Skip to content

Commit eada033

Browse files
Merge pull request #5631 from MicrosoftDocs/main
[AutoPublish] main to live - 11/17 13:30 PST | 11/18 03:00 IST
2 parents bcc509e + 92c6eb7 commit eada033

11 files changed

+28
-22
lines changed

defender-for-identity/whats-new.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,13 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## November 2025
2727

28+
|Version number |Updates |
29+
|---------|---------|
30+
|2.251|The enhanced ADWS LDAP and legacy password-based LDAP query methods now capture a broader range of unique events at scale. As a result, you may notice an increase in recorded activity.|
31+
32+
### Automatic Windows event auditing configuration for Defender for Identity sensors v3.x
33+
34+
Defender for Identity now offers automatic Windows event-auditing configuration for Defender for Identity sensors v3.x. Automatic event auditing streamlines deployment by applying required Windows auditing settings to new sensors and fixing any misconfigurations on existing sensors. Admins can enable the option in the Defender portal or using Graph API.
2835

2936
### Identity Inventory enhancements: Accounts tab, manual account linking and unlinking, and expanded remediation actions
3037

@@ -44,13 +51,6 @@ For more information, see: [Link or Unlink an Account to an Identity (Preview)](
4451
You can now perform remediation actions such as disabling accounts or resetting passwords on one or more accounts linked to an identity. For more information, see: [Remediation actions](remediation-actions.md#roles-and-permissions).
4552
Defender for Identity now offers an opt-in automatic event-auditing configuration for unified sensors (V3.x). This feature streamlines deployment by automatically applying required Windows auditing settings to new sensors and fixing misconfigurations on existing ones. Admins can enable the option in the Defender for Identity Settings -> Advanced Features or via Graph API. The capability and its related health alerts will roll out globally beginning mid-November 2025.
4653

47-
Releated Health alerts:
48-
- NTLM Auditing is not enabled
49-
- Directory Services Advanced Auditing is not enabled as required
50-
- Directory Services Object Auditing is not enabled as required
51-
- Auditing on the Configuration container is not enabled as required
52-
- Auditing on the ADFS container is not enabled as required
53-
5454
### New security posture assessment: Change password for on-prem account with potentially leaked credentials (Preview)
5555

5656
The new security posture assessment lists users whose valid credentials have been leaked. For more information, see: [Change password for on-prem account with potentially leaked credentials (Preview)](/defender-for-identity/security-posture-assessments/accounts#change-password-for-on-prem-account-with-potentially-leaked-credentials-preview)
@@ -68,8 +68,8 @@ For more information, see [Configure scoped access for Microsoft Defender for Id
6868

6969
## October 2025
7070

71-
We’re excited to announce that the Microsoft Defender for Identity Sensor (v3.x) is now generally available (GA).
72-
[Version 3.x of the sensor](/defender-for-identity/deploy/activate-sensor) provides enhanced coverage, improved performance across your environment and offering easier deployment and management for domain controllers.
71+
We’re excited to announce that the Microsoft Defender for Identity sensor v3.x is now generally available (GA).
72+
The [Microsoft Defender for Identity sensor v3.x](/defender-for-identity/deploy/activate-sensor) provides enhanced coverage, improved performance across your environment and offering easier deployment and management for domain controllers.
7373

7474
### Microsoft Defender for Identity sensor version updates
7575

@@ -93,9 +93,9 @@ As part of the ongoing transition to a unified alerting experience across Micros
9393
|Suspected brute-force attack (LDAP)|2004|[Suspected brute-force attack (LDAP)](alerts-xdr.md#suspected-brute-force-attack-ldap)|xdr_LdapBindBruteForce|
9494
|Suspicious network connection over Encrypting File System Remote Protocol|2416|[Suspicious network connection over Encrypting File System Remote Protocol](alerts-xdr.md#suspicious-network-connection-over-encrypting-file-system-remote-protocol)|xdr_SuspiciousConnectionOverEFSRPC|
9595

96-
### Unlock additional security value in the unified agent (Preview)
96+
### Additional security value in the Defender for Identity sensor v3.x
9797

98-
Get enhanced protection by applying the **Unified sensor RPC audit** tag to your v3.x sensors through the Asset rule management feature. Learn more [here](/defender-for-identity/deploy/prerequisites-sensor-version-3).
98+
Apply the **Unified sensor RPC audit** tag to your Defender for Identity sensor v3.x in the **Asset rule management** page for enhanced protection. Learn more [here](/defender-for-identity/deploy/prerequisites-sensor-version-3).
9999

100100
### Identity posture recommendations view on the identity page (preview)
101101

@@ -106,18 +106,18 @@ For more information, see [Investigate users in Microsoft Defender XDR](/microso
106106
Defender for Identity data centers are now also deployed in the United Arab Emirates, North and Central regions. For the most current list of regional deployments, see [Defender for Identity data locations](/defender-for-identity/privacy-compliance/#data-location).
107107

108108

109-
### New API support for unified sensor (preview)
110-
We are excited to announce the availability of a new Graph-based API for managing unified sensor server actions in Microsoft Defender for Identity.
109+
### New API support for the Defender for Identity sensor v3.x (Preview)
110+
We are excited to announce the availability of a new Graph-based API for managing the Defender for Identity sensor v3.x server actions.
111111
This capability is currently in preview and available in API Beta version.
112112

113113
This API allows customers to:
114114

115-
* Monitor the status of unified sensor servers
115+
* Monitor the status of servers deployed with the Defender for Identity sensor v3.x
116116
* Enable or disable the automatic activation of eligible servers
117117
* Activate or deactivate the sensor on eligible servers
118118
119119

120-
For more information, see [Managing unified sensor actions through Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true).
120+
For more information, see [Managing the Defender for Identity sensor v3.x actions using Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true).
121121

122122
### Microsoft Defender for Identity sensor version updates
123123

defender-office-365/air-user-automatic-feedback-response.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: chrisda
66
manager: bagol
77
ms.reviewer: kellycrider
88
ms.topic: overview
9-
ms.date: 07/10/2024
9+
ms.date: 11/17/2024
1010
ms.service: defender-office-365
1111
appliesto:
1212
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
@@ -21,6 +21,8 @@ This article explains how to enable and customize automatic feedback response fo
2121

2222
## What do you need to know before you begin?
2323

24+
- The alert policy named **Email reported by user as malware or phish** must be enabled for this feature to work (it's on by default). For more information about this alert policy, see [Threat management alert policies](/defender-xdr/alert-policies#threat-management-alert-policies).
25+
2426
- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **User reported settings** page, use <https://security.microsoft.com/securitysettings/userSubmission>.
2527

2628
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:

defender-office-365/anti-phishing-policies-mdo-configure.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -351,6 +351,7 @@ On the **Anti-phishing** page, the following properties are displayed in the lis
351351
- **Always on** for the default anti-phishing policy.
352352
- **On** or **Off** for other anti-spam policies.
353353
- **Priority**: For more information, see the [Set the priority of custom anti-spam policies](#use-the-microsoft-defender-portal-to-set-the-priority-of-custom-anti-phishing-policies) section.
354+
354355
To change the list of policies from normal to compact spacing, select :::image type="icon" source="media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
355356

356357
Select :::image type="icon" source="media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the policies by **Time range** (creation date) or **Status**.

defender-office-365/app-guard-for-office-install.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ Microsoft Defender Application Guard for Office (Application Guard for Office) h
4848
- **Update package**: Windows 10 cumulative monthly security update [KB4571756](https://support.microsoft.com/help/4571756/windows-10-update-KB4571756)
4949

5050
For detailed system requirements, refer to [System requirements for Microsoft Defender Application Guard](/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard). Also, refer to your computer manufacturer's guides on how to enable virtualization technology.
51+
5152
To learn more about Microsoft 365 Apps update channels, see [Overview of update channels for Microsoft 365 Apps](/deployoffice/overview-update-channels).
5253

5354
## Deploy Application Guard for Office

defender-office-365/email-auth-sec-ops-guide.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2525
---
2626

27-
2827
# Security Operations guide for email authentication in Microsoft 365
2928

3029
[Email authentication](email-authentication-about.md) is a critical component of securing communication in your organization. When an email is received in Microsoft 365, the service adds an **Authentication-Results** header. This header shows the results of various email authentication checks, including SPF, DKIM, DMARC, and composite authentication (compauth).

defender-office-365/quarantine-faq.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,6 @@ sections:
8181
8282
You can't customize quarantine policies in [preset security policies](preset-security-policies.md).
8383
84-
8584
- question: |
8685
What messages can end users access in quarantine?
8786
answer: |

defender-office-365/reports-email-security.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1069,7 +1069,6 @@ Select **View details** to go to the **Top senders and recipients** page. Or, to
10691069
- **Microsoft 365 organizations without Defender for Office 365**: <https://security.microsoft.com/reports/TopSenderRecipient>
10701070
- **Microsoft 365 organizations with Defender for Office 365 (included or in an add-on subscription)**: <https://security.microsoft.com/reports/TopSenderRecipientsATP>
10711071

1072-
10731072
On the **Top senders and recipients** page, a larger version of the pie chart is displayed. The following charts are available:
10741073

10751074
- **Show data for Top mail senders** (default view)

defender-office-365/safe-links-policies-configure.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -406,7 +406,9 @@ This example creates a safe links rule to the previous examples, but the rule ap
406406

407407
```powershell
408408
$Data = Import-Csv -Path "C:\Data\SafeLinksDomains.csv"
409+
409410
$SLDomains = $Data.Domains
411+
410412
New-SafeLinksRule -Name "Contoso All" -SafeLinksPolicy "Contoso All" -RecipientDomainIs $SLDomains
411413
```
412414

@@ -507,7 +509,9 @@ This example adds the domains from the specified .csv as a condition to the safe
507509

508510
```powershell
509511
$Data = Import-Csv -Path "C:\Data\SafeLinksDomains.csv"
512+
510513
$SLDomains = $Data.Domains
514+
511515
Set-SafeLinksRule -Identity "Contoso All" -RecipientDomainIs $SLDomains
512516
```
513517

defender-office-365/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ ms.date: 01/31/2023
2121
# How to handle malicious emails that are delivered to recipients (False Negatives), using Microsoft Defender for Office 365
2222

2323
Microsoft Defender for Office 365 helps deal with malicious emails (False Negative) that are delivered to recipients and that put your organizational productivity at risk.
24+
2425
Defender for Office 365 can help you understand why emails are getting delivered, how to resolve the situation quickly, and how to prevent similar situations from happening in the future.
2526

2627
## What you'll need

defender-office-365/submissions-users-report-message-add-in-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,9 +70,9 @@ The rest of this article describes how to remove the Report Message and Report P
7070
> [!IMPORTANT]
7171
> <sup>\*</sup> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you should limit to emergency scenarios or when you can't use a different role.
7272
73-
- The Report Message and Report Phishing add-ins now use Nested app authentication. For more information, see [Nested app auth requirement set](/javascript/api/requirement-sets/common/nested-app-auth-requirement-sets) . If your Outlook client doesn't support the required NAA authentication, we suggest updating clients in the Microsoft admin center or advising users to use the built-in **Report** button.
73+
- The Report Message and Report Phishing add-ins now use Nested app authentication. For more information, see [Nested app auth requirement set](/javascript/api/requirement-sets/common/nested-app-auth-requirement-sets) . If your Outlook client doesn't support the required NAA authentication, we suggest updating clients in the Microsoft admin center or advising users to use the built-in **Report** button.
7474

75-
- For organizational removals, the organization needs to be configured to use OAuth authentication. For more information, see [Determine if Centralized Deployment of add-ins works for your organization](/Microsoft-365/admin/manage/centralized-deployment-of-add-ins).
75+
- For organizational removals, the organization needs to be configured to use OAuth authentication. For more information, see [Determine if Centralized Deployment of add-ins works for your organization](/Microsoft-365/admin/manage/centralized-deployment-of-add-ins).
7676

7777
- For more information on how to report a message using reporting in Outlook, see [Report false positives and false negatives in Outlook](submissions-outlook-report-messages.md).
7878

0 commit comments

Comments
 (0)