Skip to content

Commit d7043d3

Browse files
authored
Merge branch 'main' into patch-7
2 parents 2ab89a4 + b073684 commit d7043d3

File tree

2 files changed

+13
-7
lines changed

2 files changed

+13
-7
lines changed

ATPDocs/deploy/deploy-defender-identity.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,17 @@ Use the following steps to prepare for deploying Defender for Identity:
5353
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if the servers in your environment have the necessary prerequisites.
5454
> You can use the [DefenderForIdentity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/) to add the required auditing and configure the necessary settings.
5555
56-
## Deploy Defender for Identity
56+
> [!IMPORTANT]
57+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
58+
59+
## Deploy Defender for Identity classic sensor
5760

5861
After you've prepared your system, use the following steps to deploy Defender for Identity:
5962

6063
1. [Verify connectivity to the Defender for Identity service](configure-proxy.md).
61-
1. [Download the Defender for Identity sensor](download-sensor.md).
62-
1. [Install the Defender for Identity sensor](install-sensor.md).
63-
1. [Configure the Defender for Identity sensor](configure-sensor-settings.md) to start receiving data.
64+
1. [Download the Defender for Identity classic sensor](download-sensor.md).
65+
1. [Install the Defender for Identity classic sensor](install-sensor.md).
66+
1. [Configure the Defender for Identity classic sensor](configure-sensor-settings.md) to start receiving data.
6467

6568
## Post-deployment configuration
6669

ATPDocs/deploy/install-sensor.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,10 @@ ms.topic: how-to
77

88
# Install a Microsoft Defender for Identity sensor
99

10-
This article describes how to install a Microsoft Defender for Identity sensor, including a standalone sensor. The default recommendation is to use the UI. However:
10+
> [!IMPORTANT]
11+
> The new sensor is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor. [Learn more about the new sensor](/defender-for-identity/deploy/activate-capabilities)
12+
13+
This article describes how to install a Microsoft Defender for Identity classic sensor, including a standalone sensor. The default recommendation is to use the UI. However:
1114

1215
- When you're installing the sensor on Windows Server Core, or to deploy the sensor via a software deployment system, follow the steps for [silent installation](#perform-a-defender-for-identity-silent-installation) instead.
1316

@@ -29,9 +32,9 @@ Before you start, make sure that you have:
2932

3033
- Trusted root certificates on your machine. If your trusted root CA-signed certificates are missing, [you might receive a connection error](../troubleshooting-known-issues.md#proxy-authentication-problem-presents-as-a-connection-error).
3134

32-
## Install the sensor by using the UI
35+
## Install the classic sensor by using the UI
3336

34-
Perform the following steps on the domain controller, Active Directory Federation Services (AD FS) server, or Active Directory Certificate Services (AD CS) server.
37+
Perform the following steps on the domain controller, Active Directory Federation Services (AD FS) server, Active Directory Certificate Services (AD CS) server or Entra Connect server.
3538

3639
1. Verify that the machine has connectivity to the relevant [Defender for Identity cloud service endpoints](configure-proxy.md#enable-access-to-defender-for-identity-service-urls-in-the-proxy-server).
3740

0 commit comments

Comments
 (0)