Skip to content

Commit d1de849

Browse files
Merge pull request #5283 from MicrosoftDocs/main
[AutoPublish] main to live - 10/16 04:28 PDT | 10/16 16:58 IST
2 parents 399e898 + 95e8a38 commit d1de849

File tree

4 files changed

+10
-8
lines changed

4 files changed

+10
-8
lines changed

defender-endpoint/supported-capabilities-by-platform.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,8 @@ The following table gives information about the supported Microsoft Defender for
5555
|[Device response capabilities: collect investigation package ](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
5656
|[Device response capabilities: run antivirus scan](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
5757
|[Device isolation](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
58-
|File response capabilities: collect file, deep analysis | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
59-
|File response capabilities: block file, stop, and quarantine processes | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![No](media/svg/check-no.svg) | ![No](media/svg/check-no.svg) |
58+
|[File response capabilities: collect file, deep analysis](respond-file-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
59+
|[File response capabilities: block file, stop, and quarantine processes](respond-file-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![No](media/svg/check-no.svg) | ![No](media/svg/check-no.svg) |
6060
|[Live Response](live-response.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
6161

6262
> [!NOTE]

defender-for-cloud-apps/real-time-agent-protection-during-runtime.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,14 +36,16 @@ This capability adds another security layer on top of Microsoft Copilot Studio,
3636

3737
Before enabling real-time agent protection during runtime, make sure:
3838

39-
- You have a valid Microsoft Defender for Cloud Apps license (included in Microsoft 365 E5 Security).
39+
- You have a valid Microsoft Defender for Cloud Apps license.
4040

4141
- You have Security Administrator privileges in the Microsoft Defender portal.
4242

4343

4444
> [!NOTE]
4545
> The onboarding process for real-time protection during agent runtime involves configuration in Power Platform and collaboration with other administrators.
46-
46+
>
47+
> [!IMPORTANT]
48+
> This feature is currently in preview and included with your Microsoft Defender for Cloud Apps license at no extra cost. Licensing requirements may change when the feature becomes generally available. If that happens, the feature will be disabled, and you will be notified should you wish to re-enable it under the new license.
4749
4850
## Turn on real-time protection during agent runtime
4951

defender-for-identity/deploy/active-directory-federation-services.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.reviewer: rlitinsky
88

99
# Configure sensors for AD FS, AD CS, and Microsoft Entra Connect
1010

11-
Install Defender for Identity sensors on Active Directory Federation Services (AD FS), Active Directory Certificate Services (AD CS), and Microsoft Entra Connect servers to help protect them from on-premises and hybrid attacks. This article describes the installation steps.
11+
Install Defender for Identity sensors on Active Directory Federation Services (AD FS), Active Directory Certificate Services (AD CS), and Microsoft Entra Connect servers to help protect them from on-premise and cloud attacks. This article describes the installation steps.
1212

1313
These considerations apply:
1414

defender-for-identity/security-assessment.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,19 +8,19 @@ ms.reviewer: LiorShapiraa
88

99
# Microsoft Defender for Identity's security posture assessments
1010

11-
Typically, organizations of all sizes have limited visibility into whether or not their on-premises apps and services could introduce a security vulnerability to their organization. The problem of limited visibility is especially true regarding use of unsupported or outdated components.
11+
Typically, organizations of all sizes have limited visibility into whether or not their on-premise and cloud apps and services could introduce a security vulnerability to their organization. The problem of limited visibility is especially true regarding use of unsupported or outdated components.
1212

1313
While your company might invest significant time and effort on hardening identities and identity infrastructure (such as Active Directory, Active Directory Connect) as an ongoing project, it's easy to remain unaware of common misconfigurations and use of legacy components that represent one of the greatest threat risks to your organization.
1414

15-
Microsoft security research reveals that most identity attacks utilize common misconfigurations in Active Directory and continued use of legacy components (such as NTLMv1 protocol) to compromise identities and successfully breach your organization. To combat this effectively, Microsoft Defender for Identity now offers proactive identity security posture assessments to detect and recommend actions across your on-premises Active Directory configurations.
15+
Microsoft security research reveals that most identity attacks utilize common misconfigurations in Active Directory and continued use of legacy components (such as NTLMv1 protocol) to compromise identities and successfully breach your organization. To combat this effectively, Microsoft Defender for Identity now offers proactive identity security posture assessments to detect and recommend actions across your on-premise Active Directory configurations.
1616

1717
## What do Defender for Identity security assessments provide?
1818

1919
Defender for Identity security posture assessments are available in [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score), and provide:
2020

2121
- **Detections and contextual data** on known exploitable components and misconfigurations, along with relevant paths for remediation.
2222

23-
- **Active monitoring for your on-premises identities and identity infrastructure**, watching for weak spots with the existing Defender for Identity sensor.
23+
- **Active monitoring for your on-premise and cloud identities and identity infrastructure**, watching for weak spots with the existing Defender for Identity sensor.
2424

2525
- **Accurate assessment reports** of your current organization security posture, for quick responses and effect monitoring in a continuous cycle.
2626

0 commit comments

Comments
 (0)