Skip to content

Commit d41cf4a

Browse files
authored
Merge branch 'public' into patch-8
2 parents 1159f6c + 77973b4 commit d41cf4a

File tree

741 files changed

+7271
-4387
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

741 files changed

+7271
-4387
lines changed

.acrolinx-config.edn

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,10 @@ Select the total score link to review all feedback on clarity, consistency, tone
5151
"
5252
**More information about Acrolinx**
5353
54-
- [Install Acrolinx locally for VSCode for Magic](https://review.docs.microsoft.com/office-authoring-guide/acrolinx-vscode?branch=main)
54+
- [Install Acrolinx locally for VSCode for Magic](https://review.learn.microsoft.com/office-authoring-guide/acrolinx-vscode?branch=main)
5555
- [False positives or issues](https://aka.ms/acrolinxbug)
5656
- [Request a new Acrolinx term](https://microsoft.sharepoint.com/teams/M365Dev2/SitePages/M365-terminology.aspx)
57-
- [Troubleshooting issues with Acrolinx](https://review.docs.microsoft.com/help/contribute/acrolinx-error-messages)
57+
- [Troubleshooting issues with Acrolinx](https://review.learn.microsoft.com/help/platform/acrolinx-troubleshoot?branch)
5858
5959
"
6060
}

.github/workflows/AutoPublish.yml

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
name: (Scheduled) Publish to live
2+
3+
permissions:
4+
contents: write
5+
pull-requests: write
6+
checks: read
7+
8+
on:
9+
schedule:
10+
- cron: "25 2,5,8,11,14,17,20,22 * * *" # Times are UTC based on Daylight Saving Time. Need to be adjusted for Standard Time. Scheduling at :25 to account for queuing lag.
11+
12+
workflow_dispatch:
13+
14+
jobs:
15+
16+
auto-publish:
17+
if: github.repository_owner == 'MicrosoftDocs' && contains(github.event.repository.topics, 'build')
18+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-AutoPublishV2.yml@workflows-prod
19+
with:
20+
PayloadJson: ${{ toJSON(github) }}
21+
EnableAutoPublish: true
22+
EnableAutoMerge: true
23+
24+
secrets:
25+
AccessToken: ${{ secrets.GITHUB_TOKEN }}
26+
PrivateKey: ${{ secrets.M365_APP_PRIVATE_KEY }}
27+
ClientId: ${{ secrets.M365_APP_CLIENT_ID }}

.github/workflows/StaleBranch.yml

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,18 @@ name: (Scheduled) Stale branch removal
22

33
permissions:
44
contents: write
5-
5+
pull-requests: read
6+
7+
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
8+
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.
9+
# The workflow should not be configured to run after "deletion day" so that users can review the branches were deleted.
10+
# Recommendation: configure cron to run on days 1,15-31 where 1 is what's configured in 'DeleteOnDayOfMonth'. If 'DeleteOnDayOfMonth' is set to something else, update cron to run the two weeks leading up to it.
11+
612
on:
713
schedule:
8-
- cron: "0 9 1 * *"
14+
- cron: "0 9 1,15-31 * *"
915

10-
# workflow_dispatch:
16+
workflow_dispatch:
1117

1218

1319
jobs:

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1009,6 +1009,11 @@
10091009
"source_path": "CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md",
10101010
"redirect_url": "/defender-cloud-apps/troubleshooting-api-connectors-errors",
10111011
"redirect_document_id": true
1012-
}
1012+
},
1013+
{
1014+
"source_path": "CloudAppSecurityDocs/connector-platform.md",
1015+
"redirect_url": "/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps",
1016+
"redirect_document_id": true
1017+
},
10131018
]
10141019
}

.openpublishing.redirection.defender-endpoint.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,26 @@
134134
"source_path": "defender-endpoint/configure-server-endpoints.md",
135135
"redirect_url": "/defender-endpoint/onboard-windows-server-2012r2-2016",
136136
"redirect_document_id": true
137+
},
138+
{
139+
"source_path": "defender-endpoint/onboard-windows-client.md",
140+
"redirect_url": "/defender-endpoint/onboard-client",
141+
"redirect_document_id": true
142+
},
143+
{
144+
"source_path": "defender-endpoint/onboard-windows-server.md",
145+
"redirect_url": "/defender-endpoint/onboard-server",
146+
"redirect_document_id": true
147+
},
148+
{
149+
"source_path": "defender-endpoint/onboard-windows-server-2012r2-2016.md",
150+
"redirect_url": "/defender-endpoint/onboard-server",
151+
"redirect_document_id": false
152+
},
153+
{
154+
"source_path": "defender-endpoint/mde-linux-arm.md",
155+
"redirect_url": "/defender-endpoint/microsoft-defender-endpoint-linux",
156+
"redirect_document_id": false
137157
}
138158
]
139159
}

ATPDocs/accounts-with-non-default-pgid.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ ms.author: liorshapira
1010
ms.service: microsoft-defender-for-identity
1111
ms.topic: article
1212
ms.date: 10/05/2024
13+
ms.reviewer: LiorShapiraa
1314
---
1415

1516
# Security Assessment: Accounts with non-default Primary Group ID

ATPDocs/advanced-settings.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ description: Learn how to configure the number of Microsoft Defender for Identit
44
ms.date: 02/11/2024
55
ms.topic: how-to
66
#CustomerIntent: As a Microsoft Defender for Identity customer, I want to reduce the number of false positives by adjusting thresholds for specific alerts.
7+
ms.reviewer: rlitinsky
78
---
89

910
# Adjust alert thresholds

ATPDocs/alerts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Security alerts
33
description: This article provides a list of the security alerts issued by Microsoft Defender for Identity.
44
ms.date: 03/23/2023
55
ms.topic: conceptual
6+
ms.reviewer: morRubin
67
---
78

89
# Security alerts in Microsoft Defender for Identity
@@ -97,7 +98,6 @@ The following table lists the mapping between alert names, their corresponding u
9798
| [Suspicious modifications to the AD CS security permissions/settings](persistence-privilege-escalation-alerts.md#suspicious-modifications-to-the-ad-cs-security-permissionssettings--external-id-2435) | 2435 | Medium | Privilege escalation |
9899
| [Account Enumeration reconnaissance (LDAP)](reconnaissance-discovery-alerts.md#account-enumeration-reconnaissance-ldap-external-id-2437-preview) (Preview) | 2437 | Medium | Account Discovery, Domain Account |
99100
| [Directory Services Restore Mode Password Change](other-alerts.md#directory-services-restore-mode-password-change-external-id-2438) | 2438 | Medium | Persistence, Account Manipulation |
100-
| [Honeytoken was queried via SAM-R](reconnaissance-discovery-alerts.md#honeytoken-was-queried-via-sam-r-external-id-2439) | 2439 | Low | Discovery |
101101
|[Group Policy Tampering ](/defender-for-identity/other-alerts)|2440|Medium|Defense evasion|
102102

103103
> [!NOTE]

ATPDocs/architecture.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ description: Learn about the Microsoft Defender for Identity system architecture
44
ms.date: 09/14/2023
55
ms.topic: overview
66
#CustomerIntent: As a Defender for Identity user, I want to understand the relevant components and how they interact with the rest of my environment so that I can best use Defender for Identity features.
7+
ms.reviewer: morRubin
78
---
89

910
# Microsoft Defender for Identity architecture

ATPDocs/built-in-active-directory-guest-account-is-enabled.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ ms.author: liorshapira
1010
ms.service: microsoft-defender-for-identity
1111
ms.topic: article
1212
ms.date: 10/05/2024
13+
ms.reviewer: LiorShapiraa
1314
---
1415

1516
# Security Assessment: Built-in Active Directory Guest account is enabled
@@ -27,11 +28,11 @@ The on-premises Guest account is a built-in, non-nominative account that allows
2728

2829
1. Take appropriate action on those accounts by **disabling** the account.
2930

30-
For example:
31+
For example:
3132

32-
![Screenshot showing guest account in AD.](media/built-in-active-directory-guest-account-is-enabled/guest-account.png)
33+
![Screenshot showing guest account in AD.](media/built-in-active-directory-guest-account-is-enabled/guest-account.png)
3334

34-
![Screenshot showing security report.](media/built-in-active-directory-guest-account-is-enabled/security-report.png)
35+
![Screenshot showing security report.](media/built-in-active-directory-guest-account-is-enabled/security-report.png)
3536

3637
## Next steps
3738

0 commit comments

Comments
 (0)