Skip to content

Commit de4ea5b

Browse files
authored
Merge branch 'main' into release-preview-sentinel-graph
2 parents e8bd218 + 20c3ef4 commit de4ea5b

File tree

4 files changed

+23
-20
lines changed

4 files changed

+23
-20
lines changed

defender-endpoint/linux-custom-location-installation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ search.appverid: met150
1818
ms.date: 08/18/2025
1919
---
2020

21-
# Enabling deployment of Microsoft Defender for Endpoint to a custom location (preview)
21+
# Enabling deployment of Microsoft Defender for Endpoint to a custom location
2222

2323
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2424

defender-for-identity/remove-inactive-service-account.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
2-
title: 'Security Assessment: Remove Inactive Service Account (Preview)'
2+
title: 'Security Assessment: Remove Inactive Service Account'
33
description: Learn how to identify and address inactive Active Directory service accounts to mitigate security risks and improve your organization's security posture.
44
ms.date: 08/17/2025
55
ms.topic: how-to
66
#customer intent: As a security administrator, I want to improve security posture in my organization by removing inactive service accounts
77
---
88

9-
# Security Assessment: Remove Stale Service Accounts (Preview)
9+
# Security Assessment: Remove Inactive Service Accounts
1010

11-
This recommendation lists Active Directory service accounts detected as stale within the past 90 days.
11+
This recommendation lists Active Directory service accounts detected as inactive within the past 90 days.
1212

13-
## Why do stale service accounts pose a risk?
13+
## Why do inactive service accounts pose a risk?
1414

15-
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Stale service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
15+
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Inactive service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
1616

1717
This exposure creates several risks:
1818

@@ -25,9 +25,9 @@ This exposure creates several risks:
2525

2626
To use this security assessment effectively, follow these steps:
2727

28-
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions) for Remove stale service account.
28+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions) for Remove inactive service account.
2929

30-
1. Review the list of exposed entities to discover which of your service accounts are stale and have not performed any login activity in the last 90 days.
30+
1. Review the list of exposed entities to discover which of your service accounts are inactive and haven't performed any login activity in the last 90 days.
3131

3232
1. Take appropriate actions on those entities by removing the service account. For example:
3333

defender-for-identity/whats-new.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## September 2025
2727

28+
### Unlock additional security value in the unified agent (Preview)
29+
Get enhance protection by applying the ‘Unified sensor RPC audit’ tag to your V3.x sensors through the Asset rule management feature. Learn more [here](/defender-for-identity/deploy/prerequisites-sensor-version-3).
30+
2831
### Identity posture recommendations view on the identity page (preview)
2932

3033
We've added a new tab on the Identity profile page that contains all active identity-related identity security posture assessments (ISPMs). This feature consolidates all identity-specific security posture assessments into a single contextual view, helping security teams quickly spot weaknesses and take targeted actions.
@@ -95,11 +98,11 @@ Previously, Defender for Identity tenants received Microsoft Entra ID risk level
9598

9699
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Microsoft Entra ID risk level to the IdentityInfo table remains unchanged.
97100

98-
### New security assessment: Remove stale service accounts (Preview)
101+
### New security assessment: Remove inactive service accounts
99102

100-
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been stale for the past 90 days, to help you mitigate security risks associated with unused accounts.
103+
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been inactive for the past 90 days, to help you mitigate security risks associated with unused accounts.
101104

102-
For more information, see: Security Assessment: [Remove Stale Service Accounts (Preview)](/defender-for-identity/remove-inactive-service-account)
105+
For more information, see: Security Assessment: [Remove Inactive Service Accounts (Preview)](/defender-for-identity/remove-inactive-service-account).
103106

104107
### New Graph based API for response actions (preview)
105108

defender-xdr/advanced-hunting-overview.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Overview - Advanced hunting
3-
description: Learn about advanced hunting queries in Microsoft Defender and how to use them to proactively find threats and weaknesses in your network
3+
description: Learn about advanced hunting queries in Microsoft Defender and how to use them to proactively find threats and weaknesses in your network.
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
7-
ms.author: maccruz
8-
author: schmurky
7+
ms.author: pauloliveria
8+
author: poliveria
99
ms.localizationpriority: medium
10-
manager: dansimp
10+
manager: orspodek
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security
@@ -22,7 +22,7 @@ appliesto:
2222
- Microsoft Defender XDR
2323
- Microsoft Sentinel in the Microsoft Defender portal
2424
search.appverid: met150
25-
ms.date: 06/03/2025
25+
ms.date: 09/09/2025
2626

2727
---
2828

@@ -33,7 +33,7 @@ ms.date: 06/03/2025
3333

3434
Advanced hunting is a query-based threat hunting tool that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to locate threat indicators and entities. The flexible access to data enables unconstrained hunting for both known and potential threats.
3535

36-
Advanced hunting supports two modes, guided and advanced. Use [guided mode](advanced-hunting-query-builder.md) if you are not yet familiar with Kusto Query Language (KQL) or prefer the convenience of a query builder. Use [advanced mode](advanced-hunting-query-language.md) if you are comfortable using KQL to create queries from scratch.
36+
Advanced hunting supports two modes, guided and advanced. Use [guided mode](advanced-hunting-query-builder.md) if you aren't yet familiar with Kusto Query Language (KQL) or prefer the convenience of a query builder. Use [advanced mode](advanced-hunting-query-language.md) if you're comfortable using KQL to create queries from scratch.
3737

3838
**To start hunting, read [Choose between guided and advanced modes to hunt in the Microsoft Defender portal](advanced-hunting-modes.md).**
3939

@@ -66,13 +66,13 @@ Advanced hunting data can be categorized into two distinct types, each consolida
6666

6767
### **Event or activity data**
6868

69-
Event or activity data populates tables about alerts, security events, system events, and routine assessments. Advanced hunting receives this data almost immediately after the sensors that collect them successfully transmit them to the corresponding cloud services. For example, you can query event data from healthy sensors on workstations or domain controllers almost immediately after they are available on Microsoft Defender for Endpoint and Microsoft Defender for Identity.
69+
Event or activity data populates tables about alerts, security events, system events, and routine assessments. Advanced hunting receives this data almost immediately after the sensors that collect them successfully transmit them to the corresponding cloud services. For example, you can query event data from healthy sensors on workstations or domain controllers almost immediately after they're available on Microsoft Defender for Endpoint and Microsoft Defender for Identity.
7070

7171
To collect even more event properties, you have the option of turning on [aggregated reporting](/defender-endpoint/aggregated-reporting).
7272

7373
### **Entity data**
7474

75-
Entity data populates tables with information about users and devices. This data comes from both relatively static data sources and dynamic sources, such as Active Directory entries and event logs. To provide fresh data, tables are updated with any new information every 15 minutes, adding rows that might not be fully populated. Every 24 hours, data is consolidated to insert a record that contains the latest, most comprehensive data set about each entity.
75+
Entity data populates tables with information about users and devices. This data comes from both relatively static data sources and dynamic sources, such as Active Directory entries and event logs. To provide fresh data, tables are updated every hour to insert a record that contains the latest, most comprehensive data set about each entity, including other useful information such as health status and tags.
7676

7777

7878
## Time zone
@@ -96,7 +96,7 @@ In order to extend the 30 days retention for Advanced Hunting, see the following
9696
- Microsoft Defender for Endpoint [Raw Data Streaming API](/defender-endpoint/api/raw-data-export)
9797

9898
> [!NOTE]
99-
> The data retained is from the first (1st) day that you implement and enable the streaming api.
99+
> The data retained is from the first day that you implement and enable the streaming API.
100100
101101
## Related content
102102

0 commit comments

Comments
 (0)