ -422,7 +422,7 @@ Uninstall the certificate management client, install the Defender for Identity s
422422
423423
>[!NOTE]
424424
>
425-
>The self-signed certificate is renewed every 2 years, and the auto-renewal process might fail if the certificate management client prevents the self-signed certificate creation.
425+
> The self-signed certificate is renewed every 2 years, and the auto-renewal process might fail if the certificate management client prevents the self-signed certificate creation.
426426
> This will cause the sensor to stop communicating with the backend, which will require a sensor reinstallation using the workaround mentioned above.
427427
428428
## Sensor installation fails due to network connectivity issues
@@ -445,7 +445,6 @@ For more information, see [Run a silent installation with a proxy configuration]
445445
446446
> [!IMPORTANT]
447447
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that aren't present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
448-
>
449448
450449
## Sensor service couldn't run and remains in Starting state
451450
@@ -486,6 +485,22 @@ The issue can come up when a Defender for Identity workspace license expires and
486485
- "Azure ATP workspaceName Users" -> "Azure ATP workspaceName Users - old"
487486
1. Then you can go back in the [Microsoft Defender portal](https://security.microsoft.com), to the [Settings](https://security.microsoft.com/securitysettings) -> [Identities](https://security.microsoft.com/settings/identities) section to create the new workspace for Defender for Identity.
488487
488+
## Entra Connect sensor experiences loss of database permissions following the update to Microsoft Entra Connect
489+
490+
**Cause:**
491+
492+
Updating Microsoft Entra Connect may cause the Entra Connect sensor to lose previously configured database permissions. To investigate, check the Microsoft Defender logs for relevant indicators. Refer to [Troubleshooting Microsoft Defender for Identity sensor using the Defender for Identity logs](troubleshooting-using-logs.md) for log locations and further details.
493+
494+
Sample logs that may indicate the issue:
495+
496+
`GetEntraConnectGlobalSettingsAsync GetEntraConnectGlobalSettingsAsync failed. Exception - The EXECUTE permission was denied on the object 'mms_get_globalsettings', database Contoso', schema 'dbo'`
497+
498+
`GetEntraConnectConnectivityParametersAsync GetEntraConnectConnectivityParametersAsync failed. Exception - The EXECUTE permission was denied on the object 'mms_get_connectors', database Contoso, schema 'dbo'`
499+
500+
**Resolution:**
501+
502+
If permissions need to be reconfigured, please follow the steps outlined in this [guide](deploy/active-directory-federation-services.md).
503+
489504
## Next steps
490505
491506
- [Defender for Identity prerequisites](deploy/prerequisites.md)

defender-endpoint/ios-configure-features.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: ios
1616
search.appverid: met150
17-
ms.date: 02/06/2025
17+
ms.date: 03/27/2025
1818
---
1919

2020
# Configure Microsoft Defender for Endpoint on iOS features
@@ -319,7 +319,7 @@ Defender for Endpoint on iOS enables admins to configure custom indicators on iO
319319
> [!NOTE]
320320
> Defender for Endpoint on iOS supports creating custom indicators only for URLs and domains. IP based custom indicators aren't supported on iOS.
321321
>
322-
> IP `245.245.0.1` is an internal Defender IP and should not be included in custom indicators by customers to avoid any functionality issues.
322+
> IP `245.245.0.1` is an internal Defender IP and shouldn't be included in custom indicators by customers to avoid any functionality issues.
323323
>
324324
> For iOS, no alerts are generated in the Microsoft Defender portal when the URL or domain set in the indicator is accessed.
325325
@@ -427,6 +427,9 @@ Defender for Endpoint on iOS enables bulk tagging the mobile devices during onbo
427427

428428
This configuration is available for both the enrolled (MDM) devices and unenrolled (MAM) devices. Admins can use the following steps to configure the Device tags.
429429

430+
> [!NOTE]
431+
> Configuring more than one device tags from Intune isn't supported as only one device tag reflects when configured. However, multiple device tags can be added manually in the XDR portal.
432+
430433
### Configure device tags using MDM
431434

432435
**For enrolled devices (MDM)**

unified-secops-platform/mto-tenantgroups.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- highpri
1313
- tier1
1414
ms.topic: conceptual
15-
ms.date: 01/02/2025
15+
ms.date: 03/27/2025
1616
appliesto:
1717
- ✅ <a href="https://learn.microsoft.com/microsoft-365/security/defender/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
1818
---
@@ -24,7 +24,7 @@ Content distribution helps you manage content at scale, across tenants in multit
2424
Distributing content in this manner, across tenants, enables you to organize tenants and content based on categories like business groups or location.
2525

2626
> [!NOTE]
27-
> Multitenant management currently supports adding custom detection rules to a tenant group. Additional content types will be added in the future.
27+
> Multitenant management currently supports adding custom detection rules to a tenant group. Additional content types will be added in the future.
2828
2929
## Requirements
3030

@@ -41,7 +41,7 @@ The following table lists the requirements for content distribution in multitena
4141
To create a new tenant group:
4242

4343
1. Go to the [Tenant groups page](https://mto.security.microsoft.com/tenantgroups) in multitenant management in Microsoft Defender XDR.
44-
2. Select **Create tenant group**. In the **Tenants** page, select **Add tenant** to see a list of available tenants that you can add to your tenant group. Choose the tenants you want to add to the tenant group, then select **Add**.:
44+
2. Select **Create tenant group**. In the **Tenants** page, select **Add tenant** to see a list of available tenants that you can add to your tenant group. Choose the tenants you want to add to the tenant group, then select **Add**.
4545

4646
:::image type="content" source="media/mto-tenantgroups/mto-add-tenants-small.png" alt-text="Screenshot of the tenant group creation wizard." lightbox="media/mto-tenantgroups/mto-add-tenants.png":::
4747

@@ -50,7 +50,7 @@ To create a new tenant group:
5050
:::image type="content" source="media/mto-tenantgroups/mto-add-content-small.png" alt-text="Screenshot of content selection wizard." lightbox="media/mto-tenantgroups/mto-add-content.png":::
5151

5252
> [!NOTE]
53-
> The content type selection is currently limited to adding custom detection rules to a tenant group. Adding other content types will be available in the future.
53+
> The content type selection is currently limited to adding custom detection rules to a tenant group.
5454
5555
4. In the **Custom detection rules** page, select **Add content** to add specific detection rules to your tenant group.
5656

@@ -82,6 +82,9 @@ Check the sync results under the **Last sync result** column. If the result is *
8282

8383
:::image type="content" source="media/mto-tenantgroups/mto-sync-results-small.png" alt-text="Screenshot of sync results side pane." lightbox="media/mto-tenantgroups/mto-sync-results.png":::
8484

85+
> [!NOTE]
86+
> The maximum number of published items per publish operation is 9,500. Published items are calculated as the number of tenants multiplied by the number of templates. For example, if you publish 10 tenant groups with 10 target tenants and 95 content templates, then the published items equals to 9,500.
87+
8588
## Syncing content among tenant groups
8689

8790
To sync content across tenant groups for the tenants you have permission for:

0 commit comments

Comments
 (0)