Skip to content

Commit d79146d

Browse files
committed
Merge branch 'protect-ot-article-in-xdr' of https://github.com/limwainstein/defender-docs-pr into protect-ot-article-in-xdr
2 parents 6f5ce0d + 3970dd3 commit d79146d

File tree

458 files changed

+4561
-3694
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

458 files changed

+4561
-3694
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "defender-endpoint/configure-microsoft-threat-experts.md",
5+
"redirect_url": "/defender-xdr/defender-experts-for-hunting",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "defender-endpoint/microsoft-defender-antivirus-using-mde-security-set-mngmnt.md",
510
"redirect_url": "/defender-endpoint/evaluate-mdav-using-gp",

.openpublishing.redirection.defender-xdr.json

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,16 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "defender-xdr/microsoft-365-security-center-defender-cloud-apps.md",
5+
"redirect_url": "/defender-cloud-apps/microsoft-365-security-center-defender-cloud-apps",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "defender-xdr/microsoft-365-security-center-mdi.md",
10+
"redirect_url": "/defender-for-identity/microsoft-365-security-center-mdi",
11+
"redirect_document_id": false
12+
},
13+
314
{
415
"source_path": "defender-xdr/eval-create-eval-environment.md",
516
"redirect_url": "/defender-xdr/pilot-deploy-overview",

ATPDocs/deploy/test-connectivity.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,9 @@ After preparing the server that you're going to use for your Microsoft Defender
1414

1515
For more information, see [Required ports](../prerequisites.md#ports).
1616

17+
> [!NOTE]
18+
> To get the name and other important details about your Defender for Identity workspace, see the [About page](../settings-about.md) in the [Microsoft Defender XDR](https://security.microsoft.com/) portal.
19+
1720
## Test connectivity using a browser
1821

1922
1. Open a browser. If you're using a proxy, make sure that your browser uses the same proxy settings being used by the sensor.

ATPDocs/health-alerts.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for Identity health issues
33
description: This article describes all the health issues that can occur for each component, listing the cause and the steps needed to resolve the problem
4-
ms.date: 07/09/2024
4+
ms.date: 01/16/2025
55
ms.topic: how-to
66
---
77

@@ -191,6 +191,12 @@ Sensor-specific health issues are displayed in the **Sensor health issues** tab
191191
|----|----|----|----|----|
192192
|Radius accounting (VPN integration) data ingestion failures.|The listed Defender for Identity sensors have radius accounting (VPN integration) data ingestion failures.|Validate that the shared secret in the Defender for Identity configuration settings matches your VPN server, according to the guidance described [Configure VPN in Defender for Identity](vpn-integration.md#configure-vpn-in-defender-for-identity) section, in the [Defender for Identity VPN integration](vpn-integration.md) page.|Low|Health issues page|
193193

194+
### Auditing for AD CS servers is not enabled as required
195+
196+
|Alert|Description|Resolution|Severity|Displayed in|
197+
|----|----|----|----|----|
198+
|Auditing for AD CS servers is not enabled as required. (This configuration is validated once a day, per sensor).|The Advanced Auditing Policy Configuration or AD CS auditing is not enabled as required.|Enable the Advanced Auditing Policy Configuration and AD CS auditing according to the guidance as described in the [Configure auditing on AD CS](configure-windows-event-collection.md#configure-auditing-on-ad-cs) section, in the [Configure Windows Event collection](configure-windows-event-collection.md) page.|Medium|Sensors health issues tab|
199+
194200
### Sensor failed to retrieve Microsoft Entra Connect service configuration
195201

196202
| Alert| Description |Resolution|Severity|Displayed in|

defender-xdr/microsoft-365-security-center-mdi.md renamed to ATPDocs/microsoft-365-security-center-mdi.md

Lines changed: 24 additions & 26 deletions
Large diffs are not rendered by default.

ATPDocs/toc.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,16 +11,18 @@ items:
1111
href: zero-trust.md
1212
- name: System architecture
1313
href: architecture.md
14-
- name: Defender for Identity in Microsoft Defender XDR
15-
href: /microsoft-365/security/defender/microsoft-365-security-center-mdi?bc=/defender-for-identity/bread/toc.json&toc=/defender-for-identity/TOC.json
14+
- name: Defender for Identity in the Microsoft Defender portal
15+
href: microsoft-365-security-center-mdi.md
1616
- name: Defender for Identity for US Government
1717
href: us-govt-gcc-high.md
1818
- name: Deploy
1919
expanded: true
2020
items:
2121
- name: Quick installation guide
2222
href: deploy/quick-installation-guide.md
23-
- name: Deployment overview
23+
- name: Pilot and deploy Microsoft Defender XDR
24+
href: /defender-xdr/pilot-deploy-overview?toc=/defender-for-identity/toc.json&bc=/defender-for-identity/breadcrumb/toc.json
25+
- name: Defender for Identity deployment overview
2426
href: deploy/deploy-defender-identity.md
2527
- name: Plan and prepare
2628
items:

CloudAppSecurityDocs/activity-filters-queries.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,11 @@ Below is a list of the activity filters that can be applied. Most filters suppor
2020
- Activity objects – Search for the objects the activity was done on. This filter applies to files, folders, users, or app objects.
2121
- Activity object ID - the ID of the object (file, folder, user, or app ID).
2222

23-
- Item - Enables you to search by the name or ID of any activity object (for example, user names, files, parameters, sites). For the **Activity object Item** filter, you can select whether to filter for items that **Contain**, **Equal**, or **Starts with** the specific item.
23+
- Item - Enables you to search by the name or ID of any activity object (for example, user names, files, parameters, sites). For the **Activity object Item** filter, you can select whether to filter for items that **Contains**, **Equals**, or **Starts with** the specific item.
2424

25+
> [!NOTE]
26+
> Activity-Policy's **Activity object Item** filter supports the **Equals** operator only.
27+
2528
- Action type - Search for a more specific action performed in an app.
2629

2730
- Activity type - Search for the app activity.

CloudAppSecurityDocs/app-governance-app-policies-create.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Use app governance to create OAuth policies for apps connected to Microsoft 365,
1717

1818
<br>
1919

20-
>[!VIDEO https://www.microsoft.com/videoplayer/embed/RE4YU37]
20+
>[!VIDEO https://learn-video.azurefd.net/vod/player?id=b10dbf02-9f56-4f37-8c68-8221be5b4aea]
2121
2222
<a name='create-oauth-app-policies-for-azure-ad'></a>
2323

CloudAppSecurityDocs/app-governance-manage-app-governance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Cyber attacks have become increasingly sophisticated in the ways they exploit th
1111

1212
To understand the potential risks and stop these types of attacks, you need to gain clear visibility into your organization’s app compliance posture. You need to be able to quickly identify when an app exhibits anomalous behaviors and respond when these behaviors present risks to your environment, data, and users. <br><br>
1313

14-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4S7sp]
14+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=ed7ad7f7-58dc-4a09-ace3-e1d6b8f55353]
1515
1616
## App governance features
1717

CloudAppSecurityDocs/app-governance-predefined-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ description: Get started learning about predefined app policies.
1010
App governance contains a set of out of the box policies to detect anomalous app behaviors. These policies are activated by default, but you can deactivate them if you choose to.<br>
1111
<br>
1212

13-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4YpJN]
13+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=22872b35-18aa-424d-bec7-3f77869a5e47]
1414
1515
## Working with predefined policies
1616

0 commit comments

Comments
 (0)