You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/deploy-defender-identity.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ Identify your architecture and your requirements, and then use the table below t
31
31
> [!NOTE]
32
32
> The Defender for Identity sensor version 3.x is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
33
33
> The Defender for Identity sensor v3.x:
34
-
> - Requires that Defender for Endpoint is deployed on your endpoints
34
+
> - Requires that Defender for Endpoint is deployed
35
35
> - Doesn't currently support VPN integration
36
36
> - Doesn't currently support ExpressRoute
37
37
> - Doesn't currently offer full functionality of health alerts, posture recommendations, security alerts or advanced hunting data.
Copy file name to clipboardExpand all lines: ATPDocs/deploy/prerequisites-sensor-version-3.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ This article describes the requirements for installing the Microsoft Defender fo
14
14
15
15
Before activating the Defender for Identity sensor v3.x, note that this version of the sensor is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
16
16
The Defender for Identity sensor v3.x:
17
-
- Requires that Defender for Endpoint is deployed on your endpoints
17
+
- Requires that Defender for Endpoint is deployed
18
18
- Doesn't currently support VPN integration
19
19
- Doesn't currently support ExpressRoute
20
20
- Doesn't currently offer full functionality of health alerts, posture recommendations, security alerts or advanced hunting data.
Copy file name to clipboardExpand all lines: ATPDocs/notifications.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,17 @@
1
1
---
2
2
title: Microsoft Defender for Identity notifications
3
3
description: Learn how to use and configure Microsoft Defender for Identity notifications in Microsoft Defender XDR.
4
-
ms.date: 09/03/2023
4
+
ms.date: 07/10/2025
5
5
ms.topic: how-to
6
6
#CustomerIntent: As a Defender for Identity user, I want to learn how to work with Defender for Identity notifications to make sure I'm up to date about events detected by Defender for Identity.
7
7
ms.reviewer: LiorShapiraa
8
8
---
9
9
10
10
# Defender for Identity notifications in Microsoft Defender XDR
11
11
12
+
>[!NOTE]
13
+
>This feature is currently supported only by the Defender for Identity sensor version 2.x.
14
+
12
15
Microsoft Defender for Identity provides notifications for health issues and security alerts, either via email notifications or to a Syslog server.
13
16
14
17
This article describes how to configure Defender for Identity notifications so that you're aware of any health issues or security alerts detected.
Copy file name to clipboardExpand all lines: ATPDocs/sensor-settings.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Manage and update sensors
3
3
description: Learn how to manage and update your Microsoft Defender for Identity sensors.
4
-
ms.date: 01/29/2023
4
+
ms.date: 07/10/2025
5
5
ms.topic: how-to
6
6
ms.reviewer: rlitinsky
7
7
---
@@ -104,6 +104,9 @@ The sensors page provides the following information about each sensor:
104
104
105
105
* Disabled
106
106
107
+
>[!NOTE]
108
+
>This feature is supported only by the Defender for Identity sensor version 2.x.
109
+
107
110
***Health status**: Displays the overall health status of the sensor with a colored icon representing the highest severity open health alert. Possible values are:
108
111
109
112
***Healthy (green icon)**: No opened health issues
@@ -143,6 +146,8 @@ Defender for Identity sensors support two kinds of updates:
143
146
> * Defender for Identity sensors always reserve at least 15% of the available memory and CPU available on the domain controller where it is installed. If the Defender for Identity service consumes too much memory, the service is automatically stopped and restarted by the Defender for Identity sensor updater service.
144
147
145
148
### Delayed sensor update
149
+
>[!NOTE]
150
+
>This feature is supported only by the Defender for Identity sensor version 2.x.
146
151
147
152
Given the rapid speed of ongoing Defender for Identity development and release updates, you may decide to define a subset group of your sensors as a delayed update ring, allowing for a gradual sensor update process. Defender for Identity enables you to choose how your sensors are updated and set each sensor as a **Delayed update** candidate.
Copy file name to clipboardExpand all lines: ATPDocs/uninstall-sensor.md
+12-9Lines changed: 12 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Uninstall the sensor
3
3
description: This article describes how to uninstall the Microsoft Defender for Identity sensor from domain controllers.
4
-
ms.date: 07/02/2025
4
+
ms.date: 07/07/2025
5
5
ms.topic: how-to
6
6
ms.reviewer: rlitinsky
7
7
---
@@ -22,21 +22,24 @@ Deactivating Defender for Identity capabilities from your domain controller does
22
22
23
23
## Delete a sensor
24
24
25
+
### For sensor v3.x
25
26
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Identities** > **Sensors**.
26
-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
27
+
2. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
27
28
28
-

29
+
:::image type="content" source="media/screenshot-that-shows-how-to-delete-a-sensor.png" alt-text="Screenshot that shows how to delete a sensor." lightbox="media/screenshot-that-shows-how-to-delete-a-sensor.png":::
29
30
30
-
## Uninstall a sensor v2.x from a domain controller
31
+
>[!NOTE]
32
+
>This action removes the v3.x sensor and stops monitoring on that domain controller.
31
33
32
-
The following steps describe how to uninstall a sensor v2.x from a domain controller.
33
-
34
-
1. Sign in to the domain controller with administrative privileges.
35
-
1. From the Windows **Start** menu, select **Settings** > **Control Panel** > **Add/ Remove Programs**.
36
-
1. Select the sensor installation, select **Uninstall**, and follow the instructions to remove the sensor.
34
+
## Delete and uninstall a sensor v2.x from a domain controller
37
35
38
36
> [!IMPORTANT]
39
37
> We recommend removing the sensor from the domain controller before demoting the domain controller.
38
+
>
39
+
1. Sign in to the domain controller with administrative privileges.
40
+
2. From the Windows **Start** menu, select **Settings** > **Control Panel** > **Add/ Remove Programs**.
41
+
3. Select the sensor installation, select **Uninstall**, and follow the instructions to remove the sensor.
42
+
4. After uninstallation is complete, go to the Microsoft Defender portal > Settings > Identities > Sensors, select the domain controller, and choose Delete.
Copy file name to clipboardExpand all lines: ATPDocs/vpn-integration.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,17 @@
1
1
---
2
2
title: VPN integration | Microsoft Defender for Identity
3
3
description: Learn how to collect accounting information by integrating a VPN for Microsoft Defender for Identity in Microsoft Defender XDR.
4
-
ms.date: 08/31/2023
4
+
ms.date: 07/10/2025
5
5
ms.topic: how-to
6
6
#CustomerIntent: As a Defender for Identity user, I want to learn how to collect accounting information from VPN solutions.
7
7
ms.reviewer: martin77s
8
8
---
9
9
10
10
# Defender for Identity VPN integration in Microsoft Defender XDR
11
11
12
+
>[!NOTE]
13
+
>This feature is currently supported only by the Defender for Identity sensor version 2.x.
14
+
12
15
Microsoft Defender for Identity can integrate with your VPN solution by listening to RADIUS accounting events forwarded to Defender for Identity sensors, such as the IP addresses and locations where connections originated. VPN accounting data can help your investigations by providing more information about user activity, such as the locations from where computers are connecting to the network, and an extra detection for abnormal VPN connections.
13
16
14
17
Defender for Identity's VPN integration is based on standard RADIUS Accounting ([RFC 2866](https://tools.ietf.org/html/rfc2866)), and supports the following VPN vendors:
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/anomaly-detection-policy.md
-7Lines changed: 0 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,13 +25,6 @@ Anomalies are detected by scanning user activity. The risk is evaluated by looki
25
25
26
26
Based on the policy results, security alerts are triggered. Defender for Cloud Apps looks at every user session on your cloud and alerts you when something happens that is different from the baseline of your organization or from the user's regular activity.
27
27
28
-
In addition to native Defender for Cloud Apps alerts, you'll also get the following detection alerts based on information received from Microsoft Entra ID Protection:
29
-
30
-
* Leaked credentials: Triggered when a user's valid credentials have been leaked. For more information, see [Microsoft Entra ID's Leaked credentials detection](/azure/active-directory/identity-protection/concept-identity-protection-risks#user-risk).
31
-
* Risky sign-in: Combines a number of Microsoft Entra ID Protection sign-in detections into a single detection. For more information, see [Microsoft Entra ID's Sign-in risk detections](/azure/active-directory/identity-protection/concept-identity-protection-risks#sign-in-risk).
32
-
33
-
These policies appear on the Defender for Cloud Apps policies page and can be enabled or disabled.
34
-
35
28
> [!IMPORTANT]
36
29
> Starting June 2025, Microsoft Defender for Cloud Apps began transitioning anomaly detection policies to a dynamic threat detection model. This model automatically adapts detection logic to the evolving threat landscape, keeping detections current without manual configuration or policy updates. As part of these improvements to overall security, and to provide more accurate and timely alerts, several legacy policies have been disabled:
Copy file name to clipboardExpand all lines: defender-endpoint/minimum-requirements.md
+31-43Lines changed: 31 additions & 43 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,13 +52,7 @@ For detailed licensing information, see the [Product Terms site](https://www.mic
52
52
53
53
## Browser requirements
54
54
55
-
Access to Defender for Endpoint is done through a browser. The following browsers are supported:
56
-
57
-
- Microsoft Edge
58
-
- Google Chrome
59
-
60
-
> [!NOTE]
61
-
> Although other browsers might work, the mentioned browsers are the ones supported.
55
+
Access Microsoft Defender for Endpoint and other [Microsoft Defender XDR](/defender-xdr/) experiences in the Microsoft Defender portal using Microsoft Edge, Internet Explorer 11, or any HTML 5 compliant web browser.
62
56
63
57
## Hardware and software requirements
64
58
@@ -69,36 +63,29 @@ Devices on your network must be running one of the operating systems listed in t
69
63
> [!IMPORTANT]
70
64
> You may continue to use Microsoft Windows after OS support ends; however, it will no longer receive quality updates, new or updated features, or security updates for the operating system itself. However, devices protected by Microsoft Defender for Endpoint will continue to receive regular product updates through existing channels, keeping detection and protection capabilities current.
71
65
72
-
- Windows 11 Enterprise
73
-
- Windows 11 IoT Enterprise
74
-
- Windows 11 Education
75
-
- Windows 11 Pro
76
-
- Windows 11 Pro Education
77
-
-[Windows 10 and 11 on Arm](/windows/arm/overview)
- Windows 365 running one of the previously listed operating systems/versions
95
-
96
-
The following operating systems work with Defender for Endpoint, provided you're using the [Log Analytics](/azure/azure-monitor/agents/log-analytics-agent) / [Microsoft Monitoring Agent](update-agent-mma-windows.md) (MMA):
97
-
98
-
- Windows 8.1 Enterprise
99
-
- Windows 8.1 Pro
100
-
- Windows 7 SP1 Enterprise
101
-
- Windows 7 SP1 Pro
75
+
- Windows Server Semi-Annual Channel, version 1803 and above
76
+
77
+
- Windows Server 2019 and later (including Core installation type)
78
+
79
+
-[Windows 365](/windows-365/) Cloud PCs and supported [Azure (Windows) Virtual Desktop](/azure/virtual-desktop/) machines running one of the previously listed operating systems/versions
80
+
81
+
-[Azure Local](/azure/azure-local) Nodes running Azure Stack HCI OS, version 23H2 and above
82
+
83
+
The following Windows operating systems work with Defender for Endpoint, provided you're using the [Log Analytics](/azure/azure-monitor/agents/log-analytics-agent) / [Microsoft Monitoring Agent](update-agent-mma-windows.md) (MMA):
84
+
85
+
- Windows 7 SP1 Pro, Enterprise
86
+
87
+
- Windows 8.1 Pro, Enterprise
88
+
102
89
- Windows Server 2008 R2 SP1
103
90
104
91
> [!NOTE]
@@ -115,16 +102,16 @@ To add anti-malware protection to these older operating systems, you can use [Sy
115
102
-[iOS](microsoft-defender-endpoint-ios.md)
116
103
117
104
> [!NOTE]
118
-
> - Make sure to confirm that the Linux distributions and versions of Android, iOS, and macOS are compatible with Defender for Endpoint.
119
-
> - Although Windows 10 IoT Enterprise is a supported OS in Microsoft Defender for Endpoint and enables OEMs/ODMs to distribute it as part of their product or solution, customers should follow the OEM/ODM's guidance around host-based installed software and supportability.
120
-
> - Endpoints running mobile versions of Windows (such as Windows CE and Windows 10 Mobile) aren't supported.
121
-
> - Virtual Machines running Windows 10 Enterprise 2016 LTSB can encounter performance issues when used on non-Microsoft virtualization platforms.
122
-
> - For virtual environments, we recommend using Windows 10 Enterprise LTSC 2019 or later.
123
-
> -[Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md) don't include server licenses. To onboard servers to those plans, you need another license, such as Microsoft Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering). To learn more. see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
124
-
> - If your organization is a small or medium-sized business, see [Microsoft Defender for Business requirements](/defender-business/mdb-requirements).
125
-
> - Windows 11 24H2 Home devices that are upgraded to a supported edition might require you to run the following command before onboarding: `DISM /online /Add-Capability /CapabilityName:Microsoft.Windows.Sense.Client~~~~`
105
+
- Make sure to confirm that the Linux distributions and versions of Android, iOS, and macOS are compatible with Defender for Endpoint.
106
+
- Although Windows 10 IoT Enterprise is a supported OS in Microsoft Defender for Endpoint and enables OEMs/ODMs to distribute it as part of their product or solution, customers should follow the OEM/ODM's guidance around host-based installed software and supportability.
107
+
- Endpoints running mobile versions of Windows (such as Windows CE and Windows 10 Mobile) aren't supported.
108
+
- Virtual Machines running Windows 10 Enterprise 2016 LTSB can encounter performance issues when used on non-Microsoft virtualization platforms.
109
+
- For virtual environments, we recommend using Windows 10 Enterprise LTSC 2019 or later.
110
+
-[Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md) don't include server licenses. To onboard servers to those plans, you need another license, such as Microsoft Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering). To learn more. see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
111
+
- If your organization is a small or medium-sized business, see [Microsoft Defender for Business requirements](/defender-business/mdb-requirements).
112
+
> - Windows 11 24H2 Home devices that have been upgraded to a supported edition might require you to run the following command before onboarding: `DISM /online /Add-Capability /CapabilityName:Microsoft.Windows.Sense.Client~~~~`
126
113
> For more information about edition upgrades and features, see ([Windows features](/windows-hardware/manufacture/desktop/windows-features?view=windows-11&preserve-view=true))
127
-
114
+
>
128
115
### Hardware requirements
129
116
130
117
The minimum hardware requirements for Defender for Endpoint on Windows devices are the same as the requirements for the operating system itself (that is, they aren't in addition to the requirements for the operating system).
@@ -177,6 +164,7 @@ If you're running a non-Microsoft anti-malware client and use Mobile Device Mana
177
164
## Related articles
178
165
179
166
-[Set up Microsoft Defender for Endpoint deployment](production-deployment.md)
167
+
180
168
-[Onboard devices](onboard-configure.md)
181
169
182
170
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments