Skip to content

Commit d33151e

Browse files
committed
PM feedback implemented
1 parent 0bd1fd1 commit d33151e

File tree

8 files changed

+38
-45
lines changed

8 files changed

+38
-45
lines changed

ATPDocs/deploy/activate-sensor.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -23,32 +23,31 @@ You can choose to activate eligible domain controllers either automatically, whe
2323
|---------|---------|
2424
|Activate new sensor |The domain controller is already onboarded to Defender for Endpoint. [Activate the sensor](#activate-the-defender-for-identity-sensor).|
2525
|Install classic sensor|[Deploy the classic Defender for Identity sensor](install-sensor.md) from the **Sensors page**.|
26-
|Download onboarding package |[Onboard the domain controller to Defender for Endpoint](#onboard-the-domain-controller).|
26+
<!--|Download onboarding package |[Onboard the domain controller to Defender for Endpoint](#onboard-the-domain-controller).|-->
2727
|OS update is required |This domain controller is running an unsupported operating system version for the new sensor. Update the server to Windows Server 2019 or later to use the new sensor. |
2828

29-
## The Activation process
29+
<!--## The Activation process
3030
The process for activating the sensor depends on your configuration.
3131
- If you have a Defender for Endpoint deployment, simply [activate the sensor](#activate-the-defender-for-identity-sensor).
32-
- If the domain controller is not onboarded to Defender for Endpoint, [onboard the domain controller](#onboard-the-domain-controller) by configuring Defender for Endpoint streamlined URLs, and then downloading and running the onboarding package.
32+
- If the domain controller is not onboarded to Defender for Endpoint, [onboard the domain controller](#onboard-the-domain-controller) by configuring Defender for Endpoint streamlined URLs, and then downloading and running the onboarding package.-->
3333

3434
## Activate the Defender for Identity sensor
3535

3636
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Identities** > **Activation**.
3737
1. Select the domain controller where you want to activate Defender for Identity, and select **Activate**. Confirm your selection when prompted.
3838

39-
[![Screenshot that shows how to activate the new sensor.](media/activate-capabilities/activate.jpg)](media/activate-capabilities/activate.jpg#lightbox)
39+
[![Screenshot that shows how to activate the new sensor.](media/activate-capabilities/activate.png)](media/activate-capabilities/activate.png#lightbox)
4040

4141
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers**. This takes you to the **Sensors** page, where you can check your sensor health.
4242

4343
[![Screenshot that shows how to see the onboarded servers.](media/activate-capabilities/successfully-activated.png)](media/activate-capabilities/successfully-activated.png#lightbox)
4444

45-
45+
<!--->
4646
## Onboard the domain controller
4747

48-
If the domain controller has not been onboarded to Defender for Endpoint, follow these steps to activate the sensor.
48+
If the domain controller has not been onboarded to Defender for Endpoint for Servers, follow these steps to activate the sensor.
4949

50-
1. [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server)
51-
1. [Configure connectivity using streamlined connection](/microsoft-365/security/defender-endpoint/configure-device-connectivity#option-1-configure-connectivity-using-the-simplified-domain).
50+
1. [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server) using [streamlined URLs](/microsoft-365/security/defender-endpoint/configure-device-connectivity#option-1-configure-connectivity-using-the-simplified-domain).
5251
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Identities** > **Activation**.
5352
1. Select **Download onboarding package**, and save the file in a location you can access from your domain controller.
5453

@@ -59,13 +58,14 @@ If the domain controller has not been onboarded to Defender for Endpoint, follow
5958

6059
[![screenshot that shows the onboarding script.](media/activate-capabilities/screenshot-2025-06-04-170500.png)](media/activate-capabilities/screenshot-2025-06-04-170500.png#lightbox)
6160

61+
<!-->
6262

63-
## Confirm onboarding
63+
## Confirm sensor activation
6464

6565
To confirm the sensor is working:
6666

6767
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Identities** > **Sensors**.
68-
1. Check that the onboarded domain controller is listed.
68+
1. Check that the activated domain controller is listed.
6969

7070
> [!NOTE]
7171
> The first time you activate the Defender for Identity sensor on your domain controller, it might take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes. The activation doesn't require a restart/reboot.

ATPDocs/deploy/deploy-defender-identity.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,33 +8,33 @@ ms.reviewer: rlitinsky
88

99
# Microsoft Defender for Identity deployment overview
1010

11-
Defender for Identity uses sensors to collect signals from your on-premises identity infrastructure. This article explains the Microsoft Defender for Identity deployment process.
11+
Defender for Identity uses sensors to collect signals from your on-premises identity infrastructure to detect threats. This article explains the Microsoft Defender for Identity deployment process.
1212

13-
Defender for Identity uses signals to detect threats like privilege escalation or high-risk lateral movement and reports on easily exploited identity issues like unconstrained Kerberos delegation for correction by the security team.
13+
Defender for Identity detects threats like privilege escalation or high-risk lateral movement and reports on easily exploited identity issues like unconstrained Kerberos delegation for correction by the security team.
1414

1515
We recommend installing Defender for Identity sensors on all domain controllers, including read-only domain controllers (RODCs). If you have an AD FS, AD CS, or a Microsoft Entra Connect farm or cluster in your environment, install the sensor on each server.
1616

1717
## Select your deployment method
1818

19-
Once you've completed the steps to prepare your environment and assigned roles and permissions for Defender for Identity, create a plan for onboarding.
19+
Once you've completed the steps to prepare your environment, and assigned roles and permissions for Defender for Identity, create a plan for onboarding.
2020

2121
Identify your architecture and your requirements, and then use the table below to select the appropriate deployment for the servers in your environment.
2222

2323
|Server configuration |Server Operating System |Recommended deployment |
2424
|---------|---------|---------|---------|
2525
|Domain controller | Windows Server 2019 or later with the [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) or later.<br> * **See Note**.|[Defender for Identity sensor v3.x (Preview)](prerequisites-sensor-version-3.md)<br> * **See Note**. |
26-
| |Windows Server 2016 or earlier |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
26+
|Domain controller |Windows Server 2016 or earlier |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
2727
|[Active Directory Federation Services (AD FS)](active-directory-federation-services.md) | NA |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
2828
|[Active Directory Certificate Services (AD CS)](active-directory-federation-services.md) | NA |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
2929
|[Entra Connect](active-directory-federation-services.md)| NA |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
3030

3131
> [!NOTE]
3232
> The Defender for Identity sensor version 3.x is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
3333
> The Defender for Identity sensor v3.x:
34-
> - Requires that Defender for Endpoint is deployed
35-
> - Doesn't support VPN integration
36-
> - Doesn't support ExpressRoute
37-
> - Doesn't provide full functionality of health alerts, posture recommendations or security alerts
34+
> - Requires that Defender for Endpoint is deployed on your endpoints
35+
> - Doesn't currently support VPN integration
36+
> - Doesn't currently support ExpressRoute
37+
> - Doesn't currently offer full functionality of health alerts, posture recommendations or security alerts
3838
3939
Once you've evaluated your infrastructure and requirements, follow the instructions for deploying the sensor based on the version you need.
4040

62.1 KB
Loading

ATPDocs/deploy/multi-forest.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Multi-forest support | Microsoft Defender for Identity
2+
title: Multi-forest considerations | Microsoft Defender for Identity
33
description: Learn about how Microsoft Defender for Identity supports multiple Active Directory forests.
44
ms.date: 08/10/2023
55
ms.topic: article
66
ms.reviewer: martin77s
77
---
88

9-
# Microsoft Defender for Identity multi-forest support
9+
# Microsoft Defender for Identity multi-forest considerations
1010

1111
Microsoft Defender for Identity supports organizations with multiple Active Directory forests, giving you the ability to easily monitor activity and profile users across forests.
1212

@@ -20,7 +20,7 @@ Securing your multiple Active Directory forests with Defender for Identity provi
2020

2121
> [!NOTE]
2222
> Each Defender for Identity sensor can only report to a single Defender for Identity workspace.
23-
>
23+
2424

2525
## Detection activity across multiple forests
2626

ATPDocs/deploy/prerequisites-sensor-version-3.md

Lines changed: 5 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@ This article describes the requirements for installing the Microsoft Defender fo
1414

1515
Before activating the Defender for Identity sensor v3.x, note that this version of the sensor is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
1616
The Defender for Identity sensor v3.x:
17-
- Requires that Defender for Endpoint is deployed
18-
- Doesn't support VPN integration
19-
- Doesn't support ExpressRoute
20-
- Doesn't provide full functionality of health alerts, posture recommendations or security alerts.
17+
- Requires that Defender for Endpoint is deployed on your endpoints
18+
- Doesn't currently support VPN integration
19+
- Doesn't currently support ExpressRoute
20+
- Doesn't currently offer full functionality of health alerts, posture recommendations or security alerts
2121

2222
## Licensing requirements
2323

@@ -42,7 +42,7 @@ The following table summarizes the server requirements and recommendations for t
4242
|Prerequisite / Recommendation |Description |
4343
|---------|---------|
4444
|Operating System|The domain controller must have both:<br> - Windows Server 2019 or later<br> - [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) or later.|
45-
|Specifications| A domain controller server with a minimum of:<br> - two cores<br>- 6 GB of RAM<br>- 6 GB of disk space required, 10 GB recommended|
45+
|Specifications| A domain controller server with a minimum of:<br> - two cores<br>- 6 GB of RAM|
4646
|Performance| For optimal performance, set the **Power Option** of the machine running the Defender for Identity sensor to **High Performance**. |
4747
|Connectivity|Requires a Microsoft Defender for Endpoint deployment. If Microsoft Defender for Endpoint is installed on the domain controller, there are no additional connectivity requirements. |
4848
|Previous installations| Before activating the sensor on a domain controller, make sure that the domain controller doesn't have another Defender for Identity sensor already deployed.|
@@ -52,14 +52,6 @@ The following table summarizes the server requirements and recommendations for t
5252
> [!NOTE]
5353
> After the March 2024 Cumulative Update is installed, LSASS might experience a memory leak on domain controllers during on-premises and cloud-based Active Directory Domain Controllers service Kerberos authentication requests. [This out-of-band update: KB5037422](https://support.microsoft.com/en-gb/topic/march-22-2024-kb5037422-os-build-20348-2342-out-of-band-e8f5bf56-c7cb-4051-bd5c-cc35963b18f3) addresses this issue.
5454
55-
### Required ports
56-
57-
|Protocol |Transport |Port |From |To |Notes|
58-
|------------|---------|---------|-------|--------------|-----|
59-
|DNS |TCP and UDP |53 |Defender for Identity sensor|DNS Servers | |
60-
|RADIUS |UDP |1813|RADIUS |Defender for Identity sensor | |
61-
|Network Name Resolution (NNR) ports | | | | |To resolve IP addresses to computer names, we recommend opening all ports listed. However, only one port is required. |
62-
6355
### Dynamic memory requirements
6456

6557
The following table describes memory requirements on the server used for the Defender for Identity sensor, depending on the type of virtualization you're using:

ATPDocs/deploy/test-sensor.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Test Microsoft Defender for Identity sensors on domain controllers
2+
title: Validate the Microsoft Defender for Identity sensor deployment on domain controllers
33
description: Learn about how to check that the Microsoft Defender for Identity sensors have been onboarded correctly.
44
ms.date: 06/10/2025
55
ms.topic: how-to
66
ms.reviewer: rlitinsky
77
---
88

9-
# Test the Defender for Identity sensor on domain controllers
9+
# Validate the Defender for Identity sensor deployment on domain controllers
1010

11-
Use the following procedures to test that your sensors are working.
11+
Use the following procedures to check that your sensors are working.
1212
Note that the first time you activate the sensor on your domain controller, it might take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations show within five minutes.
1313

1414
## Check the ITDR dashboard

ATPDocs/toc.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,8 @@ items:
3333
items:
3434
- name: Prerequisites
3535
href: deploy/prerequisites-sensor-version-2.md
36+
- name: Deploy a sensor for multiple Active Directory forests
37+
href: deploy/multi-forest.md
3638
- name: Connect to the Defender for Identity service
3739
href: deploy/configure-proxy.md
3840
- name: Test connectivity settings
@@ -75,9 +77,7 @@ items:
7577
href: deploy/prerequisites-sensor-version-3.md
7678
- name: Activate the Defender for Identity sensor (Preview)
7779
href: deploy/activate-sensor.md
78-
- name: Deploy a sensor for multiple Active Directory forests
79-
href: deploy/multi-forest.md
80-
- name: Test the sensor
80+
- name: Validate the sensor deployment
8181
href: deploy/test-sensor.md
8282
- name: Configure event collection
8383
items:

ATPDocs/uninstall-sensor.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,26 @@
11
---
22
title: Uninstall the sensor
33
description: This article describes how to uninstall the Microsoft Defender for Identity sensor from domain controllers.
4-
ms.date: 01/30/2023
4+
ms.date: 07/02/2025
55
ms.topic: how-to
66
ms.reviewer: rlitinsky
77
---
88

9-
# Uninstall the Microsoft Defender for Identity sensor
9+
# Remove the Microsoft Defender for Identity sensor
1010

1111
This article describes how to uninstall the Microsoft Defender for Identity sensor from domain controllers.
1212

13-
## Prerequisites
13+
<!--## Prerequisites
1414
15-
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. You must remove Defender for Identity from Defender for Endpoint before uninstalling the sensor.
15+
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. You must remove Defender for Identity from Defender for Endpoint before deactivating the sensor.
1616
1717
1. In the [Defender portal](https://security.microsoft.com), go to **Settings** > **Identities** > **Activation**.
1818
1. Select **Download offboarding package** and save the file in a location you can access from your domain controller.
1919
![Screenshot that shows how to offboard the new sensor.](media/screenshot-that-shows-how-to-offboard-the-new-sensor.png)
2020
1. From the domain controller, extract the zip file, and run the `DefenderForIdentityOnlyOffboardingScript_valid_until_YYYY-MM-DD.cmd` script as an Administrator.
21+
-->
2122

22-
## Uninstall a sensor
23+
## Delete a sensor
2324

2425
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Identities** > **Sensors**.
2526
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.

0 commit comments

Comments
 (0)