Skip to content

Commit e012b90

Browse files
authored
Merge branch 'main' into docs-editor/linux-install-with-ansible-1731590880
2 parents 2faada5 + e4044c4 commit e012b90

File tree

56 files changed

+603
-298
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

56 files changed

+603
-298
lines changed

ATPDocs/investigate-assets.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,9 @@ Find identity information in the following Microsoft Defender XDR areas:
4545

4646
For example, the following image shows the details on an identity details page:
4747

48-
:::image type="content" source="media/investigate-assets/identity-details.png" alt-text="Screenshot of an identity details page." lightbox="media/investigate-assets/identity-details.png":::
48+
![Screenshot of a specific user's page in the Microsoft Defender portal.](media/investigate-assets/image.png)
49+
50+
4951

5052
### Identity details
5153

@@ -60,6 +62,10 @@ When you investigate a specific identity, you'll see the following details on an
6062
|[Identity timeline](/microsoft-365/security/defender/investigate-users#timeline) | The timeline represents activities and alerts observed from a user's identity from the last 180 days, unifying identity entries across Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. <br><br>Use the timeline to focus on activities a user performed or were performed on them in specific timeframes. Select the default **30 days** to change the time range to another built-in value, or to a custom range. |
6163
|[Remediation actions](/microsoft-365/security/defender/investigate-users#remediation-actions) | Respond to compromised users by disabling their accounts or resetting their password. After taking action on users, you can check on the activity details in the Microsoft Defender XDR **Action center.|
6264

65+
> [!NOTE]
66+
> **Investigation Priority Score** has been deprecated on December 3, 2025. As a result, both the Investigation Priority Score breakdown and the scored activity timeline cards have been removed from the UI.
67+
68+
6369
For more information, see [Investigate users](/microsoft-365/security/defender/investigate-users) in the Microsoft Defender XDR documentation.
6470

6571
## Investigation steps for suspicious groups
150 KB
Loading
30.9 KB
Loading
32.1 KB
Loading
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
# Required metadata
3+
# For more information, see https://review.learn.microsoft.com/en-us/help/platform/learn-editor-add-metadata?branch=main
4+
# For valid values of ms.service, ms.prod, and ms.topic, see https://review.learn.microsoft.com/en-us/help/platform/metadata-taxonomies?branch=main
5+
6+
title: 'Security Assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)'
7+
description: 'This recommendation directly addresses the recently published CVE-2024-49019, which highlights security risks associated with vulnerable AD CS configurations. '
8+
author: LiorShapiraa # GitHub alias
9+
ms.author: liorshapira
10+
ms.service: microsoft-defender-for-identity
11+
ms.topic: article
12+
ms.date: 12/04/2024
13+
---
14+
15+
# Security assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
16+
17+
This article describes Microsoft Defender for Identity's Prevent Certificate Enrollment with arbitrary Application Policies (ESC15) security posture assessment report.
18+
19+
## Why is it important to review the Certificate templates?
20+
21+
This recommendation directly addresses the recently published [CVE-2024-49019](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49019)__,__ which highlights security risks associated with vulnerable AD CS configurations. This security posture assessment lists all vulnerable certificate templates found in customer environments due to unpatched AD CS servers.
22+
23+
Certificate templates that are vulnerable to [CVE-2024-49019](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49019) allow an attacker to issue a certificate with arbitrary Application Policies and Subject Alternative Name. The certificate can be used to escalate privileges, possibly resulting with full domain compromise. 
24+
25+
These certificate templates expose organizations to significant risks, as they enable attackers to issue certificates with arbitrary Application Policies and Subject Alternative Names (SANs). Such certificates can be exploited to escalate privileges and potentially compromise the entire domain. In particular, these vulnerabilities allow non-privileged users to issue certificates that can authenticate as high-privileged accounts, posing a severe security threat.
26+
27+
## Prerequisites
28+
29+
This assessment is available only to customers who installed a sensor on an AD CS server. For more information, see [New sensor type for Active Directory Certificate Services (AD CS)](/defender-for-identity/whats-new).
30+
31+
## **How do I use this security assessment to improve my organizational security posture?**
32+
33+
1. Review the recommended action at [Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)](https://security.microsoft.com/securescore?viewid=actions).
34+
35+
2. **Identify the vulnerable certificate templates:**
36+
- Remove enrollment permission for unprivileged users.
37+
- Disable the **“Supply in the request”** option.
38+
39+
3. Identify the AD CS servers which are vulnerable to CVE-2024-49019 and apply the relevant patch.
40+
41+
For example:
42+
43+
:::image type="content" source="media/prevent-certificate-enrollment-esc15/image.png" alt-text="Screenshot of servers." lightbox="media/prevent-certificate-enrollment-esc15/image.png":::
44+
45+
## Next steps
46+
47+
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
48+
49+
- [Check out the Defender for Identity forum!](https://aka.ms/MDIcommunity)
50+

ATPDocs/security-assessment-edit-misconfigured-acl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/20/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit misconfigured certificate templates ACL (ESC4) (Preview)
8+
# Security assessment: Edit misconfigured certificate templates ACL (ESC4)
99

1010
This article describes Microsoft Defender for Identity's **Misconfigured certificate template ACL** security posture assessment report.
1111

ATPDocs/security-assessment-edit-misconfigured-ca-acl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/14/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit misconfigured Certificate Authority ACL (ESC7) (Preview)
8+
# Security assessment: Edit misconfigured Certificate Authority ACL (ESC7)
99

1010
This article describes Microsoft Defender for Identity's **Misconfigured certificate authority ACL** security posture assessment report.
1111

ATPDocs/security-assessment-edit-misconfigured-enrollment-agent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/20/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit misconfigured enrollment agent certificate template (ESC3) (Preview)
8+
# Security assessment: Edit misconfigured enrollment agent certificate template (ESC3)
99

1010
This article describes Microsoft Defender for Identity's **Misconfigured enrollment agent certificate template** security posture assessment report.
1111

ATPDocs/security-assessment-edit-misconfigured-owner.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/14/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit misconfigured certificate templates owner (ESC4) (Preview)
8+
# Security assessment: Edit misconfigured certificate templates owner (ESC4)
99

1010
This article provides an overview of Microsoft Defender for Identity's **Misconfigured certificate templates owner (ESC4)** security posture assessment report.
1111

ATPDocs/security-assessment-edit-overly-permissive-template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 11/20/2023
55
ms.topic: how-to
66
---
77

8-
# Security assessment: Edit overly permissive certificate template with privileged EKU (Any purpose EKU or No EKU) (ESC2) (Preview)
8+
# Security assessment: Edit overly permissive certificate template with privileged EKU (Any purpose EKU or No EKU) (ESC2)
99

1010
This article describes Microsoft Defender for Identity's **Overly permissive certificate template with privileged EKU** security posture assessment report.
1111

0 commit comments

Comments
 (0)