Skip to content

Commit e202631

Browse files
authored
Merge branch 'main' into ewalsh-rbac
2 parents 8855a0a + f61328f commit e202631

File tree

229 files changed

+2138
-1696
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

229 files changed

+2138
-1696
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,11 @@
7979
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
8080
"redirect_url": "/defender-xdr/pilot-deploy-defender-endpoint",
8181
"redirect_document_id": false
82-
}
82+
},
83+
{
84+
"source_path": "defender-endpoint/monthly-security-summary-report.md",
85+
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
86+
"redirect_document_id": true
87+
}
8388
]
8489
}

.openpublishing.redirection.defender-xdr.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,11 @@
131131
"redirect_url": "/defender-xdr/entity-page-device",
132132
"redirect_document_id": true
133133
},
134+
{
135+
"source_path": "defender-xdr/unlink-alert-from-incident.md",
136+
"redirect_url": "/defender-xdr/move-alert-to-another-incident",
137+
"redirect_document_id": true
138+
},
134139
{
135140
"source_path": "defender-xdr/unified-secops-platform/defender-xdr-portal.md",
136141
"redirect_url": "/defender-xdr/",
@@ -175,6 +180,11 @@
175180
"source_path": "defender-xdr/portal-submission-troubleshooting.md",
176181
"redirect_url": "/defender-xdr/troubleshoot",
177182
"redirect_document_id": false
183+
},
184+
{
185+
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
186+
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
187+
"redirect_document_id": false
178188
}
179189
]
180190
}

ATADocs/docfx.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,13 @@
4848
"uhfHeaderId": "MSDocsHeader-M365-IT",
4949
"searchScope": ["ATA"],
5050
"contributors_to_exclude": [
51-
"beccarobins"
51+
"beccarobins",
52+
"rjagiewich",
53+
"claydetels19",
54+
"garycentric",
55+
"padmagit77",
56+
"aditisrivastava07",
57+
"Ruchika-mittal01"
5258
]
5359
},
5460
"markdownEngineName": "markdig"

ATPDocs/monitored-activities.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,18 +14,20 @@ In the case of a valid threat, or **true positive**, Defender for Identity enabl
1414
The information monitored by Defender for Identity is presented in the form of activities. Defender for Identity currently supports monitoring of the following activity types:
1515

1616
> [!NOTE]
17-
>
1817
> - This article is relevant for all Defender for Identity sensor types.
1918
> - Defender for Identity monitored activities appear on both the user and machine profile page.
20-
> - Defender for Identity monitored activities are also available in Microsoft Defender XDR's [Advanced Hunting](https://security.microsoft.com/advanced-hunting) page.
19+
> - Defender for Identity monitored activities are also available in [Microsoft Defender XDR's Advanced Hunting](/defender-xdr/advanced-hunting-overview) page.
20+
21+
> [!TIP]
22+
> For detailed information on all supported event types (`ActionType` values) in Advanced Hunting Identity-related tables, use the built-in schema reference available in Microsoft Defender XDR.
2123
2224
## Monitored user activities: User account AD attribute changes
2325

2426
|Monitored activity|Description|
2527
|---------------------|------------------|
2628
|Account Constrained Delegation State Changed|The account state is now enabled or disabled for delegation.|
2729
|Account Constrained Delegation SPNs Changed|Constrained delegation restricts the services to which the specified server can act on behalf of the user.|
28-
|Account Delegation Changed | Changes to the account delegation settings |
30+
|Account Delegation Changed | Changes to the account delegation settings. |
2931
|Account Disabled Changed|Indicates whether an account is disabled or enabled.|
3032
|Account Expired|Date when the account expires.|
3133
|Account Expiry Time Changed|Change to the date when the account expires.|
@@ -35,9 +37,9 @@ The information monitored by Defender for Identity is presented in the form of a
3537
|Account Password Never Expires Changed|User's password changed to never expire.|
3638
|Account Password Not Required Changed|User account was changed to allow logging in with a blank password.|
3739
|Account Smartcard Required Changed|Account changes to require users to log on to a device using a smart card.|
38-
|Account Supported Encryption Types Changed|Kerberos supported encryption types were changed (types: Des, AES 129, AES 256)|
39-
|Account Unlock changed | Changes to the account unlock settings |
40-
|Account UPN Name Changed|User's principle name was changed.|
40+
|Account Supported Encryption Types Changed|Kerberos supported encryption types were changed (types: Des, AES 129, AES 256).|
41+
|Account Unlock changed | Changes to the account unlock settings. |
42+
|Account UPN Name Changed|User's principal name was changed.|
4143
|Group Membership Changed|User was added/removed, to/from a group, by another user or by themselves.|
4244
|User Mail Changed|Users email attribute was changed.|
4345
|User Manager Changed|User's manager attribute was changed.|
@@ -48,8 +50,8 @@ The information monitored by Defender for Identity is presented in the form of a
4850

4951
|Monitored activity|Description|
5052
|---------------------|------------------|
51-
|User Account Created|User account was created|
52-
|Computer Account Created|Computer account was created|
53+
|User Account Created|User account was created.|
54+
|Computer Account Created|Computer account was created.|
5355
|Security Principal Deleted Changed|Account was deleted/restored (both user and computer).|
5456
|Security Principal Display Name Changed|Account display name was changed from X to Y.|
5557
|Security Principal Name Changed|Account name attribute was changed.|
@@ -69,7 +71,7 @@ The information monitored by Defender for Identity is presented in the form of a
6971
|Private Data Retrieval|User attempted/succeeded to query private data using LSARPC protocol.|
7072
|Service Creation|User attempted to remotely create a specific service to a remote machine.|
7173
|SMB Session Enumeration|User attempted to enumerate all users with open SMB sessions on the domain controllers.|
72-
|SMB file copy|User copied files using SMB|
74+
|SMB file copy|User copied files using SMB.|
7375
|SAMR Query|User performed a SAMR query.|
7476
|Task Scheduling|User tried to remotely schedule X task to a remote machine.|
7577
|Wmi Execution|User attempted to remotely execute a WMI method.|
@@ -83,7 +85,7 @@ For more information, see [Supported logon types](/microsoft-365/security/defend
8385
|Monitored activity|Description|
8486
|---------------------|------------------|
8587
|Computer Operating System Changed|Change to the computer OS.|
86-
|SID-History changed | Changes to the computer SID history |
88+
|SID-History changed | Changes to the computer SID history. |
8789

8890
## See Also
8991

ATPDocs/privacy-compliance.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -22,14 +22,13 @@ For more information see: [Microsoft Defender for Identity monitored activities]
2222

2323
Defender for Identity operates in the Microsoft Azure data centers in the following locations:
2424

25-
- European Union
26-
- United Kingdom
27-
- United States
28-
- Australia
29-
- Switzerland
30-
- Singapore
31-
32-
- India
25+
- European Union (West Europe, North Europe)
26+
- United Kingdom (UK South)
27+
- United States (East US, West US, West US2)
28+
- Australia (Australia East)
29+
- Switzerland (Switzerland North)
30+
- Singapore (Southeast Asia)
31+
- India (Central India, South India)
3332

3433
Customer data collected by the service might be stored as follows:
3534

Lines changed: 8 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
---
2-
32
title: Microsoft LAPS usage assessment
43
description: This article provides an overview of Microsoft Defender for Identity's Microsoft LAPS usage identity security posture assessment report.
54
ms.date: 01/29/2023
@@ -12,9 +11,9 @@ ms.topic: how-to
1211

1312
Microsoft's "Local Administrator Password Solution" (LAPS) provides management of local administrator account passwords for domain-joined computers. Passwords are randomized and stored in Active Directory (AD), protected by ACLs, so only eligible users can read it or request its reset.
1413

15-
This security assessment supports [legacy Microsoft LAPS](https://www.microsoft.com/en-us/download/details.aspx?id=46899) only.
14+
This security assessment supports [legacy Microsoft LAPS](https://www.microsoft.com/en-us/download/details.aspx?id=46899) and [Windows LAPS](/windows-server/identity/laps/laps-overview).
1615

17-
## What risk does not implementing LAPS pose to an organization?
16+
## What risk does not implement LAPS pose to an organization?
1817

1918
LAPS provides a solution to the issue of using a common local account with an identical password on every computer in a domain. LAPS resolves this issue by setting a different, rotated random password for the common local administrator account on every computer in the domain.
2019

@@ -24,24 +23,20 @@ LAPS simplifies password management while helping customers implement more recom
2423

2524
1. Review the recommended action at <https://security.microsoft.com/securescore?viewid=actions> to discover which of your domains have some (or all) compatible Windows devices that aren't protected by LAPS, or that haven't had their LAPS managed password changed in the last 60 days.
2625

27-
![See which domains have devices unprotected by LAPS.](media/cas-isp-laps-1.png)
28-
26+
[![Screenshot that shows which domains have devices unprotected by LAPS.](media/cas-isp-laps-1.png)](media/cas-isp-laps-1.png#lightbox)
27+
2928
1. For domains that are partially protected, select the relevant row to view the list of devices not protected by LAPS in that domain.
3029

3130
![Select domain with devices unprotected by LAPS.](media/cas-isp-laps-2.png)
32-
33-
> [!NOTE]
34-
> If the entire domain is not protected with LAPS, you won't see the list of all the unprotected devices.
35-
36-
1. Take appropriate action on those devices by downloading, installing and configuring or troubleshooting [Microsoft LAPS](https://go.microsoft.com/fwlink/?linkid=2104282) using the documentation provided in the download.
31+
32+
1. Take appropriate action on those devices by downloading, installing, and configuring or troubleshooting [Microsoft LAPS](https://go.microsoft.com/fwlink/?linkid=2104282) or [Windows LAPS](/windows-server/identity/laps/laps-overview).
3733

3834
![Remediate devices unprotected by LAPS.](media/laps-unprotected-devices.png)
3935

4036
> [!NOTE]
41-
> While assessments are updated in near real time, scores and statuses are updated every 24 hours. While the list of impacted entities is updated within a few minutes of your implementing the recommendations, the status may still take time until it's marked as **Completed**.
42-
>
37+
> While assessments are updated in near real time, scores and statuses are updated every 24 hours. While the list of impacted entities is updated within a few minutes of your implementing the recommendations, the status may still take time until it will be marked as **Completed**.
4338
4439
## See also
4540

4641
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
47-
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)
42+

ATPDocs/whats-new.md

Lines changed: 33 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,38 @@ For more information, see also:
2222

2323
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2424

25+
## February 2025
26+
27+
### New attack paths tab on the Identity profile page
28+
29+
This tab provides visibility into potential attack paths leading to a critical identity or involving it within the path, helping assess security risks. For more information, see [Overview of attack path within Exposure Management.](/security-exposure-management/work-attack-paths-overview)
30+
31+
Additional identity page enhancements:
32+
33+
- New side panel with more information for each entry on the user timeline.
34+
35+
- Filtering capabilities on the Devices tab under Observed in organization.
36+
37+
### Updating 'Protect and manage local admin passwords with Microsoft LAPS' posture recommendation
38+
39+
This update aligns the security posture assessment within Secure Score with the latest version of [Windows LAPS](/windows-server/identity/laps/laps-overview), ensuring it reflects current security best practices for managing local administrator passwords.
40+
41+
### New and updated events in the Advanced hunting IdentityDirectoryEvents table
42+
43+
We have added and updated the following events in the `IdentityDirectoryEvents` table in Advanced Hunting:
44+
45+
- User Account control flag has been changed
46+
47+
- Security group creation in Active directory
48+
49+
- Failed attempt to change an account password
50+
51+
- Successful account password change
52+
53+
- Account primary group ID has been changed
54+
55+
Additionally, the **built-in schema reference** for Advanced Hunting in Microsoft Defender XDR has been updated to include detailed information on all supported event types (**`ActionType`** values) in identity-related tables, ensuring complete visibility into available events. For more information, see [Advanced hunting schema details](/defender-xdr/advanced-hunting-schema-tables).
56+
2557
## December 2024
2658

2759
### New security posture assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
@@ -443,7 +475,7 @@ This version includes the following improvements:
443475

444476
For more information, see [Download and schedule Defender for Identity reports in Microsoft Defender XDR (Preview)](reports.md).
445477

446-
- **Health issues**: Added the *The 'Remove learning period' toggle was automatically switched off for this tenant* health issue
478+
- **Health issues**: The 'Remove learning period' toggle was automatically switched off for this tenant* health issue.
447479

448480
This version also includes bug fixes for cloud services and the Defender for Identity sensor.
449481

0 commit comments

Comments
 (0)