Skip to content

Commit d74243f

Browse files
authored
Merge branch 'main' into remove-sap-attack-disrupt
2 parents f5c70f2 + e196331 commit d74243f

File tree

815 files changed

+11414
-11783
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

815 files changed

+11414
-11783
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ For more information about the exception criteria and exception process, see [Mi
3939
4040
Select the total score link to review all feedback on clarity, consistency, tone, brand, terms, spelling, grammar, readability, and inclusive language. _You should fix all spelling errors regardless of your total score_. Fixing spelling errors helps maintain customer trust in overall content quality.
4141
42-
| Article | Total score<br>(Required: 80) | Words + phrases<br>(Brand, terms) | Correctness<br>(Spelling, grammar) | Clarity<br>(Readability) |
42+
| Article | Total score<br>(Required: 80) | Terminology | Spelling and Grammar| Clarity<br>(Readability) |
4343
|---------|:--------------:|:--------------------:|:------:|:---------:|
4444
"
4545

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
name: PR has no warnings or errors
2+
3+
permissions:
4+
pull-requests: write
5+
statuses: write
6+
7+
on:
8+
issue_comment:
9+
types: [created]
10+
11+
jobs:
12+
13+
build-status:
14+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-BuildValidation.yml@workflows-prod
15+
with:
16+
PayloadJson: ${{ toJSON(github) }}
17+
secrets:
18+
AccessToken: ${{ secrets.GITHUB_TOKEN }}
19+
20+
21+

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -994,6 +994,16 @@
994994
"source_path": "CloudAppSecurityDocs/what-is-cloud-app-security.md",
995995
"redirect_url": "/defender-cloud-apps/what-is-defender-for-cloud-apps",
996996
"redirect_document_id": true
997+
},
998+
{
999+
"source_path": "CloudAppSecurityDocs/tutorial-ueba.md",
1000+
"redirect_url": "/defender-cloud-apps/",
1001+
"redirect_document_id": true
1002+
},
1003+
{
1004+
"source_path": "CloudAppSecurityDocs/file-filters.md",
1005+
"redirect_url": "/defender-cloud-apps/data-protection-policies",
1006+
"redirect_document_id": false
9971007
}
9981008
]
9991009
}

.openpublishing.redirection.defender-endpoint.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "defender-endpoint/configure-microsoft-threat-experts.md",
5+
"redirect_url": "/defender-xdr/defender-experts-for-hunting",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "defender-endpoint/microsoft-defender-antivirus-using-mde-security-set-mngmnt.md",
510
"redirect_url": "/defender-endpoint/evaluate-mdav-using-gp",
@@ -74,6 +79,11 @@
7479
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
7580
"redirect_url": "/defender-xdr/pilot-deploy-defender-endpoint",
7681
"redirect_document_id": false
77-
}
82+
},
83+
{
84+
"source_path": "defender-endpoint/monthly-security-summary-report.md",
85+
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
86+
"redirect_document_id": true
87+
}
7888
]
7989
}

.openpublishing.redirection.defender-xdr.json

Lines changed: 51 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "defender-xdr/microsoft-365-security-center-defender-cloud-apps.md",
5+
"redirect_url": "/defender-cloud-apps/microsoft-365-security-center-defender-cloud-apps",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "defender-xdr/microsoft-365-security-center-mdi.md",
10+
"redirect_url": "/defender-for-identity/microsoft-365-security-center-mdi",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path": "defender-xdr/eval-create-eval-environment.md",
515
"redirect_url": "/defender-xdr/pilot-deploy-overview",
@@ -120,6 +130,11 @@
120130
"redirect_url": "/defender-xdr/entity-page-device",
121131
"redirect_document_id": true
122132
},
133+
{
134+
"source_path": "defender-xdr/unlink-alert-from-incident.md",
135+
"redirect_url": "/defender-xdr/move-alert-to-another-incident",
136+
"redirect_document_id": true
137+
},
123138
{
124139
"source_path": "defender-xdr/unified-secops-platform/defender-xdr-portal.md",
125140
"redirect_url": "/defender-xdr/",
@@ -155,6 +170,31 @@
155170
"redirect_url": "/defender-xdr/",
156171
"redirect_document_id": false
157172
},
173+
{
174+
"source_path": "defender-xdr/microsoft-threat-actor-naming.md",
175+
"redirect_url": "/unified-secops-platform/microsoft-threat-actor-naming",
176+
"redirect_document_id": false
177+
},
178+
{
179+
"source_path": "defender-xdr/malware-naming.md",
180+
"redirect_url": "/unified-secops-platform/malware-naming",
181+
"redirect_document_id": false
182+
},
183+
{
184+
"source_path": "defender-xdr/criteria.md",
185+
"redirect_url": "/unified-secops-platform/criteria",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path": "defender-xdr/submission-guide.md",
190+
"redirect_url": "/unified-secops-platform/submission-guide",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path": "defender-xdr/virus-initiative-criteria.md",
195+
"redirect_url": "/unified-secops-platform/virus-initiative-criteria",
196+
"redirect_document_id": false
197+
},
158198
{
159199
"source_path": "defender-xdr/tickets.md",
160200
"redirect_url": "/defender-xdr/troubleshoot",
@@ -164,6 +204,16 @@
164204
"source_path": "defender-xdr/portal-submission-troubleshooting.md",
165205
"redirect_url": "/defender-xdr/troubleshoot",
166206
"redirect_document_id": false
207+
},
208+
{
209+
"source_path": "defender-xdr/portals.md",
210+
"redirect_url": "/unified-secops-platform/overview-plan#understand-microsoft-security-portals-and-admin-centers",
211+
"redirect_document_id": false
212+
},
213+
{
214+
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
215+
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
216+
"redirect_document_id": false
167217
}
168218
]
169-
}
219+
}

ATADocs/docfx.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,13 @@
4848
"uhfHeaderId": "MSDocsHeader-M365-IT",
4949
"searchScope": ["ATA"],
5050
"contributors_to_exclude": [
51-
"beccarobins"
51+
"beccarobins",
52+
"rjagiewich",
53+
"claydetels19",
54+
"garycentric",
55+
"padmagit77",
56+
"aditisrivastava07",
57+
"Ruchika-mittal01"
5258
]
5359
},
5460
"markdownEngineName": "markdig"

ATADocs/index.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ metadata:
88
description: Protect your enterprise using information from multiple network data-sources to learn the behavior of users and entities in your organization.
99
services: service
1010
ms.service: advanced-threat-analytics
11-
ms.subservice: ms.subservice
1211
ms.topic: landing-page
1312
ms.collection: M365-security-compliance
1413
author: batamig

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Microsoft Defender for Identity mapping for [potential lateral movement paths](/
1111

1212
> [!NOTE]
1313
> This feature can potentially be exploited by an adversary to obtain the Net-NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
14-
> The new Defender for Identity sensor is not affected by this issue as it uses different detection methods.
14+
> The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods.
1515
>
1616
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.
1717
> Please note that this will result in reduced data available for the [attack path feature in Exposure Management](/security-exposure-management/review-attack-paths).

ATPDocs/deploy/test-connectivity.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,9 @@ After preparing the server that you're going to use for your Microsoft Defender
1414

1515
For more information, see [Required ports](../prerequisites.md#ports).
1616

17+
> [!NOTE]
18+
> To get the name and other important details about your Defender for Identity workspace, see the [About page](../settings-about.md) in the [Microsoft Defender XDR](https://security.microsoft.com/) portal.
19+
1720
## Test connectivity using a browser
1821

1922
1. Open a browser. If you're using a proxy, make sure that your browser uses the same proxy settings being used by the sensor.

ATPDocs/health-alerts.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for Identity health issues
33
description: This article describes all the health issues that can occur for each component, listing the cause and the steps needed to resolve the problem
4-
ms.date: 07/09/2024
4+
ms.date: 01/16/2025
55
ms.topic: how-to
66
---
77

@@ -191,6 +191,12 @@ Sensor-specific health issues are displayed in the **Sensor health issues** tab
191191
|----|----|----|----|----|
192192
|Radius accounting (VPN integration) data ingestion failures.|The listed Defender for Identity sensors have radius accounting (VPN integration) data ingestion failures.|Validate that the shared secret in the Defender for Identity configuration settings matches your VPN server, according to the guidance described [Configure VPN in Defender for Identity](vpn-integration.md#configure-vpn-in-defender-for-identity) section, in the [Defender for Identity VPN integration](vpn-integration.md) page.|Low|Health issues page|
193193

194+
### Auditing for AD CS servers is not enabled as required
195+
196+
|Alert|Description|Resolution|Severity|Displayed in|
197+
|----|----|----|----|----|
198+
|Auditing for AD CS servers is not enabled as required. (This configuration is validated once a day, per sensor).|The Advanced Auditing Policy Configuration or AD CS auditing is not enabled as required.|Enable the Advanced Auditing Policy Configuration and AD CS auditing according to the guidance as described in the [Configure auditing on AD CS](configure-windows-event-collection.md#configure-auditing-on-ad-cs) section, in the [Configure Windows Event collection](configure-windows-event-collection.md) page.|Medium|Sensors health issues tab|
199+
194200
### Sensor failed to retrieve Microsoft Entra Connect service configuration
195201

196202
| Alert| Description |Resolution|Severity|Displayed in|

0 commit comments

Comments
 (0)