You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-for-identity/whats-new.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,13 @@ For updates about versions and features released six months ago or earlier, see
25
25
26
26
## November 2025
27
27
28
+
|Version number |Updates |
29
+
|---------|---------|
30
+
|2.251|The enhanced ADWS LDAP and legacy password-based LDAP query methods now capture a broader range of unique events at scale. As a result, you may notice an increase in recorded activity.|
31
+
32
+
### Automatic Windows event auditing configuration for Defender for Identity sensors v3.x
33
+
34
+
Defender for Identity now offers automatic Windows event-auditing configuration for Defender for Identity sensors v3.x. Automatic event auditing streamlines deployment by applying required Windows auditing settings to new sensors and fixing any misconfigurations on existing sensors. Admins can enable the option in the Defender portal or using Graph API.
28
35
29
36
### Identity Inventory enhancements: Accounts tab, manual account linking and unlinking, and expanded remediation actions
30
37
@@ -44,13 +51,6 @@ For more information, see: [Link or Unlink an Account to an Identity (Preview)](
44
51
You can now perform remediation actions such as disabling accounts or resetting passwords on one or more accounts linked to an identity. For more information, see: [Remediation actions](remediation-actions.md#roles-and-permissions).
45
52
Defender for Identity now offers an opt-in automatic event-auditing configuration for unified sensors (V3.x). This feature streamlines deployment by automatically applying required Windows auditing settings to new sensors and fixing misconfigurations on existing ones. Admins can enable the option in the Defender for Identity Settings -> Advanced Features or via Graph API. The capability and its related health alerts will roll out globally beginning mid-November 2025.
46
53
47
-
Releated Health alerts:
48
-
- NTLM Auditing is not enabled
49
-
- Directory Services Advanced Auditing is not enabled as required
50
-
- Directory Services Object Auditing is not enabled as required
51
-
- Auditing on the Configuration container is not enabled as required
52
-
- Auditing on the ADFS container is not enabled as required
53
-
54
54
### New security posture assessment: Change password for on-prem account with potentially leaked credentials (Preview)
55
55
56
56
The new security posture assessment lists users whose valid credentials have been leaked. For more information, see: [Change password for on-prem account with potentially leaked credentials (Preview)](/defender-for-identity/security-posture-assessments/accounts#change-password-for-on-prem-account-with-potentially-leaked-credentials-preview)
@@ -68,8 +68,8 @@ For more information, see [Configure scoped access for Microsoft Defender for Id
68
68
69
69
## October 2025
70
70
71
-
We’re excited to announce that the Microsoft Defender for Identity Sensor (v3.x) is now generally available (GA).
72
-
[Version 3.x of the sensor](/defender-for-identity/deploy/activate-sensor) provides enhanced coverage, improved performance across your environment and offering easier deployment and management for domain controllers.
71
+
We’re excited to announce that the Microsoft Defender for Identity sensor v3.x is now generally available (GA).
72
+
The [Microsoft Defender for Identity sensor v3.x](/defender-for-identity/deploy/activate-sensor) provides enhanced coverage, improved performance across your environment and offering easier deployment and management for domain controllers.
73
73
74
74
### Microsoft Defender for Identity sensor version updates
75
75
@@ -93,9 +93,9 @@ As part of the ongoing transition to a unified alerting experience across Micros
|Suspicious network connection over Encrypting File System Remote Protocol|2416|[Suspicious network connection over Encrypting File System Remote Protocol](alerts-xdr.md#suspicious-network-connection-over-encrypting-file-system-remote-protocol)|xdr_SuspiciousConnectionOverEFSRPC|
95
95
96
-
### Unlock additional security value in the unified agent (Preview)
96
+
### Additional security value in the Defender for Identity sensor v3.x
97
97
98
-
Get enhanced protection by applying the **Unified sensor RPC audit** tag to your v3.x sensors through the Asset rule management feature. Learn more [here](/defender-for-identity/deploy/prerequisites-sensor-version-3).
98
+
Apply the **Unified sensor RPC audit** tag to your Defender for Identity sensor v3.x in the **Asset rule management** page for enhanced protection. Learn more [here](/defender-for-identity/deploy/prerequisites-sensor-version-3).
99
99
100
100
### Identity posture recommendations view on the identity page (preview)
101
101
@@ -106,18 +106,18 @@ For more information, see [Investigate users in Microsoft Defender XDR](/microso
106
106
Defender for Identity data centers are now also deployed in the United Arab Emirates, North and Central regions. For the most current list of regional deployments, see [Defender for Identity data locations](/defender-for-identity/privacy-compliance/#data-location).
107
107
108
108
109
-
### New API support for unified sensor (preview)
110
-
We are excited to announce the availability of a new Graph-based API for managing unified sensor server actions in Microsoft Defender for Identity.
109
+
### New API support for the Defender for Identity sensor v3.x (Preview)
110
+
We are excited to announce the availability of a new Graph-based API for managing the Defender for Identity sensor v3.x server actions.
111
111
This capability is currently in preview and available in API Beta version.
112
112
113
113
This API allows customers to:
114
114
115
-
* Monitor the status of unified sensor servers
115
+
* Monitor the status of servers deployed with the Defender for Identity sensor v3.x
116
116
* Enable or disable the automatic activation of eligible servers
117
117
* Activate or deactivate the sensor on eligible servers
118
118
119
119
120
-
For more information, see [Managing unified sensor actions through Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true).
120
+
For more information, see [Managing the Defender for Identity sensor v3.x actions using Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true).
121
121
122
122
### Microsoft Defender for Identity sensor version updates
Copy file name to clipboardExpand all lines: defender-office-365/air-user-automatic-feedback-response.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: chrisda
6
6
manager: bagol
7
7
ms.reviewer: kellycrider
8
8
ms.topic: overview
9
-
ms.date: 07/10/2024
9
+
ms.date: 11/17/2024
10
10
ms.service: defender-office-365
11
11
appliesto:
12
12
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
@@ -21,6 +21,8 @@ This article explains how to enable and customize automatic feedback response fo
21
21
22
22
## What do you need to know before you begin?
23
23
24
+
- The alert policy named **Email reported by user as malware or phish** must be enabled for this feature to work (it's on by default). For more information about this alert policy, see [Threat management alert policies](/defender-xdr/alert-policies#threat-management-alert-policies).
25
+
24
26
- You open the Microsoft Defender portal at <https://security.microsoft.com>. To go directly to the **User reported settings** page, use <https://security.microsoft.com/securitysettings/userSubmission>.
25
27
26
28
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
Copy file name to clipboardExpand all lines: defender-office-365/anti-phishing-policies-mdo-configure.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -351,6 +351,7 @@ On the **Anti-phishing** page, the following properties are displayed in the lis
351
351
-**Always on** for the default anti-phishing policy.
352
352
-**On** or **Off** for other anti-spam policies.
353
353
-**Priority**: For more information, see the [Set the priority of custom anti-spam policies](#use-the-microsoft-defender-portal-to-set-the-priority-of-custom-anti-phishing-policies) section.
354
+
354
355
To change the list of policies from normal to compact spacing, select :::image type="icon" source="media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
355
356
356
357
Select :::image type="icon" source="media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to filter the policies by **Time range** (creation date) or **Status**.
Copy file name to clipboardExpand all lines: defender-office-365/app-guard-for-office-install.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,6 +48,7 @@ Microsoft Defender Application Guard for Office (Application Guard for Office) h
48
48
-**Update package**: Windows 10 cumulative monthly security update [KB4571756](https://support.microsoft.com/help/4571756/windows-10-update-KB4571756)
49
49
50
50
For detailed system requirements, refer to [System requirements for Microsoft Defender Application Guard](/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard). Also, refer to your computer manufacturer's guides on how to enable virtualization technology.
51
+
51
52
To learn more about Microsoft 365 Apps update channels, see [Overview of update channels for Microsoft 365 Apps](/deployoffice/overview-update-channels).
# Security Operations guide for email authentication in Microsoft 365
29
28
30
29
[Email authentication](email-authentication-about.md) is a critical component of securing communication in your organization. When an email is received in Microsoft 365, the service adds an **Authentication-Results** header. This header shows the results of various email authentication checks, including SPF, DKIM, DMARC, and composite authentication (compauth).
Copy file name to clipboardExpand all lines: defender-office-365/reports-email-security.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1069,7 +1069,6 @@ Select **View details** to go to the **Top senders and recipients** page. Or, to
1069
1069
-**Microsoft 365 organizations without Defender for Office 365**: <https://security.microsoft.com/reports/TopSenderRecipient>
1070
1070
-**Microsoft 365 organizations with Defender for Office 365 (included or in an add-on subscription)**: <https://security.microsoft.com/reports/TopSenderRecipientsATP>
1071
1071
1072
-
1073
1072
On the **Top senders and recipients** page, a larger version of the pie chart is displayed. The following charts are available:
1074
1073
1075
1074
-**Show data for Top mail senders** (default view)
Copy file name to clipboardExpand all lines: defender-office-365/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,7 @@ ms.date: 01/31/2023
21
21
# How to handle malicious emails that are delivered to recipients (False Negatives), using Microsoft Defender for Office 365
22
22
23
23
Microsoft Defender for Office 365 helps deal with malicious emails (False Negative) that are delivered to recipients and that put your organizational productivity at risk.
24
+
24
25
Defender for Office 365 can help you understand why emails are getting delivered, how to resolve the situation quickly, and how to prevent similar situations from happening in the future.
Copy file name to clipboardExpand all lines: defender-office-365/submissions-users-report-message-add-in-configure.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,9 +70,9 @@ The rest of this article describes how to remove the Report Message and Report P
70
70
> [!IMPORTANT]
71
71
> <sup>\*</sup> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you should limit to emergency scenarios or when you can't use a different role.
72
72
73
-
-The Report Message and Report Phishing add-ins now use Nested app authentication. For more information, see [Nested app auth requirement set](/javascript/api/requirement-sets/common/nested-app-auth-requirement-sets) . If your Outlook client doesn't support the required NAA authentication, we suggest updating clients in the Microsoft admin center or advising users to use the built-in **Report** button.
73
+
- The Report Message and Report Phishing add-ins now use Nested app authentication. For more information, see [Nested app auth requirement set](/javascript/api/requirement-sets/common/nested-app-auth-requirement-sets) . If your Outlook client doesn't support the required NAA authentication, we suggest updating clients in the Microsoft admin center or advising users to use the built-in **Report** button.
74
74
75
-
-For organizational removals, the organization needs to be configured to use OAuth authentication. For more information, see [Determine if Centralized Deployment of add-ins works for your organization](/Microsoft-365/admin/manage/centralized-deployment-of-add-ins).
75
+
- For organizational removals, the organization needs to be configured to use OAuth authentication. For more information, see [Determine if Centralized Deployment of add-ins works for your organization](/Microsoft-365/admin/manage/centralized-deployment-of-add-ins).
76
76
77
77
- For more information on how to report a message using reporting in Outlook, see [Report false positives and false negatives in Outlook](submissions-outlook-report-messages.md).
0 commit comments