Skip to content

Commit ef827e1

Browse files
authored
Merge branch 'main' into docs-editor/linux-whatsnew-1738652001
2 parents 9acc615 + 8233dbf commit ef827e1

File tree

87 files changed

+931
-856
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

87 files changed

+931
-856
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,11 @@
7979
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
8080
"redirect_url": "/defender-xdr/pilot-deploy-defender-endpoint",
8181
"redirect_document_id": false
82-
}
82+
},
83+
{
84+
"source_path": "defender-endpoint/monthly-security-summary-report.md",
85+
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
86+
"redirect_document_id": true
87+
}
8388
]
8489
}

.openpublishing.redirection.defender-xdr.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,11 @@
131131
"redirect_url": "/defender-xdr/entity-page-device",
132132
"redirect_document_id": true
133133
},
134+
{
135+
"source_path": "defender-xdr/unlink-alert-from-incident.md",
136+
"redirect_url": "/defender-xdr/move-alert-to-another-incident",
137+
"redirect_document_id": true
138+
},
134139
{
135140
"source_path": "defender-xdr/unified-secops-platform/defender-xdr-portal.md",
136141
"redirect_url": "/defender-xdr/",

ATPDocs/monitored-activities.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,18 +14,20 @@ In the case of a valid threat, or **true positive**, Defender for Identity enabl
1414
The information monitored by Defender for Identity is presented in the form of activities. Defender for Identity currently supports monitoring of the following activity types:
1515

1616
> [!NOTE]
17-
>
1817
> - This article is relevant for all Defender for Identity sensor types.
1918
> - Defender for Identity monitored activities appear on both the user and machine profile page.
20-
> - Defender for Identity monitored activities are also available in Microsoft Defender XDR's [Advanced Hunting](https://security.microsoft.com/advanced-hunting) page.
19+
> - Defender for Identity monitored activities are also available in [Microsoft Defender XDR's Advanced Hunting](/defender-xdr/advanced-hunting-overview) page.
20+
21+
> [!TIP]
22+
> For detailed information on all supported event types (`ActionType` values) in Advanced Hunting Identity-related tables, use the built-in schema reference available in Microsoft Defender XDR.
2123
2224
## Monitored user activities: User account AD attribute changes
2325

2426
|Monitored activity|Description|
2527
|---------------------|------------------|
2628
|Account Constrained Delegation State Changed|The account state is now enabled or disabled for delegation.|
2729
|Account Constrained Delegation SPNs Changed|Constrained delegation restricts the services to which the specified server can act on behalf of the user.|
28-
|Account Delegation Changed | Changes to the account delegation settings |
30+
|Account Delegation Changed | Changes to the account delegation settings. |
2931
|Account Disabled Changed|Indicates whether an account is disabled or enabled.|
3032
|Account Expired|Date when the account expires.|
3133
|Account Expiry Time Changed|Change to the date when the account expires.|
@@ -35,9 +37,9 @@ The information monitored by Defender for Identity is presented in the form of a
3537
|Account Password Never Expires Changed|User's password changed to never expire.|
3638
|Account Password Not Required Changed|User account was changed to allow logging in with a blank password.|
3739
|Account Smartcard Required Changed|Account changes to require users to log on to a device using a smart card.|
38-
|Account Supported Encryption Types Changed|Kerberos supported encryption types were changed (types: Des, AES 129, AES 256)|
39-
|Account Unlock changed | Changes to the account unlock settings |
40-
|Account UPN Name Changed|User's principle name was changed.|
40+
|Account Supported Encryption Types Changed|Kerberos supported encryption types were changed (types: Des, AES 129, AES 256).|
41+
|Account Unlock changed | Changes to the account unlock settings. |
42+
|Account UPN Name Changed|User's principal name was changed.|
4143
|Group Membership Changed|User was added/removed, to/from a group, by another user or by themselves.|
4244
|User Mail Changed|Users email attribute was changed.|
4345
|User Manager Changed|User's manager attribute was changed.|
@@ -48,8 +50,8 @@ The information monitored by Defender for Identity is presented in the form of a
4850

4951
|Monitored activity|Description|
5052
|---------------------|------------------|
51-
|User Account Created|User account was created|
52-
|Computer Account Created|Computer account was created|
53+
|User Account Created|User account was created.|
54+
|Computer Account Created|Computer account was created.|
5355
|Security Principal Deleted Changed|Account was deleted/restored (both user and computer).|
5456
|Security Principal Display Name Changed|Account display name was changed from X to Y.|
5557
|Security Principal Name Changed|Account name attribute was changed.|
@@ -69,7 +71,7 @@ The information monitored by Defender for Identity is presented in the form of a
6971
|Private Data Retrieval|User attempted/succeeded to query private data using LSARPC protocol.|
7072
|Service Creation|User attempted to remotely create a specific service to a remote machine.|
7173
|SMB Session Enumeration|User attempted to enumerate all users with open SMB sessions on the domain controllers.|
72-
|SMB file copy|User copied files using SMB|
74+
|SMB file copy|User copied files using SMB.|
7375
|SAMR Query|User performed a SAMR query.|
7476
|Task Scheduling|User tried to remotely schedule X task to a remote machine.|
7577
|Wmi Execution|User attempted to remotely execute a WMI method.|
@@ -83,7 +85,7 @@ For more information, see [Supported logon types](/microsoft-365/security/defend
8385
|Monitored activity|Description|
8486
|---------------------|------------------|
8587
|Computer Operating System Changed|Change to the computer OS.|
86-
|SID-History changed | Changes to the computer SID history |
88+
|SID-History changed | Changes to the computer SID history. |
8789

8890
## See Also
8991

Lines changed: 8 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
---
2-
32
title: Microsoft LAPS usage assessment
43
description: This article provides an overview of Microsoft Defender for Identity's Microsoft LAPS usage identity security posture assessment report.
54
ms.date: 01/29/2023
@@ -12,9 +11,9 @@ ms.topic: how-to
1211

1312
Microsoft's "Local Administrator Password Solution" (LAPS) provides management of local administrator account passwords for domain-joined computers. Passwords are randomized and stored in Active Directory (AD), protected by ACLs, so only eligible users can read it or request its reset.
1413

15-
This security assessment supports [legacy Microsoft LAPS](https://www.microsoft.com/en-us/download/details.aspx?id=46899) only.
14+
This security assessment supports [legacy Microsoft LAPS](https://www.microsoft.com/en-us/download/details.aspx?id=46899) and [Windows LAPS](/windows-server/identity/laps/laps-overview).
1615

17-
## What risk does not implementing LAPS pose to an organization?
16+
## What risk does not implement LAPS pose to an organization?
1817

1918
LAPS provides a solution to the issue of using a common local account with an identical password on every computer in a domain. LAPS resolves this issue by setting a different, rotated random password for the common local administrator account on every computer in the domain.
2019

@@ -24,24 +23,20 @@ LAPS simplifies password management while helping customers implement more recom
2423

2524
1. Review the recommended action at <https://security.microsoft.com/securescore?viewid=actions> to discover which of your domains have some (or all) compatible Windows devices that aren't protected by LAPS, or that haven't had their LAPS managed password changed in the last 60 days.
2625

27-
![See which domains have devices unprotected by LAPS.](media/cas-isp-laps-1.png)
28-
26+
[![Screenshot that shows which domains have devices unprotected by LAPS.](media/cas-isp-laps-1.png)](media/cas-isp-laps-1.png#lightbox)
27+
2928
1. For domains that are partially protected, select the relevant row to view the list of devices not protected by LAPS in that domain.
3029

3130
![Select domain with devices unprotected by LAPS.](media/cas-isp-laps-2.png)
32-
33-
> [!NOTE]
34-
> If the entire domain is not protected with LAPS, you won't see the list of all the unprotected devices.
35-
36-
1. Take appropriate action on those devices by downloading, installing and configuring or troubleshooting [Microsoft LAPS](https://go.microsoft.com/fwlink/?linkid=2104282) using the documentation provided in the download.
31+
32+
1. Take appropriate action on those devices by downloading, installing, and configuring or troubleshooting [Microsoft LAPS](https://go.microsoft.com/fwlink/?linkid=2104282) or [Windows LAPS](/windows-server/identity/laps/laps-overview).
3733

3834
![Remediate devices unprotected by LAPS.](media/laps-unprotected-devices.png)
3935

4036
> [!NOTE]
41-
> While assessments are updated in near real time, scores and statuses are updated every 24 hours. While the list of impacted entities is updated within a few minutes of your implementing the recommendations, the status may still take time until it's marked as **Completed**.
42-
>
37+
> While assessments are updated in near real time, scores and statuses are updated every 24 hours. While the list of impacted entities is updated within a few minutes of your implementing the recommendations, the status may still take time until it will be marked as **Completed**.
4338
4439
## See also
4540

4641
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
47-
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)
42+

ATPDocs/whats-new.md

Lines changed: 33 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,38 @@ For more information, see also:
2222

2323
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2424

25+
## February 2025
26+
27+
### New attack paths tab on the Identity profile page
28+
29+
This tab provides visibility into potential attack paths leading to a critical identity or involving it within the path, helping assess security risks. For more information, see [Overview of attack path within Exposure Management.](/security-exposure-management/work-attack-paths-overview)
30+
31+
Additional identity page enhancements:
32+
33+
- New side panel with more information for each entry on the user timeline.
34+
35+
- Filtering capabilities on the Devices tab under Observed in organization.
36+
37+
### Updating 'Protect and manage local admin passwords with Microsoft LAPS' posture recommendation
38+
39+
This update aligns the security posture assessment within Secure Score with the latest version of [Windows LAPS](/windows-server/identity/laps/laps-overview), ensuring it reflects current security best practices for managing local administrator passwords.
40+
41+
### New and updated events in the Advanced hunting IdentityDirectoryEvents table
42+
43+
We have added and updated the following events in the `IdentityDirectoryEvents` table in Advanced Hunting:
44+
45+
- User Account control flag has been changed
46+
47+
- Security group creation in Active directory
48+
49+
- Failed attempt to change an account password
50+
51+
- Successful account password change
52+
53+
- Account primary group ID has been changed
54+
55+
Additionally, the **built-in schema reference** for Advanced Hunting in Microsoft Defender XDR has been updated to include detailed information on all supported event types (**`ActionType`** values) in identity-related tables, ensuring complete visibility into available events. For more information, see [Advanced hunting schema details](/defender-xdr/advanced-hunting-schema-tables).
56+
2557
## December 2024
2658

2759
### New security posture assessment: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
@@ -443,7 +475,7 @@ This version includes the following improvements:
443475

444476
For more information, see [Download and schedule Defender for Identity reports in Microsoft Defender XDR (Preview)](reports.md).
445477

446-
- **Health issues**: Added the *The 'Remove learning period' toggle was automatically switched off for this tenant* health issue
478+
- **Health issues**: The 'Remove learning period' toggle was automatically switched off for this tenant* health issue.
447479

448480
This version also includes bug fixes for cloud services and the Defender for Identity sensor.
449481

CloudAppSecurityDocs/governance-actions.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,11 @@ The following governance actions can be taken for connected apps either on a spe
3434
- **Apply label** - Ability to add a Microsoft Purview Information Protection sensitivity label.
3535
- **Remove label** - Ability to remove a Microsoft Purview Information Protection sensitivity label.
3636
- **Change sharing**
37-
37+
3838
- **Remove public sharing** – Allow access only to named collaborators, for example: *Remove public access* for Google Workspace, and *Remove direct shared link* for Box and Dropbox.
3939

40-
- **Remove external users** – Allow access only to company users.
41-
40+
- **Remove external users** – Allow access only to company users. When a group, containing both internal and external members, is added as a collaborator, the action removes members at the group level instead of individually. 
41+
4242
- **Make private** – Only Site Admins can access the file, all shares are removed.
4343

4444
- **Remove a collaborator** – Remove a specific collaborator from the file.
@@ -60,7 +60,7 @@ The following governance actions can be taken for connected apps either on a spe
6060
- **Trash** – Move the file to the trash folder. (Box, Dropbox, Google Drive, OneDrive, SharePoint, Cisco Webex)
6161

6262
![policy_create alerts.](media/policy_create-alerts.png)
63-
63+
6464
## Malware governance actions (Preview)
6565

6666
The following governance actions can be taken for connected apps either on a specific file, user or from a specific policy. For security reasons, this list is limited only to malware related actions that don't imply risk for the user or the tenant.
@@ -104,7 +104,7 @@ The following governance actions can be taken for connected apps either on a spe
104104

105105
- **Governance actions in apps** - Granular actions can be enforced per app, specific actions vary depending on app terminology.
106106

107-
- **Suspend user** – Suspend the user from the application.
107+
- **Suspend user** – Suspend the user from the application.
108108
> [!NOTE]
109109
> If your Microsoft Entra ID is set to automatically sync with the users in your Active Directory on-premises environment the settings in the on-premises environment will override the Microsoft Entra settings and this governance action will be reverted.
110110
@@ -113,7 +113,7 @@ The following governance actions can be taken for connected apps either on a spe
113113
- **Confirm user compromised** - Set the user's risk level to high. This causes the relevant policy actions defined in Microsoft Entra ID to be enforced. For more information How Microsoft Entra ID works with risk levels, see [How does Microsoft Entra ID use my risk feedback](/azure/active-directory/identity-protection/howto-identity-protection-risk-feedback#how-does-azure-ad-use-my-risk-feedback).
114114

115115
![Defender for Cloud Apps activity policy governance actions.](media/activity-policy-ref6.png)
116-
116+
117117
## Revoke an OAuth app and notify user
118118

119119
For Google Workspace and Salesforce, it's possible to revoke permission to an OAuth app or to notify the user that they should change the permission. When you revoke permission it removes all permissions that were granted to the application under "Enterprise Applications" in Microsoft Entra ID.

0 commit comments

Comments
 (0)