Skip to content

Commit ed12a6e

Browse files
authored
Merge branch 'main' into WI480943-near-real-time-updates-entra-id-risk-level
2 parents 7fb7161 + 155d3e3 commit ed12a6e

19 files changed

+118
-39
lines changed
456 KB
Loading
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: 'Security Assessment: Remove Inactive Service Account (Preview)'
3+
description: Learn how to identify and address inactive Active Directory service accounts to mitigate security risks and improve your organization's security posture.
4+
ms.date: 08/17/2025
5+
ms.topic: how-to
6+
#customer intent: As a security administrator, I want to improve security posture in my organization by removing inactive service accounts
7+
---
8+
9+
# Security Assessment: Remove Inactive Service Accounts (Preview)
10+
11+
This recommendation lists Active Directory service accounts detected as inactive (stale) within the past 180 days.
12+
13+
## Why do inactive service accounts pose a risk?
14+
15+
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Dormant service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
16+
17+
This exposure creates several risks:
18+
19+
- Unauthorized access to sensitive applications and data.
20+
21+
- Lateral movement across the network without detection.
22+
23+
24+
## How do I use this security assessment to improve my organizational security posture?
25+
26+
To use this security assessment effectively, follow these steps:
27+
28+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions ) for Remove inactive service account.
29+
1. Review the list of exposed entities to discover which of your service account is inactive.
30+
31+
:::image type="content" source="media/okta-integration/remove-inactive-service-accounts.png" alt-text="Screenshot that shows the recommendation action to remove inactive service accounts." lightbox="media/okta-integration/remove-inactive-service-accounts.png":::
32+
33+
1. Take appropriate actions on those entities by removing the service account. For example:
34+
35+
- **Disable the account:** Prevent any usage by disabling the account identified as exposed.
36+
37+
- **Monitor for impact:** Wait several weeks and monitor for operational issues, such as service disruptions or errors.
38+
39+
- **Delete the account:** If no issues are observed, delete the account and fully remove its access.
40+
41+
> [!NOTE]
42+
> Assessments are updated in near real time, and scores and statuses are updated every 24 hours. The list of impacted entities is updated within a few minutes of your implementing the recommendations. The status might take time until it's marked as **Completed**.
43+
44+
## Related articles
45+
46+
- [Learn more about Microsoft Secure Score](/defender-xdr/microsoft-secure-score)

ATPDocs/toc.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -249,10 +249,12 @@ items:
249249
href: security-assessment-clear-text.md
250250
- name: LAPS usage assessment
251251
href: security-assessment-laps.md
252-
- name: Riskiest lateral movement paths
253-
href: security-assessment-riskiest-lmp.md
254252
- name: Remove discoverable passwords in Active Directory account attributes
255253
href: remove-discoverable-passwords-active-directory-account-attributes.md
254+
- name: Remove inactive service accounts
255+
href: remove-inactive-service-account.md
256+
- name: Riskiest lateral movement paths
257+
href: security-assessment-riskiest-lmp.md
256258
- name: Unsecure Kerberos delegation assessment
257259
href: security-assessment-unconstrained-kerberos.md
258260
- name: Unsecure SID History attributes

ATPDocs/whats-new.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,12 @@ Previously, Defender for Identity tenants received Entra ID risk level in the Id
3434
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Entra ID risk level to the IdentityInfo table remains unchanged.
3535

3636

37+
### New security assessment: Remove inactive service accounts (Preview)
38+
39+
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been inactive (stale) for the past 180 days, to help you mitigate security risks associated with unused accounts.
40+
41+
For more information, see: [Security Assessment: Remove Inactive Service Accounts (Preview)](remove-inactive-service-account.md)
42+
3743
### New Graph based API for response actions (preview)
3844

3945
We’re excited to announce a new Graph-based API for initiating and managing remediation actions in Microsoft Defender for Identity.

defender-endpoint/api/run-advanced-query-api.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: reference
1616
ms.subservice: reference
1717
ms.custom: api
1818
search.appverid: met150
19-
ms.date: 12/18/2020
19+
ms.date: 08/18/2025
2020
---
2121

2222
# Advanced hunting API
@@ -105,13 +105,11 @@ POST https://api.securitycenter.microsoft.com/api/advancedqueries/run
105105
```
106106

107107
```json
108+
108109
{
109-
"Query":"DeviceProcessEvents
110-
|where InitiatingProcessFileName =~ 'powershell.exe'
111-
|where ProcessCommandLine contains 'appdata'
112-
|project Timestamp, FileName, InitiatingProcessFileName, DeviceId
113-
|limit 2"
110+
"Query":"DeviceProcessEvents |where InitiatingProcessFileName =~ 'powershell.exe' |where ProcessCommandLine contains 'appdata'|project Timestamp, FileName, InitiatingProcessFileName, DeviceId|limit 2"
114111
}
112+
115113
```
116114

117115
### Response example

defender-endpoint/linux-custom-location-installation.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,9 @@ This section describes the additional steps required for deploying Defender for
7878

7979
In the [manual deployment steps](linux-install-manually.md#manual-deployment-steps), you need to complete an additional preinstallation setup to enable custom location installation. Follow the steps below as part of the [preinstall setup for custom location installation](linux-install-manually.md#preinstall-setup-for-custom-location-installation).
8080

81+
> [!IMPORTANT]
82+
> It's strongly recommended to choose a new, dedicated (empty) directory for the custom install path. During uninstall/cleanup, the process attempts to recursively remove that directory and all its contents - therefore, it's important not to use a shared or existing directory that contains other data you might need to retain.
83+
8184
1. **Set your custom path variable**:
8285

8386
> [!NOTE]
@@ -191,4 +194,4 @@ lrwxrwxrwx 1 root root ... /opt/microsoft/mdatp -> /var/tmp/TestInstall/microsof
191194
- [Deployment guidance for Defender for Endpoint on Linux for SAP](mde-linux-deployment-on-sap.md)
192195
- [Deploy Defender for Endpoint on Linux manually](linux-install-manually.md)
193196
194-
[!INCLUDE [Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
197+
[!INCLUDE [Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/mde-demonstration-amsi.md

Lines changed: 18 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: AMSI demonstrations with Microsoft Defender for Endpoint
33
description: Demonstration of AMSI detection by Microsoft Defender for Endpoint
4-
author: emmwalshh
5-
ms.author: ewalsh
4+
author: paulinbar
5+
ms.author: painbar
66
ms.reviewer: yongrhee
77
ms.localizationpriority: medium
88
ms.service: defender-endpoint
@@ -11,7 +11,7 @@ audience: ITPro
1111
ms.collection:
1212
- m365-security
1313
ms.topic: how-to
14-
ms.date: 10/16/2024
14+
ms.date: 08/19/2025
1515
search.appverid: met150
1616
ms.custom:
1717
- partner-contribution
@@ -49,8 +49,11 @@ In this demonstration article, you have two engine choices to test AMSI:
4949

5050
1. Save the following PowerShell script as `AMSI_PoSh_script.ps1`:
5151

52-
:::image type="content" source="media/mde-demonstrations-amsi/test-amsi-powershell-save-script.png" alt-text="Screenshot showing PowerShell script to save as AMSI_PoSh_script.ps1" lightbox="media/mde-demonstrations-amsi/test-amsi-powershell-save-script.png":::
53-
52+
```powershell
53+
$testString = "AMSI Test Sample: " + "7e72c3ce-861b-4339-8740-0ac1484c1386"
54+
Invoke-Expression $testString
55+
```
56+
5457
2. On your device, open PowerShell as an administrator.
5558

5659
3. Type `Powershell -ExecutionPolicy Bypass AMSI_PoSh_script.ps1`, and then press **Enter**.
@@ -64,17 +67,22 @@ In this demonstration article, you have two engine choices to test AMSI:
6467

6568
1. Save the following VBScript as `AMSI_vbscript.vbs`:
6669

67-
:::image type="content" source="media/mde-demonstrations-amsi/test-amsi-vbscript-save-script.png" alt-text="Screenshot showing VBScript to save as AMSI_vbscript.vbs" lightbox="media/mde-demonstrations-amsi/test-amsi-vbscript-save-script.png":::
68-
70+
```vbscript
71+
REM Save this sample AMSI vbscript as AMSI_vbscript.vbs
72+
Dim result
73+
result = eval("AMSI Test Sample: " + "7e72c3ce-861b-4339-8740-0ac1484c1386")
74+
WScript.Echo result
75+
```
76+
6977
2. On your Windows Device, open Command Prompt as an administrator.
7078

71-
2. Type `wscript AMSI_vbscript.js`, and then press **Enter**.
79+
1. Type `wscript AMSI_vbscript.vbs`, and then press **Enter**.
7280

7381
The result should be as follows:
7482

75-
:::image type="content" source="media/mde-demonstrations-amsi/test-amsi-vbscript-results.png" alt-text="Screenshot showing the AMSI test results. It should show that antivirus software blocked the script." lightbox="media/mde-demonstrations-amsi/test-amsi-vbscript-results.png":::
83+
:::image type="content" source="media/mde-demonstrations-amsi/test-amsi-vbscript-results.png" alt-text="Screenshot showing the AMSI test results. It should show that antivirus software blocked the script." lightbox="media/mde-demonstrations-amsi/test-amsi-vbscript-results.png":::
84+
7685

77-
7886
### Verifying the test results
7987

8088
In your protection history, you should be able to see the following information:

defender-endpoint/web-content-filtering.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
author: denisebmsft
77
ms.reviewer: ericlaw
88
ms.localizationpriority: medium
9-
ms.date: 06/27/2025
9+
ms.date: 08/18/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -53,7 +53,7 @@ Ensure you meet the requirements described in the following table:
5353
|:---|:---|
5454
| Subscription | Your subscription must include one of the following plans:<br/>- [Windows 10/11 Enterprise E5](/windows/deployment/deploy-enterprise-licenses)<br/>- [Microsoft 365 E5](https://www.microsoft.com/microsoft-365/enterprise/e5?activetab=pivot%3aoverviewtab)<br/>- Microsoft 365 A5<br/>- Microsoft 365 E5 Security<br/>- [Microsoft 365 E3](https://www.microsoft.com/microsoft-365/enterprise/e3?activetab=pivot%3aoverviewtab)<br/>- [Microsoft Defender for Endpoint Plan 1 or Plan 2](/defender-xdr/eval-defender-endpoint-overview)<br/>- [Microsoft Defender for Business](/defender-business/mdb-overview)<br/>- [Microsoft 365 Business Premium](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium)|
5555
| Portal access | You must have access to the [Microsoft Defender portal](https://security.microsoft.com). |
56-
| Operating system | Your organization's devices must be running one of the following operating systems with the [latest antivirus/antimalware updates](microsoft-defender-antivirus-updates.md): <br/>- Windows 11<br/>- Windows 10 Anniversary Update (version 1607) or later <br/>- For macOS availability, see [Network Protection for macOS](network-protection-macos.md)<br/>- For Linux availability, see [Network Protection for Linux](network-protection-linux.md)|
56+
| Operating system | Your organization's devices must be running one of the following operating systems with the [latest antivirus/antimalware updates](microsoft-defender-antivirus-updates.md): <br/>- Windows 11<br/>- Windows 10 Anniversary Update (version 1607) or later <br/>- Windows Server 2019 or later <br/>- For macOS availability, see [Network Protection for macOS](network-protection-macos.md)<br/>- For Linux availability, see [Network Protection for Linux](network-protection-linux.md)|
5757
| Browser | Your devices must be running one of the following browsers: <br/>- Microsoft Edge<br/>- Google Chrome<br/>- Mozilla Firefox<br/>- Brave<br/>- Opera<br/>- Internet Explorer|
5858
|Related protection | [Windows Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) and [network protection](network-protection.md) must be enabled on your organization's devices. |
5959

defender-office-365/mdo-support-teams-about.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Microsoft Defender for Office 365 Plan 2 support for Microsoft Teams
2+
title: Microsoft Defender for Office 365 support for Microsoft Teams
33
f1.keywords:
44
- NOCSH
55
author: chrisda
@@ -14,14 +14,15 @@ search.appverid:
1414
ms.collection:
1515
- m365-security
1616
- tier1
17-
description: Admins can learn about Microsoft Teams features in Microsoft Defender for Office 365 Plan 2.
17+
description: Admins can learn about Microsoft Teams features in Microsoft Defender for Office 365.
1818
ms.service: defender-office-365
19-
ms.date: 07/28/2025
19+
ms.date: 08/18/2025
2020
appliesto:
21-
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
21+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
22+
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2223
---
2324

24-
# Microsoft Defender for Office 365 Plan 2 support for Microsoft Teams
25+
# Microsoft Defender for Office 365 support for Microsoft Teams
2526

2627
[!include[Prerelease information](../includes/prerelease.md)]
2728

-78 Bytes
Loading

0 commit comments

Comments
 (0)