Skip to content

Commit cfa4e89

Browse files
Merge branch 'main' into e36a4f49-6289-4594-becd-26b568ea0be0_48
2 parents 7f39079 + bd88901 commit cfa4e89

File tree

469 files changed

+1795
-1231
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

469 files changed

+1795
-1231
lines changed

.github/workflows/AutoPublish.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,21 +3,23 @@ name: (Scheduled) Publish to live
33
permissions:
44
contents: write
55
pull-requests: write
6+
checks: read
67

78
on:
89
schedule:
9-
- cron: "25 5,11,17,22 * * *" # Times are UTC based on Daylight Saving Time. Need to be adjusted for Standard Time. Scheduling at :25 to account for queuing lag.
10+
- cron: "25 2,5,8,11,14,17,20,22 * * *" # Times are UTC based on Daylight Saving Time. Need to be adjusted for Standard Time. Scheduling at :25 to account for queuing lag.
1011

1112
workflow_dispatch:
1213

1314
jobs:
1415

1516
auto-publish:
1617
if: github.repository_owner == 'MicrosoftDocs' && contains(github.event.repository.topics, 'build')
17-
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-AutoPublish.yml@workflows-prod
18+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-AutoPublishV2.yml@workflows-prod
1819
with:
1920
PayloadJson: ${{ toJSON(github) }}
2021
EnableAutoPublish: true
22+
EnableAutoMerge: true
2123

2224
secrets:
2325
AccessToken: ${{ secrets.GITHUB_TOKEN }}

.openpublishing.redirection.ata-atp.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1039,6 +1039,11 @@
10391039
"source_path": "ATPDocs/security-assessment-legacy-protocols.md",
10401040
"redirect_url": "/defender-for-identity/security-assessment",
10411041
"redirect_document_id": false
1042-
}
1042+
},
1043+
{
1044+
"source_path": "ATPDocs/manage-security-alerts.md",
1045+
"redirect_url": "/defender-for-identity/understanding-security-alerts",
1046+
"redirect_document_id": false
1047+
},
10431048
]
10441049
}

ATADocs/whats-new-version-1.4.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: What's new in Advanced Threat Analytics version 1.4
55
description: Lists what was new in ATA version 1.4 along with known issues
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: whats-new
88
ms.service: advanced-threat-analytics
99
ms.assetid: cbea47f9-34c1-42b6-ae9e-6a472b49e1a5
1010

ATADocs/whats-new-version-1.5.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: What's new in Advanced Threat Analytics version 1.5
55
description: Lists what was new in ATA version 1.5 along with known issues
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: whats-new
88
ms.service: advanced-threat-analytics
99
ms.assetid: a0d64aff-ca9e-4300-b3f8-eb3c8b8ae045
1010

ATADocs/whats-new-version-1.6.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: What's new in Advanced Threat Analytics version 1.6
55
description: Lists what was new in ATA version 1.6 along with known issues
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: whats-new
88
ms.service: advanced-threat-analytics
99
ms.assetid: 27b139e5-12b9-4953-8f53-eb58e8ce0038
1010

ATADocs/whats-new-version-1.7.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: What's new in ATA version 1.7
55
description: Lists what was new in ATA version 1.7 along with known issues
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: whats-new
88
ms.service: advanced-threat-analytics
99
ms.assetid: be9ee613-4eb3-40f1-8973-e7f0a707ff57
1010

ATADocs/whats-new-version-1.8.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: What's new in ATA version 1.8
55
description: Lists what was new in ATA version 1.8 along with known issues
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: whats-new
88
ms.service: advanced-threat-analytics
99
ms.assetid: 9592d413-df0e-4cec-8e03-be1ae00ba5dc
1010

ATADocs/whats-new-version-1.9.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: What's new in ATA version 1.9
55
description: Lists what was new in ATA version 1.9 along with known issues
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: whats-new
88
ms.service: advanced-threat-analytics
99
ms.assetid: 51de491c-49ba-4aff-aded-cc133a8ccf0b
1010

ATPDocs/alerts-overview.md

Lines changed: 22 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,29 @@
11
---
22
title: Security alerts
33
description: This article provides a list of the security alerts issued by Microsoft Defender for Identity.
4-
ms.date: 03/23/2023
5-
ms.topic: conceptual
6-
ms.reviewer: morRubin
4+
ms.date: 05/08/2025
5+
ms.topic: reference
6+
ms.reviewer: rlitinsky
77
---
88

99
# Security alerts in Microsoft Defender for Identity
1010

11+
## What are Microsoft Defender for Identity security alerts?
12+
13+
Microsoft Defender for Identity security alerts provide information about the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
14+
1115
> [!NOTE]
12-
> The experience described in this page can be accessed at <https://security.microsoft.com> as part of Microsoft Defender XDR.
16+
> Defender for Identity isn't designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
17+
18+
The Identity alerts page gives you cross-domain signal enrichment and automated identity response capabilities. The benefit of investigating alerts with [Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-365-defender) is that Microsoft Defender for Identity alerts are correlated with information obtained from each of the other products in the suite. These enhanced alerts are consistent with the other Microsoft Defender XDR alert formats originating from [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security) and [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint).
19+
20+
Alerts originating from Defender for Identity trigger [Microsoft Defender XDR automated investigation and response (AIR)](/microsoft-365/security/defender/m365d-autoir) capabilities, including automatically remediating alerts and the mitigation of tools and processes that can contribute to the suspicious activity.
1321

14-
Microsoft Defender for Identity security alerts explain the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
22+
Microsoft Defender for Identity alerts currently appear in two different layouts in the Microsoft Defender XDR portal. While the alert views may show different information, all alerts are based on detections from Defender for Identity sensors. The differences in layout and information shown are part of an ongoing transition to a unified alerting experience across Microsoft Defender products.
23+
24+
For more information, see [View and manage security alerts](understanding-security-alerts.md).
25+
26+
## Alert categories
1527

1628
Defender for Identity security alerts are divided into the following categories or phases, like the phases seen in a typical cyber-attack kill chain. Learn more about each phase, the alerts designed to detect each attack, and how to use the alerts to help protect your network using the following links:
1729

@@ -21,14 +33,11 @@ Defender for Identity security alerts are divided into the following categories
2133
1. [Lateral movement alerts](lateral-movement-alerts.md)
2234
1. [Other alerts](other-alerts.md)
2335

24-
To learn more about the structure and common components of all Defender for Identity security alerts, see [Understanding security alerts](understanding-security-alerts.md).
2536

26-
## Security alert name mapping and unique external IDs
37+
## Map security alerts to unique external ID and MITRE ATT&CK Matrix tactics
2738

2839
The following table lists the mapping between alert names, their corresponding unique external IDs, their severity, and their MITRE ATT&CK Matrix&trade; tactic. When used with scripts or automation, Microsoft recommends use of alert external IDs in place of alert names, as only security alert external IDs are permanent, and not subject to change.
2940

30-
### External IDs
31-
3241
| Security alert name | Unique external ID | Severity | MITRE ATT&CK Matrix™ |
3342
| ------------------------------------------------------------ | ------------------- | -------------------------------------------------------- | ------------------------------------------------------------ |
3443
| [Suspected SID-History injection](persistence-privilege-escalation-alerts.md#suspected-sid-history-injection-external-id-1106) | 1106 | High | Privilege Escalation |
@@ -56,7 +65,7 @@ The following table lists the mapping between alert names, their corresponding u
5665
| [Suspected Golden Ticket usage (nonexistent account)](persistence-privilege-escalation-alerts.md#suspected-golden-ticket-usage-nonexistent-account-external-id-2027) | 2027 | High | Persistence, Privilege Escalation, Lateral movement |
5766
| [Suspected DCShadow attack (domain controller promotion)](other-alerts.md#suspected-dcshadow-attack-domain-controller-promotion-external-id-2028) | 2028 | High | Defense evasion |
5867
| [Suspected DCShadow attack (domain controller replication request)](other-alerts.md#suspected-dcshadow-attack-domain-controller-replication-request-external-id-2029) | 2029 | High | Defense evasion |
59-
| [Data exfiltration over SMB](other-alerts.md#data-exfiltration-over-smb-external-id-2030) | 2030 | High | Exfiltration, Lateral movement, Command and control |
68+
| [Data exfiltration over SMB](other-alerts.md#data-exfiltration-over-smb-external-id-2030) | 2030 | High | Exfiltration, Lateral movement, Command, and control |
6069
| [Suspicious communication over DNS](other-alerts.md#suspicious-communication-over-dns-external-id-2031) | 2031 | Medium | Exfiltration |
6170
| [Suspected Golden Ticket usage (ticket anomaly)](persistence-privilege-escalation-alerts.md#suspected-golden-ticket-usage-ticket-anomaly-external-id-2032) | 2032 | High | Persistence, Privilege Escalation, Lateral movement |
6271
| [Suspected Brute Force attack (SMB)](lateral-movement-alerts.md#suspected-brute-force-attack-smb-external-id-2033) | 2033 | Medium | Lateral movement |
@@ -98,14 +107,13 @@ The following table lists the mapping between alert names, their corresponding u
98107
| [Suspicious modifications to the AD CS security permissions/settings](persistence-privilege-escalation-alerts.md#suspicious-modifications-to-the-ad-cs-security-permissionssettings--external-id-2435) | 2435 | Medium | Privilege escalation |
99108
| [Account Enumeration reconnaissance (LDAP)](reconnaissance-discovery-alerts.md#account-enumeration-reconnaissance-ldap-external-id-2437-preview) (Preview) | 2437 | Medium | Account Discovery, Domain Account |
100109
| [Directory Services Restore Mode Password Change](other-alerts.md#directory-services-restore-mode-password-change-external-id-2438) | 2438 | Medium | Persistence, Account Manipulation |
101-
| [Honeytoken was queried via SAM-R](reconnaissance-discovery-alerts.md#honeytoken-was-queried-via-sam-r-external-id-2439) | 2439 | Low | Discovery |
102110
|[Group Policy Tampering ](/defender-for-identity/other-alerts)|2440|Medium|Defense evasion|
103111

104112
> [!NOTE]
105-
> To disable any security alert, contact support.
113+
> Contact support to disable security alerts.
106114
107115
## See Also
108116

109-
- [Working with security alerts](/defender-for-identity/manage-security-alerts)
110-
- [Understanding security alerts](understanding-security-alerts.md)
117+
- [View and manage security alerts](understanding-security-alerts.md)
118+
- [Investigate security alerts](/defender-for-identity/investigate-security-alerts)
111119
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)

ATPDocs/automated-response-exclusions.md

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -18,27 +18,30 @@ For example, an incident involving Attack Disruption, where response actions are
1818

1919
## How to add automated response exclusions
2020

21-
1. In [Microsoft Defender XDR](https://security.microsoft.com/), go to **Settings** and then **Identities**.
2221

23-
![Go to Settings, then Identities.](media/settings-identities.png)
22+
1. In the [Microsoft Defender XDR](https://security.microsoft.com/) portal, go to **Settings** and then **Microsoft Defender XDR**.
2423

25-
1. You'll then see **Automated response exclusions** in the left-hand menu.
24+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-settings1.png" alt-text="Go to Settings, then Microsoft Defender XDR.":::
2625

27-
![Automated response exclusions.](media/automated-response-exclusions.png)
26+
27+
2. You'll see **Automated response > Identities** in the left-side menu.
2828

29-
1. To exclude specific users, select **Exclude Users**.
29+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-automated-response.png" alt-text="Go to Automated response then Identities.":::
30+
31+
3. To exclude specific users, select **Add User Exclusion**.
3032

31-
:::image type="content" source="media/exclude-users.png" alt-text="Exclude specific users.":::
32-
33-
1. Search for the users to exclude and select the **Exclude Users** button.
33+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-add-exclusion.png" alt-text="Exclude specific users.":::
34+
35+
4. Search for the users to exclude and select the **Exclude Users** button.
3436

3537
:::image type="content" source="media/exclude-specific-users.png" alt-text="Choose which users to exclude.":::
38+
39+
5. To remove excluded users, select the relevant users from the list and select the **Remove** button.
3640

37-
1. To remove excluded users, select the relevant users from the list and select the **Remove** button.
38-
39-
:::image type="content" source="media/remove-excluded-users.png" alt-text="Remove excluded users.":::
40-
41+
:::image type="content" source="media/remove-excluded-users.png" alt-text="Remove excluded users.":::
42+
4143
## See also
4244

4345
- [Configure event collection](deploy/configure-event-collection.md)
44-
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)
46+
- [Check out the Defender for Identity forum!](https://aka.ms/MDIcommunity)
47+

0 commit comments

Comments
 (0)