Skip to content

Commit deb58fc

Browse files
authored
Merge branch 'main' into WI262141-add-screenshot-forconfiguration-node
2 parents eaeb31b + b642972 commit deb58fc

File tree

912 files changed

+10617
-10069
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

912 files changed

+10617
-10069
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ For more information about the exception criteria and exception process, see [Mi
3939
4040
Select the total score link to review all feedback on clarity, consistency, tone, brand, terms, spelling, grammar, readability, and inclusive language. _You should fix all spelling errors regardless of your total score_. Fixing spelling errors helps maintain customer trust in overall content quality.
4141
42-
| Article | Total score<br>(Required: 80) | Words + phrases<br>(Brand, terms) | Correctness<br>(Spelling, grammar) | Clarity<br>(Readability) |
42+
| Article | Total score<br>(Required: 80) | Terminology | Spelling and Grammar| Clarity<br>(Readability) |
4343
|---------|:--------------:|:--------------------:|:------:|:---------:|
4444
"
4545

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
name: PR has no warnings or errors
2+
3+
permissions:
4+
pull-requests: write
5+
statuses: write
6+
7+
on:
8+
issue_comment:
9+
types: [created]
10+
11+
jobs:
12+
13+
build-status:
14+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-BuildValidation.yml@workflows-prod
15+
with:
16+
PayloadJson: ${{ toJSON(github) }}
17+
secrets:
18+
AccessToken: ${{ secrets.GITHUB_TOKEN }}
19+
20+
21+

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -994,6 +994,16 @@
994994
"source_path": "CloudAppSecurityDocs/what-is-cloud-app-security.md",
995995
"redirect_url": "/defender-cloud-apps/what-is-defender-for-cloud-apps",
996996
"redirect_document_id": true
997+
},
998+
{
999+
"source_path": "CloudAppSecurityDocs/tutorial-ueba.md",
1000+
"redirect_url": "/defender-cloud-apps/",
1001+
"redirect_document_id": true
1002+
},
1003+
{
1004+
"source_path": "CloudAppSecurityDocs/file-filters.md",
1005+
"redirect_url": "/defender-cloud-apps/data-protection-policies",
1006+
"redirect_document_id": false
9971007
}
9981008
]
9991009
}

.openpublishing.redirection.defender-endpoint.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,11 @@
7979
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
8080
"redirect_url": "/defender-xdr/pilot-deploy-defender-endpoint",
8181
"redirect_document_id": false
82-
}
82+
},
83+
{
84+
"source_path": "defender-endpoint/monthly-security-summary-report.md",
85+
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
86+
"redirect_document_id": true
87+
}
8388
]
8489
}

.openpublishing.redirection.defender-xdr.json

Lines changed: 86 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@
1010
"redirect_url": "/defender-for-identity/microsoft-365-security-center-mdi",
1111
"redirect_document_id": false
1212
},
13-
1413
{
1514
"source_path": "defender-xdr/eval-create-eval-environment.md",
1615
"redirect_url": "/defender-xdr/pilot-deploy-overview",
@@ -131,6 +130,11 @@
131130
"redirect_url": "/defender-xdr/entity-page-device",
132131
"redirect_document_id": true
133132
},
133+
{
134+
"source_path": "defender-xdr/unlink-alert-from-incident.md",
135+
"redirect_url": "/defender-xdr/move-alert-to-another-incident",
136+
"redirect_document_id": true
137+
},
134138
{
135139
"source_path": "defender-xdr/unified-secops-platform/defender-xdr-portal.md",
136140
"redirect_url": "/defender-xdr/",
@@ -166,6 +170,31 @@
166170
"redirect_url": "/defender-xdr/",
167171
"redirect_document_id": false
168172
},
173+
{
174+
"source_path": "defender-xdr/microsoft-threat-actor-naming.md",
175+
"redirect_url": "/unified-secops-platform/microsoft-threat-actor-naming",
176+
"redirect_document_id": false
177+
},
178+
{
179+
"source_path": "defender-xdr/malware-naming.md",
180+
"redirect_url": "/unified-secops-platform/malware-naming",
181+
"redirect_document_id": false
182+
},
183+
{
184+
"source_path": "defender-xdr/criteria.md",
185+
"redirect_url": "/unified-secops-platform/criteria",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path": "defender-xdr/submission-guide.md",
190+
"redirect_url": "/unified-secops-platform/submission-guide",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path": "defender-xdr/virus-initiative-criteria.md",
195+
"redirect_url": "/unified-secops-platform/virus-initiative-criteria",
196+
"redirect_document_id": false
197+
},
169198
{
170199
"source_path": "defender-xdr/tickets.md",
171200
"redirect_url": "/defender-xdr/troubleshoot",
@@ -175,6 +204,61 @@
175204
"source_path": "defender-xdr/portal-submission-troubleshooting.md",
176205
"redirect_url": "/defender-xdr/troubleshoot",
177206
"redirect_document_id": false
207+
},
208+
{
209+
"source_path": "defender-xdr/mto-advanced-hunting.md",
210+
"redirect_url": "/unified-secops-platform/mto-advanced-hunting",
211+
"redirect_document_id": false
212+
},
213+
{
214+
"source_path": "defender-xdr/mto-dashboard.md",
215+
"redirect_url": "/unified-secops-platform/mto-dashboard",
216+
"redirect_document_id": false
217+
},
218+
{
219+
"source_path": "defender-xdr/mto-endpoint-security-policy.md",
220+
"redirect_url": "/unified-secops-platform/mto-endpoint-security-policy",
221+
"redirect_document_id": false
222+
},
223+
{
224+
"source_path": "defender-xdr/mto-incidents-alerts.md",
225+
"redirect_url": "/unified-secops-platform/mto-incidents-alerts",
226+
"redirect_document_id": false
227+
},
228+
{
229+
"source_path": "defender-xdr/mto-overview.md",
230+
"redirect_url": "/unified-secops-platform/mto-overview",
231+
"redirect_document_id": false
232+
},
233+
{
234+
"source_path": "defender-xdr/mto-requirements.md",
235+
"redirect_url": "/unified-secops-platform/mto-requirements",
236+
"redirect_document_id": false
237+
},
238+
{
239+
"source_path": "defender-xdr/mto-tenant-devices.md",
240+
"redirect_url": "/unified-secops-platform/mto-tenant-devices",
241+
"redirect_document_id": false
242+
},
243+
{
244+
"source_path": "defender-xdr/mto-tenantgroups.md",
245+
"redirect_url": "/unified-secops-platform/mto-tenantgroups",
246+
"redirect_document_id": false
247+
},
248+
{
249+
"source_path": "defender-xdr/mto-tenants.md",
250+
"redirect_url": "/unified-secops-platform/mto-tenants",
251+
"redirect_document_id": false
252+
},
253+
{
254+
"source_path": "defender-xdr/portals.md",
255+
"redirect_url": "/unified-secops-platform/overview-plan#understand-microsoft-security-portals-and-admin-centers",
256+
"redirect_document_id": false
257+
},
258+
{
259+
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
260+
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
261+
"redirect_document_id": false
178262
}
179263
]
180-
}
264+
}

ATADocs/docfx.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,13 @@
4848
"uhfHeaderId": "MSDocsHeader-M365-IT",
4949
"searchScope": ["ATA"],
5050
"contributors_to_exclude": [
51-
"beccarobins"
51+
"beccarobins",
52+
"rjagiewich",
53+
"claydetels19",
54+
"garycentric",
55+
"padmagit77",
56+
"aditisrivastava07",
57+
"Ruchika-mittal01"
5258
]
5359
},
5460
"markdownEngineName": "markdig"

ATADocs/index.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ metadata:
88
description: Protect your enterprise using information from multiple network data-sources to learn the behavior of users and entities in your organization.
99
services: service
1010
ms.service: advanced-threat-analytics
11-
ms.subservice: ms.subservice
1211
ms.topic: landing-page
1312
ms.collection: M365-security-compliance
1413
author: batamig
-43.2 KB
Binary file not shown.

ATPDocs/deploy/activate-capabilities.md

Lines changed: 6 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,12 @@ ms.topic: how-to
77

88
# Activate Microsoft Defender for Identity capabilities directly on a domain controller
99

10-
Microsoft Defender for Endpoint customers, who've already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
10+
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
1111

1212
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
1313

1414
> [!IMPORTANT]
15-
> Information in this article relates to a feature that is currently in limited availablility for a select set of use cases. If you weren't directed to use the Defender for Identity **Activation** page, use our [main deployment guide](deploy-defender-identity.md) instead.
16-
>
15+
> Information in this article relates to a feature that is currently in limited availability for a select set of use cases. If you weren't directed to use the Defender for Identity **Activation** page, use our [main deployment guide](deploy-defender-identity.md) instead.
1716
1817
## Prerequisites
1918

@@ -122,7 +121,7 @@ In the Defender portal, check for the following details:
122121

123122
- **Device entities**: Select **Assets > Devices**, and select the machine for your new sensor. Defender for Identity events are shown on the device timeline.
124123

125-
- **User entities**. Select **Assets > Users** and check for users from a newly onboarded domain. Alternately, use the global search option to search for specific users. User details pages should include **Overview**, **Observed in organization**, and **Timeline** data.
124+
- **User entities**: Select **Assets > Users** and check for users from a newly onboarded domain. Alternately, use the global search option to search for specific users. User details pages should include **Overview**, **Observed in organization**, and **Timeline** data.
126125

127126
- **Group entities**: Use the global search to find a user group, or pivot from a user or device details page where group details are shown. Check for details of group membership, view group users, and group timeline data.
128127

@@ -148,16 +147,7 @@ IdentityQueryEvents
148147
For more information, see [Advanced hunting in the Microsoft Defender portal](/microsoft-365/security/defender/advanced-hunting-microsoft-defender).
149148

150149

151-
### Test Identity Security Posture Management (ISPM) recommendations
152-
153-
Defender for Identity capabilities on domain controllers support the following ISPM assessments:
154-
155-
- [**Install Defender for Identity Sensor on all Domain Controllers**](../security-assessment-unmonitored-domain-controller.md)
156-
- [**Microsoft LAPS usage**](../security-assessment-laps.md)
157-
- [**Resolve unsecure domain configurations**](../security-assessment-unsecure-domain-configurations.md)
158-
- **Set a honeytoken account**
159-
- [**Unsecure account attributes**](../security-assessment-unsecure-account-attributes.md)
160-
- [**Unsecure SID History attributes**](../security-assessment-unsecure-sid-history-attribute.md)
150+
## Test Identity Security Posture Management (ISPM) recommendations
161151

162152
We recommend simulating risky behavior in a test environment to trigger supported assessments and verify that they appear as expected. For example:
163153

@@ -187,37 +177,6 @@ For more information, see [Microsoft Defender for Identity's security posture as
187177
188178
### Test alert functionality
189179
190-
The following alerts are supported by Defender for Identity capabilities on domain controllers:
191-
192-
:::row:::
193-
:::column span="":::
194-
- [Account enumeration reconnaissance](../reconnaissance-discovery-alerts.md#account-enumeration-reconnaissance-external-id-2003)
195-
- [Active Directory attributes Reconnaissance using LDAP](../reconnaissance-discovery-alerts.md#active-directory-attributes-reconnaissance-ldap-external-id-2210)
196-
- [Exchange Server Remote Code Execution (CVE-2021-26855)](../lateral-movement-alerts.md#exchange-server-remote-code-execution-cve-2021-26855-external-id-2414)
197-
- [Honeytoken user attributes modified](../persistence-privilege-escalation-alerts.md#honeytoken-user-attributes-modified-external-id-2427)
198-
- [Honeytoken was queried via LDAP](../reconnaissance-discovery-alerts.md#honeytoken-was-queried-via-ldap-external-id-2429)
199-
- [Honeytoken authentication activity](../credential-access-alerts.md#honeytoken-authentication-activity-external-id-2014)
200-
- [Honeytoken group membership changed](../persistence-privilege-escalation-alerts.md#honeytoken-group-membership-changed-external-id-2428)
201-
- [Remote code execution attempt](../other-alerts.md#remote-code-execution-attempt-external-id-2019)
202-
- [Security principal reconnaissance (LDAP)](../credential-access-alerts.md#security-principal-reconnaissance-ldap-external-id-2038)
203-
- [Suspicious service creation](../other-alerts.md#suspicious-service-creation-external-id-2026)
204-
- [Suspected NTLM relay attack (Exchange account)](../lateral-movement-alerts.md#suspected-ntlm-relay-attack-exchange-account-external-id-2037)
205-
:::column-end:::
206-
:::column span="":::
207-
- [Suspicious modification of the Resource Based Constrained Delegation attribute by a machine account](../persistence-privilege-escalation-alerts.md#suspicious-modification-of-the-resource-based-constrained-delegation-attribute-by-a-machine-account--external-id-2423)
208-
- [Suspicious additions to sensitive groups](../persistence-privilege-escalation-alerts.md#suspicious-additions-to-sensitive-groups-external-id-2024)
209-
- [Suspicious modification of a dNSHostName attribute (CVE-2022-26923)](../persistence-privilege-escalation-alerts.md#suspicious-modification-of-a-dnshostname-attribute-cve-2022-26923--external-id-2421)
210-
- [Suspicious modification of a sAMNameAccount attribute (CVE-2021-42278 and CVE-2021-42287)](../credential-access-alerts.md#suspicious-modification-of-a-samnameaccount-attribute-cve-2021-42278-and-cve-2021-42287-exploitation-external-id-2419)
211-
- [Suspected DCShadow attack (domain controller promotion)](../other-alerts.md#suspected-dcshadow-attack-domain-controller-promotion-external-id-2028)
212-
- [Suspected DFSCoerce attack using Distributed File System Protocol](../credential-access-alerts.md#suspected-dfscoerce-attack-using-distributed-file-system-protocol-external-id-2426) 
213-
- [Suspected DCShadow attack (domain controller replication request)](../other-alerts.md#suspected-dcshadow-attack-domain-controller-replication-request-external-id-2029)
214-
- [Suspected account takeover using shadow credentials](../credential-access-alerts.md#suspected-account-takeover-using-shadow-credentials-external-id-2431)
215-
- [Suspected SID-History injection](../persistence-privilege-escalation-alerts.md#suspected-sid-history-injection-external-id-1106)
216-
- [Suspected AD FS DKM key read](../credential-access-alerts.md#suspected-ad-fs-dkm-key-read-external-id-2413)
217-
:::column-end:::
218-
:::row-end:::
219-
220-
221180
Test alert functionality by simulating risky activity in a test environment. For example:
222181
223182
- Tag an account as a honeytoken account, and then try signing in to the honeytoken account against the activated domain controller.
@@ -232,16 +191,12 @@ Test remediation actions on a test user. For example:
232191
233192
1. In the Defender portal, go to the user details page for a test user.
234193
235-
1. From the options menu, select any or all of the following, one at a time:
236-
237-
- **Disable user in AD**
238-
- **Enable user in AD**
239-
- **Force password reset**
194+
1. From the **Options** menu, select any of the available remediation actions.
240195
241196
1. Check Active Directory for the expected activity.
242197
243198
> [!NOTE]
244-
> The current version does not collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
199+
> The current version doesn't collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
245200
246201
247202
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).

ATPDocs/deploy/active-directory-federation-services.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,9 +55,6 @@ Configure the SQL server to allow the Directory Service Account with the followi
5555
- *read*
5656
- *select*
5757

58-
> [!NOTE]
59-
> If the AD FS database runs on a dedicated SQL server instead of the local AD FS server, and you're using a group Managed Service Account (gMSA) as the Directory Service Account, make sure that you grant the SQL server the [required permissions](create-directory-service-account-gmsa.md#prerequisites-grant-permissions-to-retrieve-the-gmsa-accounts-password) to retrieve the gMSA's password.
60-
6158
### Grant access to the AD FS database
6259

6360
Grant access to the AD FS database by using SQL Server Management Studio, Transact-SQL (T-SQL), or PowerShell.

0 commit comments

Comments
 (0)