You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/troubleshooting-known-issues.md
+18-3Lines changed: 18 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -224,7 +224,7 @@ Suggested possible workarounds:
224
224
225
225
## VMware virtual machine sensor issue
226
226
227
-
If you have a Defender for Identity sensor on VMware virtual machines, you might receive one or both of the following health alerts **Some network traffic is not being analyzed** and **Network configuratuin mismatch for sensors running on VMware**. This can happen because of a configuration mismatch in VMware.
227
+
If you have a Defender for Identity sensor on VMware virtual machines, you might receive one or both of the following health alerts **Some network traffic is not being analyzed** and **Network configuration mismatch for sensors running on VMware**. This can happen because of a configuration mismatch in VMware.
228
228
229
229
To resolve the issue:
230
230
@@ -422,7 +422,7 @@ Uninstall the certificate management client, install the Defender for Identity s
422
422
423
423
>[!NOTE]
424
424
>
425
-
>The self-signed certificate is renewed every 2 years, and the auto-renewal process might fail if the certificate management client prevents the self-signed certificate creation.
425
+
>The self-signed certificate is renewed every 2 years, and the auto-renewal process might fail if the certificate management client prevents the self-signed certificate creation.
426
426
> This will cause the sensor to stop communicating with the backend, which will require a sensor reinstallation using the workaround mentioned above.
427
427
428
428
## Sensor installation fails due to network connectivity issues
@@ -445,7 +445,6 @@ For more information, see [Run a silent installation with a proxy configuration]
445
445
446
446
> [!IMPORTANT]
447
447
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that aren't present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
448
-
>
449
448
450
449
## Sensor service couldn't run and remains in Starting state
451
450
@@ -486,6 +485,22 @@ The issue can come up when a Defender for Identity workspace license expires and
486
485
- "Azure ATP workspaceName Users" -> "Azure ATP workspaceName Users - old"
487
486
1. Then you can go back in the [Microsoft Defender portal](https://security.microsoft.com), to the [Settings](https://security.microsoft.com/securitysettings) -> [Identities](https://security.microsoft.com/settings/identities) section to create the new workspace for Defender for Identity.
488
487
488
+
## Entra Connect sensor experiences loss of database permissions following the update to Microsoft Entra Connect
489
+
490
+
**Cause:**
491
+
492
+
Updating Microsoft Entra Connect may cause the Entra Connect sensor to lose previously configured database permissions. To investigate, check the Microsoft Defender logs for relevant indicators. Refer to [Troubleshooting Microsoft Defender for Identity sensor using the Defender for Identity logs](troubleshooting-using-logs.md) for log locations and further details.
493
+
494
+
Sample logs that may indicate the issue:
495
+
496
+
`GetEntraConnectGlobalSettingsAsync GetEntraConnectGlobalSettingsAsync failed. Exception - The EXECUTE permission was denied on the object 'mms_get_globalsettings', database Contoso', schema 'dbo'`
497
+
498
+
`GetEntraConnectConnectivityParametersAsync GetEntraConnectConnectivityParametersAsync failed. Exception - The EXECUTE permission was denied on the object 'mms_get_connectors', database Contoso, schema 'dbo'`
499
+
500
+
**Resolution:**
501
+
502
+
If permissions need to be reconfigured, please follow the steps outlined in this [guide](deploy/active-directory-federation-services.md).
503
+
489
504
## Next steps
490
505
491
506
- [Defender for Identity prerequisites](deploy/prerequisites.md)
Copy file name to clipboardExpand all lines: defender-endpoint/ios-configure-features.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: ios
16
16
search.appverid: met150
17
-
ms.date: 02/06/2025
17
+
ms.date: 03/27/2025
18
18
---
19
19
20
20
# Configure Microsoft Defender for Endpoint on iOS features
@@ -319,7 +319,7 @@ Defender for Endpoint on iOS enables admins to configure custom indicators on iO
319
319
> [!NOTE]
320
320
> Defender for Endpoint on iOS supports creating custom indicators only for URLs and domains. IP based custom indicators aren't supported on iOS.
321
321
>
322
-
> IP `245.245.0.1` is an internal Defender IP and should not be included in custom indicators by customers to avoid any functionality issues.
322
+
> IP `245.245.0.1` is an internal Defender IP and shouldn't be included in custom indicators by customers to avoid any functionality issues.
323
323
>
324
324
> For iOS, no alerts are generated in the Microsoft Defender portal when the URL or domain set in the indicator is accessed.
325
325
@@ -427,6 +427,9 @@ Defender for Endpoint on iOS enables bulk tagging the mobile devices during onbo
427
427
428
428
This configuration is available for both the enrolled (MDM) devices and unenrolled (MAM) devices. Admins can use the following steps to configure the Device tags.
429
429
430
+
> [!NOTE]
431
+
> Configuring more than one device tags from Intune isn't supported as only one device tag reflects when configured. However, multiple device tags can be added manually in the XDR portal.
@@ -24,7 +24,7 @@ Content distribution helps you manage content at scale, across tenants in multit
24
24
Distributing content in this manner, across tenants, enables you to organize tenants and content based on categories like business groups or location.
25
25
26
26
> [!NOTE]
27
-
> Multitenant management currently supports adding custom detection rules to a tenant group. Additional content types will be added in the future.
27
+
> Multitenant management currently supports adding custom detection rules to a tenant group. Additional content types will be added in the future.
28
28
29
29
## Requirements
30
30
@@ -41,7 +41,7 @@ The following table lists the requirements for content distribution in multitena
41
41
To create a new tenant group:
42
42
43
43
1. Go to the [Tenant groups page](https://mto.security.microsoft.com/tenantgroups) in multitenant management in Microsoft Defender XDR.
44
-
2. Select **Create tenant group**. In the **Tenants** page, select **Add tenant** to see a list of available tenants that you can add to your tenant group. Choose the tenants you want to add to the tenant group, then select **Add**.:
44
+
2. Select **Create tenant group**. In the **Tenants** page, select **Add tenant** to see a list of available tenants that you can add to your tenant group. Choose the tenants you want to add to the tenant group, then select **Add**.
45
45
46
46
:::image type="content" source="media/mto-tenantgroups/mto-add-tenants-small.png" alt-text="Screenshot of the tenant group creation wizard." lightbox="media/mto-tenantgroups/mto-add-tenants.png":::
47
47
@@ -50,7 +50,7 @@ To create a new tenant group:
50
50
:::image type="content" source="media/mto-tenantgroups/mto-add-content-small.png" alt-text="Screenshot of content selection wizard." lightbox="media/mto-tenantgroups/mto-add-content.png":::
51
51
52
52
> [!NOTE]
53
-
> The content type selection is currently limited to adding custom detection rules to a tenant group. Adding other content types will be available in the future.
53
+
> The content type selection is currently limited to adding custom detection rules to a tenant group.
54
54
55
55
4. In the **Custom detection rules** page, select **Add content** to add specific detection rules to your tenant group.
56
56
@@ -82,6 +82,9 @@ Check the sync results under the **Last sync result** column. If the result is *
82
82
83
83
:::image type="content" source="media/mto-tenantgroups/mto-sync-results-small.png" alt-text="Screenshot of sync results side pane." lightbox="media/mto-tenantgroups/mto-sync-results.png":::
84
84
85
+
> [!NOTE]
86
+
> The maximum number of published items per publish operation is 9,500. Published items are calculated as the number of tenants multiplied by the number of templates. For example, if you publish 10 tenant groups with 10 target tenants and 95 content templates, then the published items equals to 9,500.
87
+
85
88
## Syncing content among tenant groups
86
89
87
90
To sync content across tenant groups for the tenants you have permission for:
0 commit comments