You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/alerts-overview.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,7 +98,6 @@ The following table lists the mapping between alert names, their corresponding u
98
98
|[Suspicious modifications to the AD CS security permissions/settings](persistence-privilege-escalation-alerts.md#suspicious-modifications-to-the-ad-cs-security-permissionssettings--external-id-2435)| 2435 | Medium | Privilege escalation |
Copy file name to clipboardExpand all lines: ATPDocs/automated-response-exclusions.md
+16-13Lines changed: 16 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,27 +18,30 @@ For example, an incident involving Attack Disruption, where response actions are
18
18
19
19
## How to add automated response exclusions
20
20
21
-
1. In [Microsoft Defender XDR](https://security.microsoft.com/), go to **Settings** and then **Identities**.
22
21
23
-

22
+
1. In the [Microsoft Defender XDR](https://security.microsoft.com/) portal, go to **Settings** and then **Microsoft Defender XDR**.
24
23
25
-
1. You'll then see **Automated responseexclusions** in the left-hand menu.
24
+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-settings1.png" alt-text="Go to Settings, then Microsoft Defender XDR.":::
2. You'll see **Automated response > Identities** in the left-side menu.
28
28
29
-
1. To exclude specific users, select **Exclude Users**.
29
+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-automated-response.png" alt-text="Go to Automated response then Identities.":::
30
+
31
+
3. To exclude specific users, select **Add User Exclusion**.
30
32
31
-
:::image type="content" source="media/exclude-users.png" alt-text="Exclude specific users.":::
32
-
33
-
1. Search for the users to exclude and select the **Exclude Users** button.
33
+
:::image type="content" source="media/automated-response-exclusions/screenshot-xdr-add-exclusion.png" alt-text="Exclude specific users.":::
34
+
35
+
4. Search for the users to exclude and select the **Exclude Users** button.
34
36
35
37
:::image type="content" source="media/exclude-specific-users.png" alt-text="Choose which users to exclude.":::
38
+
39
+
5. To remove excluded users, select the relevant users from the list and select the **Remove** button.
36
40
37
-
1. To remove excluded users, select the relevant users from the list and select the **Remove** button.
Copy file name to clipboardExpand all lines: ATPDocs/deploy/activate-capabilities.md
+50-30Lines changed: 50 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,11 +6,15 @@ ms.topic: how-to
6
6
ms.reviewer: rlitinsky
7
7
---
8
8
9
-
# Activate Microsoft Defender for Identity capabilities directly on a domain controller
9
+
# Activate Microsoft Defender for Identity capabilities directly on a domain controller (Preview)
10
10
11
-
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using [Microsoft Defender for Identity classic sensor](deploy-defender-identity.md).
11
+
This article describes how to activate and test Microsoft Defender for Identity new sensor capabilities on your domain controller.
12
12
13
-
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
13
+
> [!NOTE]
14
+
> The capabilities described in this article are currently available as Preview features. Preview features are features that aren't complete, but are made available on a "preview" basis so customers can get early access and provide feedback.
15
+
>
16
+
> Preview features are still in development, have limited or restricted functionality and may be available only in selected geographic areas.
17
+
> For more information, see the [Microsoft Defender XDR preview features](/defender-xdr/preview)
14
18
15
19
> [!IMPORTANT]
16
20
> The new Defender for Identity sensor (version 3.x) is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](quick-installation-guide.md).
@@ -71,40 +75,52 @@ Set-MDIConfiguration -Mode Domain -Configuration All
71
75
72
76
### Customers with domain controllers already onboarded to Defender for Endpoint
73
77
78
+
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using [Microsoft Defender for Identity classic sensor](deploy-defender-identity.md).
79
+
74
80
### Activate Defender for Identity capabilities
75
81
76
82
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
77
83
78
84
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
79
85
80
-
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the activation of the new Defender for Identity sensor. For each server you can find its activation state.
81
-
82
-
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
86
+
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the activation of the new Defender for Identity sensor. For each server, you can find its activation state.
83
87
84
-
:::image type="content" source="media/activate-capabilities/1.jpg" lightbox="media/activate-capabilities/1.jpg" alt-text="Screenshot that shows how to activate the new sensor.":::
88
+
1. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
85
89
86
-
> [!NOTE]
87
-
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
90
+
[](media/activate-capabilities/1.jpg#lightbox)
88
91
89
-
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
92
+
93
+
> [!NOTE]
94
+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
90
95
91
-
:::image type="content" source="media/activate-capabilities/2.jpg" lightbox="media/activate-capabilities/2.jpg" alt-text="Screenshot that shows how to seethe onboarded servers.":::
96
+
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
92
97
98
+
99
+
[](media/activate-capabilities/2.jpg#lightbox)
100
+
93
101
### Customers without domain controllers onboarded to Defender for Endpoint
94
102
95
103
### Connectivity requirements
96
104
97
-
Defender for Identity capabilities directly on domain controllers use Defender for Endpoint URL endpoints for communication, including simplified URLs.
105
+
Defender for Identity capabilities directly on domain controllers use Defender for Endpoint URL endpoints for communication, including streamlined URLs.
98
106
99
-
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).
107
+
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-environment##enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server), [Configure connectivity using streamlined connection](/microsoft-365/security/defender-endpoint/configure-device-connectivity#option-1-configure-connectivity-using-the-simplified-domain).
100
108
101
-
### Onboard Defender for Identity capabilities
102
-
Download the Defender for Identity onboarding package from the [Microsoft Defender portal] (https://security.microsoft.com)
109
+
### Onboard Defender for Identity capabilities
110
+
111
+
Download the Defender for Identity onboarding package from the [Microsoft Defender portal](https://security.microsoft.com)
112
+
113
+
1. Navigate to **System** > **Settings** > **Identities** > **Activation**.
103
114
104
-
1. Navigate to **System** > **Settings** > **Identities** > **Activation**
105
115
2. Select Download onboarding package and save the file in a location you can access from your domain controller.
106
-
3. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOnboardingScript.cmd` script as an Administrator.
116
+
117
+
118
+
[](media/activate-capabilities/screenshot-that-shows-how-to-onboard-the-new-sensor.png#lightbox)
107
119
120
+
3. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOnboardingScript.cmd` script as an Administrator.
121
+
122
+
[](media/activate-capabilities/screenshot-2025-06-04-170500.png#lightbox)
123
+
108
124
## Onboarding Confirmation
109
125
110
126
To confirm the sensor has been onboarded:
@@ -113,11 +129,10 @@ To confirm the sensor has been onboarded:
113
129
114
130
2. Check that the onboarded domain controller is listed.
115
131
116
-
> [!NOTE]
117
-
> The onboarding doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
118
-
> To check the onboarding on the local server you can also review the event log under **Applications and Services Logs** > **Microsoft** > **Windows** > **Sense** > **Operational**. You should receive an onboarding event:
132
+
> [!NOTE]
133
+
> The onboarding doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
119
134
120
-
## Test activated capabilities
135
+
**Test activated capabilities**
121
136
122
137
Defender for Identity capabilities on domain controllers currently support the following Defender for Identity functionality:
123
138
@@ -147,7 +162,7 @@ In the Defender portal, check for the following details:
147
162
148
163
-**Group entities**: Use the global search to find a user group, or pivot from a user or device details page where group details are shown. Check for details of group membership, view group users, and group timeline data.
149
164
150
-
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
165
+
If no event data is found on the group timeline, you may need to create some manually. For example, do this by adding and removing users from the group in Active Directory.
151
166
152
167
For more information, see [Investigate assets](../investigate-assets.md).
153
168
@@ -226,22 +241,27 @@ For more information, see [Remediation actions in Microsoft Defender for Identit
226
241
227
242
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
228
243
229
-
1. Navigate to **Settings** > **Identities** > **Sensors**
230
-
2. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
231
-
232
-
:::image type="content" source="media/activate-capabilities/3.jpg" lightbox="media/activate-capabilities/3.jpg" alt-text="Screenshot that shows how to deactivate a server.":::
244
+
1. Navigate to **Settings** > **Identities** > **Sensors**.
245
+
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
233
246
247
+

248
+
234
249
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
235
250
236
251
### Customers without domain controllers onboarded to Defender for Endpoint
237
252
238
253
### Offboard Defender for Identity capabilities on your domain controller
239
-
Download the Defender for Identity offboarding package from the [Microsoft Defender portal](https://security.microsoft.com).
254
+
Download the Defender for Identity offboarding package from the [Microsoft Defender portal](https://security.microsoft.com).
240
255
241
256
1. Navigate to **Settings** > **Identities** > **Activation**
242
-
2. Select Download offboarding package and save the file in a location you can access from your domain controller.
243
-
3. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOffboardingScript_valid_until_YYYY-MM-DD.cmd` script as an Administrator.
244
-
4. To fully remove the sensor, navigate to **Settings** > **Identities** > **Sensors**, select the server and click Delete.
257
+
258
+
1. Select Download offboarding package and save the file in a location you can access from your domain controller.
259
+

260
+
1. From the domain controller, extract the zip file you downloaded from the Microsoft Defender portal, and run the `DefenderForIdentityOnlyOffboardingScript_valid_until_YYYY-MM-DD.cmd` script as an Administrator.
261
+
1. To fully remove the sensor, navigate to **Settings** > **Identities** > **Sensors**, select the server, and click **Delete**.
262
+
263
+
:::image type="content" source="media/activate-capabilities/screenshot-that-shows-how-to-delete-a-sensor.png" alt-text="Screenshot that shows how to delete a sensor" lightbox="media/activate-capabilities/screenshot-that-shows-how-to-delete-a-sensor.png":::
Copy file name to clipboardExpand all lines: ATPDocs/deploy/configure-windows-event-collection.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Configure audit policies for Windows event logs | Microsoft Defender for Identity
3
3
description: This article describes how to configure audit policies for Windows event logs as part of deploying a Microsoft Defender for Identity sensor.
4
-
ms.date: 01/16/2024
4
+
ms.date: 06/04/2025
5
5
ms.topic: how-to
6
6
ms.reviewer: rlitinsky
7
7
---
@@ -240,6 +240,7 @@ To configure domain object auditing:
0 commit comments