Skip to content

Commit ef7e0fa

Browse files
committed
Merge branch 'main' into EOP-chrisda
2 parents 8e96c6c + 179cdd8 commit ef7e0fa

File tree

3 files changed

+14
-10
lines changed

3 files changed

+14
-10
lines changed

ATPDocs/deploy/deploy-defender-identity.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@ Identify your architecture and your requirements, and then use the table below t
2323
|Server configuration |Server Operating System |Recommended deployment |
2424
|---------|---------|---------|---------|
2525
|Domain controller | Windows Server 2019 or later with the [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) or later.<br> * **See Note**.|[Defender for Identity sensor v3.x (Preview)](prerequisites-sensor-version-3.md)<br> * **See Note**. |
26-
|Domain controller |Windows Server 2016 or earlier |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
27-
|[Active Directory Federation Services (AD FS)](active-directory-federation-services.md) | NA |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
28-
|[Active Directory Certificate Services (AD CS)](active-directory-federation-services.md) | NA |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
29-
|[Entra Connect](active-directory-federation-services.md)| NA |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
26+
|Domain controller |Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
27+
|[Active Directory Federation Services (AD FS)](active-directory-federation-services.md) | Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
28+
|[Active Directory Certificate Services (AD CS)](active-directory-federation-services.md) | Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
29+
|[Entra Connect](active-directory-federation-services.md)| Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
3030

3131
> [!NOTE]
3232
> The Defender for Identity sensor version 3.x is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.

ATPDocs/whats-new.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,9 @@ For more information, see also:
2323

2424
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2525

26+
## August 2025
27+
28+
**Suspected Brute Force attack (Kerberos, NTLM):** Improved detection logic now includes scenarios where accounts were locked during the attacks. As a result, the number of triggered alerts might increase.
2629

2730
## July 2025
2831

@@ -34,17 +37,17 @@ For more information, see [Configure scoped access for Microsoft Defender for Id
3437

3538
### New security posture assessments for unmonitored identity servers
3639

37-
Microsoft Defender for Identity now includes three security posture assessments that detect when Microsoft Entra Connect, Active Directory Federation Services (ADFS), or Active Directory Certificate Services (ADCS) servers are present in your environment but aren't monitored.
40+
Microsoft Defender for Identity three new security posture assessments detect when Microsoft Entra Connect, Active Directory Federation Services (ADFS), or Active Directory Certificate Services (ADCS) servers are present in your environment but aren't monitored.
3841

3942
Use these assessments to improve monitoring coverage and strengthen your hybrid identity security posture.
4043

41-
For more details, see:
44+
For more information, see:
4245

4346
[Security Assessment: Unmonitored ADCS servers](unmonitored-active-directory-certificate-services-server.md)
4447

4548
[Security Assessment: Unmonitored ADFS servers](unmonitored-active-directory-federation-services-servers.md)
4649

47-
[Security Assessment: Unmonitored Entra Connect servers](unmonitored-entra-connect-servers.md)
50+
[Security Assessment: Unmonitored Microsoft Entra Connect servers](unmonitored-entra-connect-servers.md)
4851

4952

5053

@@ -62,7 +65,7 @@ Scoping by Active Directory domains helps:
6265

6366
- Support operational boundaries: Align access for SOC analysts, identity administrators, and regional teams.
6467

65-
For more information see: [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
68+
For more information, see: [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
6669

6770

6871
### Okta integration is now available in Microsoft Defender for Identity
@@ -103,7 +106,7 @@ Defender for Identity now supports deploying its new sensor on Domain Controller
103106
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify noneligible servers and take action to update and onboard them for enhanced identity protection.
104107

105108

106-
### Local administrators collection (using SAM-R queries) feature will be disabled
109+
### Local administrators collection (using SAM-R queries) feature is disabled
107110
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change occurs automatically by the specified date, and no administrative action is required.
108111

109112
### New Health Issue
@@ -149,7 +152,7 @@ For more information, see: [Investigate and protect Service Accounts | Microsoft
149152

150153
### Enhanced Identity Inventory
151154

152-
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment.
155+
The Identities page under *Assets* was updated to provide better visibility and management of identities across your environment.
153156
The updated Identities Inventory page now includes the following tabs:
154157

155158
- Identities: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.

defender-endpoint/respond-machine-alerts.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -212,6 +212,7 @@ Depending on the severity of the attack and the sensitivity of the device, you m
212212

213213
- Isolating devices from the network is supported for macOS for client version 101.98.84 and above. You can also use live response to run the action. For more information on live response, see [Investigate entities on devices using live response](live-response.md)
214214
- Full isolation is available for devices running Windows 11, Windows 10, version 1703 or later, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016 and Windows Server 2012 R2.
215+
- Isolating devices from the network is supported when Defender is running in passive mode on all supported Windows operating systems, macOS and Linux supported versions.
215216
- You can use the device isolation capability on all supported Microsoft Defender for Endpoint on Linux listed in [System requirements](mde-linux-prerequisites.md). Ensure that the following prerequisites are enabled:
216217
- `iptables`
217218
- `ip6tables`

0 commit comments

Comments
 (0)