Skip to content

Commit f1ba4fe

Browse files
authored
Merge pull request #3068 from MicrosoftDocs/main
Published main to live, Monday 5:00 PM IST, 03/10
2 parents 45a7989 + fcf30d0 commit f1ba4fe

File tree

6 files changed

+118
-96
lines changed

6 files changed

+118
-96
lines changed

ATPDocs/security-assessment.md

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,13 @@ ms.topic: how-to
99

1010
Typically, organizations of all sizes have limited visibility into whether or not their on-premises apps and services could introduce a security vulnerability to their organization. The problem of limited visibility is especially true regarding use of unsupported or outdated components.
1111

12-
While your company may invest significant time and effort on hardening identities and identity infrastructure (such as Active Directory, Active Directory Connect) as an on-going project, it's easy to remain unaware of common misconfigurations and use of legacy components that represent one of the greatest threat risks to your organization.
12+
While your company might invest significant time and effort on hardening identities and identity infrastructure (such as Active Directory, Active Directory Connect) as an ongoing project, it's easy to remain unaware of common misconfigurations and use of legacy components that represent one of the greatest threat risks to your organization.
1313

1414
Microsoft security research reveals that most identity attacks utilize common misconfigurations in Active Directory and continued use of legacy components (such as NTLMv1 protocol) to compromise identities and successfully breach your organization. To combat this effectively, Microsoft Defender for Identity now offers proactive identity security posture assessments to detect and recommend actions across your on-premises Active Directory configurations.
1515

1616
## What do Defender for Identity security assessments provide?
1717

18-
Defender for Identity's security posture assessments are available in [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score), and provide:
18+
Defender for Identity security posture assessments are available in [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score), and provide:
1919

2020
- **Detections and contextual data** on known exploitable components and misconfigurations, along with relevant paths for remediation.
2121

@@ -25,11 +25,21 @@ Defender for Identity's security posture assessments are available in [Microsoft
2525

2626
Microsoft Secure Score is a measurement of an organization's security posture, with a higher number indicating more recommended actions taken. It can be found at <https://security.microsoft.com/securescore> in the [Microsoft Defender portal](/microsoft-365/security/defender/microsoft-365-defender).
2727

28+
### Categorization of Defender for Identity security posture assessments
29+
30+
Defender for Identity security posture assessments have five key categories. Each category addresses specific identity security risks and provides remediation guidance.
31+
32+
- **Hybrid security**: Identifies misconfigurations in environments that integrate on-premises (e.g., Active Directory) and cloud-based identity providers (e.g., Entra ID, Okta). Assesses risks related to synchronization, authentication, and authorization across platforms.
33+
- **Identity infrastructure**: Detects misconfigurations and vulnerabilities in core identity components, including domain controllers.
34+
- **Certificates**: Assesses Active Directory Certificate Services (AD CS) for security gaps, such as misconfigured certificate templates or weak certificate authority settings. Identifying and addressing these issues helps prevent unauthorized access that could arise from certificate-related vulnerabilities.
35+
- **Group policy**: Analyzes Group Policy configurations to identify settings that might allow privilege escalation or unauthorized lateral movement within the network. Ensuring secure Group Policy settings helps maintain proper access controls and system configurations.
36+
- **Accounts**: Reviews users, devices, and groups to pinpoint security risks such as weak passwords, inactive accounts, or improper permissions.
37+
2838
## Access Defender for Identity security posture assessments
2939

40+
> [!NOTE]
3041
You must have a Defender for Identity license to view Defender for Identity security posture assessments in Microsoft Secure Score.
31-
32-
While *certificate template* assessments are available to all customers that have AD CS installed on their environment, *certificate authority* assessments are available only to customers who've installed a sensor on an AD CS server. For more information, see [Configuring sensors for AD FS and AD CS](deploy/active-directory-federation-services.md).
42+
While *certificate template* assessments are available to all customers with AD CS installed in their environment, *certificate authority* assessments are available only to customers who have installed a sensor on an AD CS server. For more information, see [Configuring sensors for AD FS and AD CS](deploy/active-directory-federation-services.md).
3343

3444
**To access identity security posture assessments**:
3545

ATPDocs/toc.yml

Lines changed: 86 additions & 82 deletions
Original file line numberDiff line numberDiff line change
@@ -158,88 +158,92 @@ items:
158158
href: remediation-actions.md
159159
- name: Security posture
160160
items:
161-
- name: Accounts with non-default Primary Group ID
162-
href: accounts-with-non-default-pgid.md
163-
- name: Built-in Active Directory Guest account is enabled
164-
href: built-in-active-directory-guest-account-is-enabled.md
165-
- name: Ensure privileged accounts are not delegated
166-
href: ensure-privileged-accounts-with-sensitive-flag.md
167-
- name: Change Domain Controller computer account old password
168-
href: domain-controller-account-password-change.md
169-
- name: Change password of built-in domain Administrator account
170-
href: change-password-domain-administrator-account.md
171-
- name: GPO assigns unprivileged identities to local groups with elevated privileges
172-
href: gpo-assigns-unprivileged-identities.md
173-
- name: Overview
174-
href: security-assessment.md
175-
displayName: security posture, security assessment
176-
- name: Reversible passwords found in GPOs
177-
href: reversible-passwords-group-policy.md
178-
- name: GPO can be modified by unprivileged accounts
179-
href: modified-unprivileged-accounts-gpo.md
180-
- name: Change password for krbtgt account
181-
href: change-password-krbtgt-account.md
182-
- name: Unsafe permissions on the DnsAdmins group
183-
href: unsafe-permissions-dns-admins-group.md
184-
- name: Change password for Microsoft Entra seamless SSO account
185-
href: change-password-microsoft-entra-seamless-single-sign-on.md
186-
displayName: Microsoft Entra connect
187-
- name: "Rotate password for Microsoft Entra Connect connector account "
188-
href: rotate-password-microsoft-entra-connect.md
189-
displayName: Microsoft Entra Connect
190-
- name: Admin SDHolder permissions
191-
href: security-assessment-remove-suspicious-access-rights.md
192-
- name: DCSync permissions
193-
href: security-assessment-non-admin-accounts-dcsync.md
194-
- name: Deploy Defender for Identity
195-
href: security-assessment-deploy-defender-for-identity.md
196-
- name: Domain controllers with Print spooler service available assessment
197-
href: security-assessment-print-spooler.md
198-
- name: Dormant entities in sensitive groups assessment
199-
href: security-assessment-dormant-entities.md
200-
- name: Enforce encryption for RPC certificate enrollment interface (ESC8)
201-
href: security-assessment-enforce-encryption-rpc.md
202-
- name: Entities exposing credentials in clear text assessment
203-
href: security-assessment-clear-text.md
204-
- name: Remove unnecessary replication permissions for Microsoft Entra Connect connector account
205-
href: remove-replication-permissions-microsoft-entra-connect.md
206-
displayName: Microsoft Entra Connect
207-
- name: Insecure ADCS certificate enrollment IIS endpoints (ESC8)
208-
href: security-assessment-insecure-adcs-certificate-enrollment.md
209-
- name: LAPS usage assessment
210-
href: security-assessment-laps.md
211-
- name: Misconfigured Certificate Authority ACL (ESC7)
212-
href: security-assessment-edit-misconfigured-ca-acl.md
213-
- name: Misconfigured certificate templates ACL (ESC4)
214-
href: security-assessment-edit-misconfigured-acl.md
215-
- name: Misconfigured certificate templates owner (ESC4)
216-
href: security-assessment-edit-misconfigured-owner.md
217-
- name: Misconfigured enrollment agent certificate template (ESC3)
218-
href: security-assessment-edit-misconfigured-enrollment-agent.md
219-
- name: Overly permissive certificate template with privileged EKU (ESC2)
220-
href: security-assessment-edit-overly-permissive-template.md
221-
- name: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
222-
href: prevent-certificate-enrollment-esc15.md
223-
- name: Prevent requests for certificates valid for arbitrary users (ESC1)
224-
href: security-assessment-prevent-users-request-certificate.md
225-
- name: Remove local admins on identity assets
226-
href: security-assessment-remove-local-admins.md
227-
- name: Riskiest lateral movement paths
228-
href: security-assessment-riskiest-lmp.md
229-
- name: Unmonitored domain controllers
230-
href: security-assessment-unmonitored-domain-controller.md
231-
- name: Unsecure account attributes
232-
href: security-assessment-unsecure-account-attributes.md
233-
- name: Unsecure domain configurations
234-
href: security-assessment-unsecure-domain-configurations.md
235-
- name: Unsecure Kerberos delegation assessment
236-
href: security-assessment-unconstrained-kerberos.md
237-
- name: Unsecure SID History attributes
238-
href: security-assessment-unsecure-sid-history-attribute.md
239-
- name: Vulnerable Certificate Authority setting (ESC6)
240-
href: security-assessment-edit-vulnerable-ca-setting.md
241-
- name: Weak cipher usage assessment
242-
href: security-assessment-weak-cipher.md
161+
- name: Overview
162+
href: security-assessment.md
163+
- name: Hybrid security
164+
items:
165+
- name: Change password for Microsoft Entra seamless SSO account
166+
href: change-password-microsoft-entra-seamless-single-sign-on.md
167+
displayName: Microsoft Entra connect
168+
- name: Rotate password for Microsoft Entra Connect connector account
169+
href: rotate-password-microsoft-entra-connect.md
170+
displayName: Microsoft Entra Connect
171+
- name: Remove unnecessary replication permissions for Microsoft Entra Connect connector account
172+
href: remove-replication-permissions-microsoft-entra-connect.md
173+
- name: Identity infrastructure
174+
items:
175+
- name: Built-in Active Directory Guest account is enabled
176+
href: built-in-active-directory-guest-account-is-enabled.md
177+
- name: Change Domain Controller computer account old password
178+
href: domain-controller-account-password-change.md
179+
- name: Domain controllers with Print spooler service available assessment
180+
href: security-assessment-print-spooler.md
181+
- name: Remove local admins on identity assets
182+
href: security-assessment-remove-local-admins.md
183+
- name: Unmonitored domain controllers
184+
href: security-assessment-unmonitored-domain-controller.md
185+
- name: Unsecure domain configurations
186+
href: security-assessment-unsecure-domain-configurations.md
187+
- name: Certificates
188+
items:
189+
- name: Enforce encryption for RPC certificate enrollment interface (ESC8)
190+
href: security-assessment-enforce-encryption-rpc.md
191+
- name: Insecure ADCS certificate enrollment IIS endpoints (ESC8)
192+
href: security-assessment-insecure-adcs-certificate-enrollment.md
193+
- name: Misconfigured certificate templates owner (ESC4)
194+
href: security-assessment-edit-misconfigured-owner.md
195+
- name: Misconfigured Certificate Authority ACL (ESC7)
196+
href: security-assessment-edit-misconfigured-ca-acl.md
197+
- name: Misconfigured certificate templates ACL (ESC4)
198+
href: security-assessment-edit-misconfigured-acl.md
199+
- name: Misconfigured enrollment agent certificate template (ESC3)
200+
href: security-assessment-edit-misconfigured-enrollment-agent.md
201+
- name: Overly permissive certificate template with privileged EKU (ESC2)
202+
href: security-assessment-edit-overly-permissive-template.md
203+
- name: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
204+
href: prevent-certificate-enrollment-esc15.md
205+
- name: Prevent requests for certificates valid for arbitrary users (ESC1)
206+
href: security-assessment-prevent-users-request-certificate.md
207+
- name: Vulnerable Certificate Authority setting (ESC6)
208+
href: security-assessment-edit-vulnerable-ca-setting.md
209+
- name: Group policy
210+
items:
211+
- name: GPO assigns unprivileged identities to local groups with elevated privileges
212+
href: gpo-assigns-unprivileged-identities.md
213+
- name: GPO can be modified by unprivileged accounts
214+
href: modified-unprivileged-accounts-gpo.md
215+
- name: Reversible passwords found in GPOs
216+
href: reversible-passwords-group-policy.md
217+
- name: Accounts
218+
items:
219+
- name: Accounts with non-default Primary Group ID
220+
href: accounts-with-non-default-pgid.md
221+
- name: Admin SDHolder permissions
222+
href: security-assessment-remove-suspicious-access-rights.md
223+
- name: Change password for krbtgt account
224+
href: change-password-krbtgt-account.md
225+
- name: Change password of built-in domain Administrator account
226+
href: change-password-domain-administrator-account.md
227+
- name: Dormant entities in sensitive groups assessment
228+
href: security-assessment-dormant-entities.md
229+
- name: DCSync permissions
230+
href: security-assessment-non-admin-accounts-dcsync.md
231+
- name: Ensure privileged accounts are not delegated
232+
href: ensure-privileged-accounts-with-sensitive-flag.md
233+
- name: Entities exposing credentials in clear text assessment
234+
href: security-assessment-clear-text.md
235+
- name: LAPS usage assessment
236+
href: security-assessment-laps.md
237+
- name: Riskiest lateral movement paths
238+
href: security-assessment-riskiest-lmp.md
239+
- name: Unsecure Kerberos delegation assessment
240+
href: security-assessment-unconstrained-kerberos.md
241+
- name: Unsecure SID History attributes
242+
href: security-assessment-unsecure-sid-history-attribute.md
243+
- name: Unsecure account attributes
244+
href: security-assessment-unsecure-account-attributes.md
245+
- name: Weak cipher usage assessment
246+
href: security-assessment-weak-cipher.md
243247
- name: Reference
244248
items:
245249
- name: Operations guide

ATPDocs/whats-new.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,7 @@ For updates about versions and features released six months ago or earlier, see
2525
## March 2025
2626

2727
### New LDAP query events added to the IdentityQueryEvents table in Advanced Hunting
28-
New LDAP query events will be added by March 6th to the `IdentityQueryEvents` table in Advanced Hunting to provide more visibility into additional LDAP search queries running in the customer environment.
29-
This update may lead to an increase in activity within the Advanced Hunting IdentityQueryEvents table for LDAP queries. If you have custom detections related to these queries, you may see a higher number of triggered alerts.
30-
We recommend that you review your existing custom detections to ensure they align with your objectives. If needed, you can adjust your query accordingly.
28+
New LDAP query events were added to the `IdentityQueryEvents` table in Advanced Hunting to provide more visibility into additional LDAP search queries running in the customer environment.
3129

3230
## February 2025
3331

defender-xdr/security-copilot-in-microsoft-365-defender.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 11/18/2024
21+
ms.date: 03/10/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
@@ -42,11 +42,15 @@ If you're new to Security Copilot, you should familiarize yourself with it by re
4242
- [Get started with Security Copilot](/security-copilot/get-started-security-copilot)
4343
- [Understand authentication in Security Copilot](/security-copilot/authentication)
4444
- [Prompting in Security Copilot](/security-copilot/prompting-security-copilot)
45+
- [Responsible AI](/copilot/security/responsible-ai-overview-security-copilot)
46+
- [FAQs on Responsible AI](/copilot/security/rai-faqs-security-copilot)
4547

4648
## Microsoft Copilot integration in Microsoft Defender
4749

4850
[Microsoft Security Copilot](/security-copilot/microsoft-security-copilot) brings together the power of AI and human expertise to help security teams respond to attacks faster and more effectively. Security Copilot is embedded in the Microsoft Defender portal to help provide security teams with enhanced capabilities to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence. Copilot in Defender is available to users who have provisioned access to Security Copilot.
4951

52+
Furthermore, Security Copilot operates using [Microsoft's AI principles](https://www.microsoft.com/ai/responsible-ai). To know more, see the [Security Copilot Responsible AI FAQs](/copilot/security/rai-faqs-security-copilot).
53+
5054
## Key features
5155

5256
### Investigate and respond to incidents like an expert

unified-secops-platform/cases-overview.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -49,13 +49,13 @@ Case management is available in the Defender portal, and to use it, you must hav
4949

5050
For more information, see [Connect Microsoft Sentinel to the Defender portal](microsoft-sentinel-onboard.md).
5151

52-
Use this table to plan your RBAC of case management:
52+
Use Defender XDR unified RBAC or Microsoft Sentinel roles to grant access to case management features.
5353

54-
| Cases feature | Minimum permissions required in Microsoft Defender XDR Unified RBAC |
55-
|---|---|
56-
| View only</br>- case queue</br>- case details</br>- tasks</br>- comments</br>- case audits | Security operations > Security data basics (read)|
57-
| Create and Manage</br>- cases and case tasks</br>- assign</br>- update status</br>- link and unlink incidents | Security operations > Alerts (manage)|
58-
| Customize case status options | Authorization and setting > Core Security settings (manage)|
54+
| Cases feature | Microsoft Defender XDR Unified RBAC | Microsoft Sentinel role |
55+
|---|---|---|
56+
| View only</br>- case queue</br>- case details</br>- tasks</br>- comments</br>- case audits | Security operations > Security data basics (read)| Microsoft Sentinel Reader |
57+
| Create and Manage</br>- cases and case tasks</br>- assign</br>- update status</br>- link and unlink incidents | Security operations > Alerts (manage)</br>**or**</br>Security operations > Response (manage) | Microsoft Sentinel Responder |
58+
| Customize case status options | Authorization and setting > Core Security settings (manage)| Microsoft Sentinel Contributor |
5959

6060
For more information, see [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac).
6161

@@ -65,6 +65,8 @@ To start using case management, select **Cases** in the Defender portal to acces
6565

6666
:::image type="content" source="media/cases-overview/cases-queue-view.png" alt-text="Screenshot of case queue.":::
6767

68+
The maximum allowed per tenant is 100,000 cases.
69+
6870
## Case details
6971

7072
Each case has a page which allows analysts to manage the case and displays important details.
@@ -112,6 +114,8 @@ Alternatively, if the IR team needs to escalate one or more incidents to the hun
112114

113115
:::image type="content" source="media/cases-overview/link-incident-from-incident-graph.png" alt-text="Screenshot showing the link incident option from ellipses menu in the incident view.":::
114116

117+
Each case has a threshold of 100 linked incidents.
118+
115119
### Activity log
116120

117121
Need to write down notes, or that key detection logic to pass along? Create plain text comments and review the audit events in the activity log. Comments are a great place to quickly add information to a case.

unified-secops-platform/microsoft-sentinel-onboard.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ ms.collection:
1515
- highpri
1616
- tier1
1717
- usx-security
18+
- zerotrust-solution
19+
- msftsolution-secops
1820
ms.topic: how-to
1921
search.appverid:
2022
- MOE150

0 commit comments

Comments
 (0)