Skip to content

Commit f733444

Browse files
authored
Merge branch 'main' into batamig-patch-4
2 parents 9a6e5bb + 7adb43f commit f733444

19 files changed

+248
-163
lines changed

ATPDocs/deploy/deploy-defender-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,10 +31,10 @@ Identify your architecture and your requirements, and then use the table below t
3131
> [!NOTE]
3232
> The Defender for Identity sensor version 3.x is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
3333
> The Defender for Identity sensor v3.x:
34-
> - Requires that Defender for Endpoint is deployed on your endpoints
34+
> - Requires that Defender for Endpoint is deployed
3535
> - Doesn't currently support VPN integration
3636
> - Doesn't currently support ExpressRoute
37-
> - Doesn't currently offer full functionality of health alerts, posture recommendations or security alerts
37+
> - Doesn't currently offer full functionality of health alerts, posture recommendations, security alerts or advanced hunting data.
3838
3939
Once you've evaluated your infrastructure and requirements, follow the instructions for deploying the sensor based on the version you need.
4040

ATPDocs/deploy/prerequisites-sensor-version-3.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@ This article describes the requirements for installing the Microsoft Defender fo
1414

1515
Before activating the Defender for Identity sensor v3.x, note that this version of the sensor is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
1616
The Defender for Identity sensor v3.x:
17-
- Requires that Defender for Endpoint is deployed on your endpoints
17+
- Requires that Defender for Endpoint is deployed
1818
- Doesn't currently support VPN integration
1919
- Doesn't currently support ExpressRoute
20-
- Doesn't currently offer full functionality of health alerts, posture recommendations or security alerts
20+
- Doesn't currently offer full functionality of health alerts, posture recommendations, security alerts or advanced hunting data.
2121

2222
## Licensing requirements
2323

ATPDocs/health-alerts.md

Lines changed: 32 additions & 32 deletions
Large diffs are not rendered by default.

ATPDocs/notifications.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
---
22
title: Microsoft Defender for Identity notifications
33
description: Learn how to use and configure Microsoft Defender for Identity notifications in Microsoft Defender XDR.
4-
ms.date: 09/03/2023
4+
ms.date: 07/10/2025
55
ms.topic: how-to
66
#CustomerIntent: As a Defender for Identity user, I want to learn how to work with Defender for Identity notifications to make sure I'm up to date about events detected by Defender for Identity.
77
ms.reviewer: LiorShapiraa
88
---
99

1010
# Defender for Identity notifications in Microsoft Defender XDR
1111

12+
>[!NOTE]
13+
>This feature is currently supported only by the Defender for Identity sensor version 2.x.
14+
1215
Microsoft Defender for Identity provides notifications for health issues and security alerts, either via email notifications or to a Syslog server.
1316

1417
This article describes how to configure Defender for Identity notifications so that you're aware of any health issues or security alerts detected.

ATPDocs/sensor-settings.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Manage and update sensors
33
description: Learn how to manage and update your Microsoft Defender for Identity sensors.
4-
ms.date: 01/29/2023
4+
ms.date: 07/10/2025
55
ms.topic: how-to
66
ms.reviewer: rlitinsky
77
---
@@ -104,6 +104,9 @@ The sensors page provides the following information about each sensor:
104104

105105
* Disabled
106106

107+
>[!NOTE]
108+
>This feature is supported only by the Defender for Identity sensor version 2.x.
109+
107110
* **Health status**: Displays the overall health status of the sensor with a colored icon representing the highest severity open health alert. Possible values are:
108111

109112
* **Healthy (green icon)**: No opened health issues
@@ -143,6 +146,8 @@ Defender for Identity sensors support two kinds of updates:
143146
> * Defender for Identity sensors always reserve at least 15% of the available memory and CPU available on the domain controller where it is installed. If the Defender for Identity service consumes too much memory, the service is automatically stopped and restarted by the Defender for Identity sensor updater service.
144147
145148
### Delayed sensor update
149+
>[!NOTE]
150+
>This feature is supported only by the Defender for Identity sensor version 2.x.
146151
147152
Given the rapid speed of ongoing Defender for Identity development and release updates, you may decide to define a subset group of your sensors as a delayed update ring, allowing for a gradual sensor update process. Defender for Identity enables you to choose how your sensors are updated and set each sensor as a **Delayed update** candidate.
148153

ATPDocs/uninstall-sensor.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Uninstall the sensor
33
description: This article describes how to uninstall the Microsoft Defender for Identity sensor from domain controllers.
4-
ms.date: 07/02/2025
4+
ms.date: 07/07/2025
55
ms.topic: how-to
66
ms.reviewer: rlitinsky
77
---
@@ -22,21 +22,24 @@ Deactivating Defender for Identity capabilities from your domain controller does
2222

2323
## Delete a sensor
2424

25+
### For sensor v3.x
2526
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Identities** > **Sensors**.
26-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
27+
2. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
2728

28-
![Screenshot that shows how to delete a sensor.](media/screenshot-that-shows-how-to-delete-a-sensor.png)
29+
:::image type="content" source="media/screenshot-that-shows-how-to-delete-a-sensor.png" alt-text="Screenshot that shows how to delete a sensor." lightbox="media/screenshot-that-shows-how-to-delete-a-sensor.png":::
2930

30-
## Uninstall a sensor v2.x from a domain controller
31+
>[!NOTE]
32+
>This action removes the v3.x sensor and stops monitoring on that domain controller.
3133
32-
The following steps describe how to uninstall a sensor v2.x from a domain controller.
33-
34-
1. Sign in to the domain controller with administrative privileges.
35-
1. From the Windows **Start** menu, select **Settings** > **Control Panel** > **Add/ Remove Programs**.
36-
1. Select the sensor installation, select **Uninstall**, and follow the instructions to remove the sensor.
34+
## Delete and uninstall a sensor v2.x from a domain controller
3735

3836
> [!IMPORTANT]
3937
> We recommend removing the sensor from the domain controller before demoting the domain controller.
38+
>
39+
1. Sign in to the domain controller with administrative privileges.
40+
2. From the Windows **Start** menu, select **Settings** > **Control Panel** > **Add/ Remove Programs**.
41+
3. Select the sensor installation, select **Uninstall**, and follow the instructions to remove the sensor.
42+
4. After uninstallation is complete, go to the Microsoft Defender portal > Settings > Identities > Sensors, select the domain controller, and choose Delete.
4043

4144
## Remove an orphaned sensor
4245

ATPDocs/vpn-integration.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
---
22
title: VPN integration | Microsoft Defender for Identity
33
description: Learn how to collect accounting information by integrating a VPN for Microsoft Defender for Identity in Microsoft Defender XDR.
4-
ms.date: 08/31/2023
4+
ms.date: 07/10/2025
55
ms.topic: how-to
66
#CustomerIntent: As a Defender for Identity user, I want to learn how to collect accounting information from VPN solutions.
77
ms.reviewer: martin77s
88
---
99

1010
# Defender for Identity VPN integration in Microsoft Defender XDR
1111

12+
>[!NOTE]
13+
>This feature is currently supported only by the Defender for Identity sensor version 2.x.
14+
1215
Microsoft Defender for Identity can integrate with your VPN solution by listening to RADIUS accounting events forwarded to Defender for Identity sensors, such as the IP addresses and locations where connections originated. VPN accounting data can help your investigations by providing more information about user activity, such as the locations from where computers are connecting to the network, and an extra detection for abnormal VPN connections.
1316

1417
Defender for Identity's VPN integration is based on standard RADIUS Accounting ([RFC 2866](https://tools.ietf.org/html/rfc2866)), and supports the following VPN vendors:

CloudAppSecurityDocs/anomaly-detection-policy.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -25,13 +25,6 @@ Anomalies are detected by scanning user activity. The risk is evaluated by looki
2525

2626
Based on the policy results, security alerts are triggered. Defender for Cloud Apps looks at every user session on your cloud and alerts you when something happens that is different from the baseline of your organization or from the user's regular activity.
2727

28-
In addition to native Defender for Cloud Apps alerts, you'll also get the following detection alerts based on information received from Microsoft Entra ID Protection:
29-
30-
* Leaked credentials: Triggered when a user's valid credentials have been leaked. For more information, see [Microsoft Entra ID's Leaked credentials detection](/azure/active-directory/identity-protection/concept-identity-protection-risks#user-risk).
31-
* Risky sign-in: Combines a number of Microsoft Entra ID Protection sign-in detections into a single detection. For more information, see [Microsoft Entra ID's Sign-in risk detections](/azure/active-directory/identity-protection/concept-identity-protection-risks#sign-in-risk).
32-
33-
These policies appear on the Defender for Cloud Apps policies page and can be enabled or disabled.
34-
3528
> [!IMPORTANT]
3629
> Starting June 2025, Microsoft Defender for Cloud Apps began transitioning anomaly detection policies to a dynamic threat detection model. This model automatically adapts detection logic to the evolving threat landscape, keeping detections current without manual configuration or policy updates. As part of these improvements to overall security, and to provide more accurate and timely alerts, several legacy policies have been disabled:
3730
>

CloudAppSecurityDocs/network-requirements.md

Lines changed: 22 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,23 @@ ms.topic: reference
88
# Network requirements
99

1010
>[!IMPORTANT]
11+
> **Important notice for GCC and Gov customers**
1112
>
12-
> **Take Immediate Action by April, 29 2025**, to ensure optimal service quality and prevent the interruption of some services. Update your firewall rules to allow outbound traffic on port 443 for the following IP addresses: 13.107.228.0/24, 13.107.229.0/24, 13.107.219.0/24, 13.107.227.0/24, 150.171.97.0/24. Alternatively, if you currently allow outbound traffic based on Azure service tags, please add the new Azure service tag, ‘AzureFrontDoor.MicrosoftSecurity’ to your allowlist. This tag will be adjusted to reflect the above range by April 28, 2025.
13-
> This change only affects commercial customers of Microsoft Defender for Cloud Apps. Customers connected to the Gov US1 or GCC datacenters won't be affected.
13+
> To prevent service disruption in Microsoft Defender for Cloud Apps, take immediate action by August 25, 2025.
14+
> Update your firewall configuration as follows:
15+
>
16+
> Allow outbound traffic on port 443 to the following IP ranges:
17+
>
18+
> - `51.54.53.136/29`
19+
> - `51.54.114.160/29`
20+
> - `62.11.173.176/29`
21+
>
22+
> If you use Azure service tags for outbound traffic, add the Azure Gov service tag `AzureFrontDoor.MicrosoftSecurity` tag to your firewall allowlist.
23+
>
24+
> Add the following endpoint to your firewall allowlist on port 443:
25+
> - `discoveryresources-cdn-prod.cloudappsecurity.com`
26+
>
27+
> For the full list of required IP addresses and DNS names, see [Portal access](network-requirements.md#portal-access).
1428
1529
This article provides a list of ports and IP addresses you need to allow and allowlist to work with Microsoft Defender for Cloud Apps.
1630

@@ -35,6 +49,8 @@ To see which data center you're connecting to, do the following steps:
3549
1. In the **About** screen, you can see the region and the data center.
3650

3751
![View your data center.](media/data-center.png)
52+
53+
3854

3955
## Portal access
4056

@@ -53,7 +69,6 @@ To use Defender for Cloud Apps in the Microsoft Defender Portal:
5369
static2.sharepointonline.com
5470
*.blob.core.windows.net
5571
discoveryresources-cdn-prod.cloudappsecurity.com
56-
discoveryresources-cdn-gov.cloudappsecurity.us
5772
```
5873

5974
1. Allow the following items based on your data center:
@@ -65,8 +80,8 @@ To use Defender for Cloud Apps in the Microsoft Defender Portal:
6580
|US3|13.107.219.0/24, 13.107.227.0/24, 13.107.228.0/24, 13.107.229.0/24, 150.171.97.0/24, 13.80.125.22, 40.74.1.235, 40.74.6.204, 40.90.218.196, 40.90.218.198, 51.143.58.207, 52.137.89.147, 52.183.75.62, 20.3.226.231, 4.255.218.227|*.us3.portal.cloudappsecurity.com|
6681
|EU1|13.107.219.0/24, 13.107.227.0/24, 13.107.228.0/24, 13.107.229.0/24, 150.171.97.0/24, 13.80.125.22, 40.74.1.235, 40.74.6.204, 40.119.154.72, 51.143.58.207, 52.137.89.147, 52.157.238.58, 52.174.56.180, 52.183.75.62, 20.71.203.39, 137.116.224.49|\*.eu.portal.cloudappsecurity.com|
6782
|EU2|13.107.219.0/24, 13.107.227.0/24, 13.107.228.0/24, 13.107.229.0/24, 150.171.97.0/24, 13.80.125.22, 40.74.1.235, 40.74.6.204, 40.81.156.154, 40.81.156.156, 51.143.58.207, 52.137.89.147, 52.183.75.62, 20.0.210.84, 20.90.9.64|*.eu2.portal.cloudappsecurity.com|
68-
|Gov US1|13.72.19.4, 52.227.143.223|*.us1.portal.cloudappsecurity.us|
69-
|GCC| 52.227.23.181, 52.227.180.126| *.us1.portal.cloudappsecuritygov.com |
83+
|Gov US1|13.72.19.4, 52.227.143.223, 51.54.53.136/29, 51.54.114.160/29, 62.11.173.176/29|*.us1.portal.cloudappsecurity.us|
84+
|GCC| 52.227.23.181, 52.227.180.126, 51.54.53.136/29, 51.54.114.160/29, 62.11.173.176/29|*.us1.portal.cloudappsecuritygov.com|
7085

7186
> [!NOTE]
7287
> For portal access, instead of a wildcard (\*), you can choose to open only your specific tenant URL. For example, based on the screenshot above you can open: `contoso.us.portal.cloudappsecurity.com`. To determine your tenant URL, see the earlier section [View your data center](#view-your-data-center), and look for **API URL**.
@@ -151,8 +166,8 @@ To enable Defender for Cloud Apps to connect to your SIEM, add **outbound port 4
151166
|US3|13.107.219.0/24, 13.107.227.0/24, 13.107.228.0/24, 13.107.229.0/24, 150.171.97.0/24, 13.80.125.22, 40.74.1.235, 40.74.6.204, 40.90.218.196, 40.90.218.198, 51.143.58.207, 52.137.89.147, 52.183.75.62, 20.3.226.231, 4.255.218.227|
152167
|EU1|13.107.219.0/24, 13.107.227.0/24, 13.107.228.0/24, 13.107.229.0/24, 150.171.97.0/24, 13.80.125.22, 40.74.1.235, 40.74.6.204, 40.119.154.72, 51.143.58.207, 52.137.89.147, 52.157.238.58, 52.174.56.180, 52.183.75.62, 20.71.203.39, 137.116.224.49|
153168
|EU2|13.107.219.0/24, 13.107.227.0/24, 13.107.228.0/24, 13.107.229.0/24, 150.171.97.0/24, 13.80.125.22, 40.74.1.235, 40.74.6.204, 40.81.156.154, 40.81.156.156, 51.143.58.207, 52.137.89.147, 52.183.75.62, 20.0.210.84, 20.90.9.64|
154-
|Gov US1|13.72.19.4, 52.227.143.223|
155-
|GCC| 52.227.23.181, 52.227.180.126|
169+
|Gov US1|13.72.19.4, 52.227.143.223, 51.54.53.136/29, 51.54.114.160/29, 62.11.173.176/29 |
170+
|GCC| 52.227.23.181, 52.227.180.126, 51.54.53.136/29, 51.54.114.160/29, 62.11.173.176/29|
156171

157172
> [!NOTE]
158173
>

0 commit comments

Comments
 (0)