Skip to content

Commit f7335ce

Browse files
committed
Merge branch 'main' into mdav-release
2 parents 3052a4d + 7384b77 commit f7335ce

File tree

261 files changed

+1631
-1036
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

261 files changed

+1631
-1036
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 6 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,12 @@ ms.topic: how-to
77

88
# Activate Microsoft Defender for Identity capabilities directly on a domain controller
99

10-
Microsoft Defender for Endpoint customers, who've already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
10+
Microsoft Defender for Endpoint customers, who have already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a [Microsoft Defender for Identity sensor](deploy-defender-identity.md).
1111

1212
This article describes how to activate and test Microsoft Defender for Identity capabilities on your domain controller.
1313

1414
> [!IMPORTANT]
15-
> Information in this article relates to a feature that is currently in limited availablility for a select set of use cases. If you weren't directed to use the Defender for Identity **Activation** page, use our [main deployment guide](deploy-defender-identity.md) instead.
16-
>
15+
> Information in this article relates to a feature that is currently in limited availability for a select set of use cases. If you weren't directed to use the Defender for Identity **Activation** page, use our [main deployment guide](deploy-defender-identity.md) instead.
1716
1817
## Prerequisites
1918

@@ -122,7 +121,7 @@ In the Defender portal, check for the following details:
122121

123122
- **Device entities**: Select **Assets > Devices**, and select the machine for your new sensor. Defender for Identity events are shown on the device timeline.
124123

125-
- **User entities**. Select **Assets > Users** and check for users from a newly onboarded domain. Alternately, use the global search option to search for specific users. User details pages should include **Overview**, **Observed in organization**, and **Timeline** data.
124+
- **User entities**: Select **Assets > Users** and check for users from a newly onboarded domain. Alternately, use the global search option to search for specific users. User details pages should include **Overview**, **Observed in organization**, and **Timeline** data.
126125

127126
- **Group entities**: Use the global search to find a user group, or pivot from a user or device details page where group details are shown. Check for details of group membership, view group users, and group timeline data.
128127

@@ -148,16 +147,7 @@ IdentityQueryEvents
148147
For more information, see [Advanced hunting in the Microsoft Defender portal](/microsoft-365/security/defender/advanced-hunting-microsoft-defender).
149148

150149

151-
### Test Identity Security Posture Management (ISPM) recommendations
152-
153-
Defender for Identity capabilities on domain controllers support the following ISPM assessments:
154-
155-
- [**Install Defender for Identity Sensor on all Domain Controllers**](../security-assessment-unmonitored-domain-controller.md)
156-
- [**Microsoft LAPS usage**](../security-assessment-laps.md)
157-
- [**Resolve unsecure domain configurations**](../security-assessment-unsecure-domain-configurations.md)
158-
- **Set a honeytoken account**
159-
- [**Unsecure account attributes**](../security-assessment-unsecure-account-attributes.md)
160-
- [**Unsecure SID History attributes**](../security-assessment-unsecure-sid-history-attribute.md)
150+
## Test Identity Security Posture Management (ISPM) recommendations
161151

162152
We recommend simulating risky behavior in a test environment to trigger supported assessments and verify that they appear as expected. For example:
163153

@@ -187,37 +177,6 @@ For more information, see [Microsoft Defender for Identity's security posture as
187177
188178
### Test alert functionality
189179
190-
The following alerts are supported by Defender for Identity capabilities on domain controllers:
191-
192-
:::row:::
193-
:::column span="":::
194-
- [Account enumeration reconnaissance](../reconnaissance-discovery-alerts.md#account-enumeration-reconnaissance-external-id-2003)
195-
- [Active Directory attributes Reconnaissance using LDAP](../reconnaissance-discovery-alerts.md#active-directory-attributes-reconnaissance-ldap-external-id-2210)
196-
- [Exchange Server Remote Code Execution (CVE-2021-26855)](../lateral-movement-alerts.md#exchange-server-remote-code-execution-cve-2021-26855-external-id-2414)
197-
- [Honeytoken user attributes modified](../persistence-privilege-escalation-alerts.md#honeytoken-user-attributes-modified-external-id-2427)
198-
- [Honeytoken was queried via LDAP](../reconnaissance-discovery-alerts.md#honeytoken-was-queried-via-ldap-external-id-2429)
199-
- [Honeytoken authentication activity](../credential-access-alerts.md#honeytoken-authentication-activity-external-id-2014)
200-
- [Honeytoken group membership changed](../persistence-privilege-escalation-alerts.md#honeytoken-group-membership-changed-external-id-2428)
201-
- [Remote code execution attempt](../other-alerts.md#remote-code-execution-attempt-external-id-2019)
202-
- [Security principal reconnaissance (LDAP)](../credential-access-alerts.md#security-principal-reconnaissance-ldap-external-id-2038)
203-
- [Suspicious service creation](../other-alerts.md#suspicious-service-creation-external-id-2026)
204-
- [Suspected NTLM relay attack (Exchange account)](../lateral-movement-alerts.md#suspected-ntlm-relay-attack-exchange-account-external-id-2037)
205-
:::column-end:::
206-
:::column span="":::
207-
- [Suspicious modification of the Resource Based Constrained Delegation attribute by a machine account](../persistence-privilege-escalation-alerts.md#suspicious-modification-of-the-resource-based-constrained-delegation-attribute-by-a-machine-account--external-id-2423)
208-
- [Suspicious additions to sensitive groups](../persistence-privilege-escalation-alerts.md#suspicious-additions-to-sensitive-groups-external-id-2024)
209-
- [Suspicious modification of a dNSHostName attribute (CVE-2022-26923)](../persistence-privilege-escalation-alerts.md#suspicious-modification-of-a-dnshostname-attribute-cve-2022-26923--external-id-2421)
210-
- [Suspicious modification of a sAMNameAccount attribute (CVE-2021-42278 and CVE-2021-42287)](../credential-access-alerts.md#suspicious-modification-of-a-samnameaccount-attribute-cve-2021-42278-and-cve-2021-42287-exploitation-external-id-2419)
211-
- [Suspected DCShadow attack (domain controller promotion)](../other-alerts.md#suspected-dcshadow-attack-domain-controller-promotion-external-id-2028)
212-
- [Suspected DFSCoerce attack using Distributed File System Protocol](../credential-access-alerts.md#suspected-dfscoerce-attack-using-distributed-file-system-protocol-external-id-2426) 
213-
- [Suspected DCShadow attack (domain controller replication request)](../other-alerts.md#suspected-dcshadow-attack-domain-controller-replication-request-external-id-2029)
214-
- [Suspected account takeover using shadow credentials](../credential-access-alerts.md#suspected-account-takeover-using-shadow-credentials-external-id-2431)
215-
- [Suspected SID-History injection](../persistence-privilege-escalation-alerts.md#suspected-sid-history-injection-external-id-1106)
216-
- [Suspected AD FS DKM key read](../credential-access-alerts.md#suspected-ad-fs-dkm-key-read-external-id-2413)
217-
:::column-end:::
218-
:::row-end:::
219-
220-
221180
Test alert functionality by simulating risky activity in a test environment. For example:
222181
223182
- Tag an account as a honeytoken account, and then try signing in to the honeytoken account against the activated domain controller.
@@ -232,16 +191,12 @@ Test remediation actions on a test user. For example:
232191
233192
1. In the Defender portal, go to the user details page for a test user.
234193
235-
1. From the options menu, select any or all of the following, one at a time:
236-
237-
- **Disable user in AD**
238-
- **Enable user in AD**
239-
- **Force password reset**
194+
1. From the **Options** menu, select any of the available remediation actions.
240195
241196
1. Check Active Directory for the expected activity.
242197
243198
> [!NOTE]
244-
> The current version does not collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
199+
> The current version doesn't collect the User Account Control (UAC) flags correctly. So disabled users, would still appear as Enabled in the portal.
245200
246201
247202
For more information, see [Remediation actions in Microsoft Defender for Identity](../remediation-actions.md).

CloudAppSecurityDocs/release-notes.md

Lines changed: 48 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,50 @@ For more information on what's new with other Microsoft Defender security produc
1919

2020
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
2121

22+
## February 2025
23+
24+
### Enhanced alert source accuracy
25+
26+
Microsoft Defender for Cloud Apps is enhancing its alert sources to deliver more precise information. This update, applicable to new alerts only, will be reflected across various experiences and APIs, including the Defender XDR portal, Advanced hunting, and Graph API.
27+
The goal is to improve the accuracy of alert origins, facilitating better identification, management, and response to alerts.
28+
29+
To learn more about the different alert sources in Defender XDR see the _Alert sources_ section of [Investigate alerts in Microsoft Defender XDR - Microsoft Defender XDR | Microsoft Learn](/defender-xdr/investigate-alerts?tabs=settings)
30+
31+
To learn more about the Graph API alert resource: [alert resource type - Microsoft Graph v1.0 | Microsoft Learn](/graph/api/resources/security-alert?view=graph-rest-1.0)
32+
33+
### Network requirement updates
34+
35+
Due to improvements being made to Microsoft Defender for Cloud Apps to improve security and performance, you must update network information in your system's firewall and additional third-party services. Make these changes by March 16, 2025 to ensure uninterrupted access to our services:
36+
37+
- Update your firewall rules to allow outbound traffic on port 443 to the following new CDN (Content Delivery Network) endpoints before March 16, 2025:
38+
39+
- cdn.cloudappsecurity.com
40+
- cdn-discovery.cloudappsecurity.com
41+
42+
- All required outbound access URLs can also be found in Defender for Cloud Apps network requirements page under 'Portal Access'.
43+
44+
- To use Defender for Cloud Apps in the Microsoft Defender portal, make sure you add outbound port 443 for all IP addresses and DNS names listed in our documentation to your firewall's allowlist.
45+
46+
- To connect to third-party apps, enable Defender for Cloud Apps to connect from the following IP addresses, also available in our documentation:
47+
48+
- **US1**: - 23.101.201.123 - 20.228.186.154
49+
50+
- **US2**: - 20.15.114.156 - 172.202.90.196
51+
52+
- **US3**: - 20.3.226.231 - 4.255.218.227
53+
54+
- **EU1**: - 20.71.203.39 - 137.116.224.49
55+
56+
- **EU2**: - 20.0.210.84 - 20.90.9.64
57+
58+
- To stay up to date on IP ranges that impact the experiences in Microsoft Defender for Cloud Apps in the areas of portal experience access, access and session controls, SIEM agent connection, app connectors, mail servers, and log collector, we recommend using the Azure service tag for Microsoft Defender for Cloud Apps services, and 'MicrosoftCloudAppSecurity.' The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](/azure/virtual-network/service-tags-overview).
59+
2260
## November 2024
2361

2462
### Internal Session Controls application notice
25-
The Enterprise application “Microsoft Defender for Cloud Apps – Session Controls” is used internally by the Conditional Access App Control service.
26-
Please ensure there is no CA policy restricting access to this application.
63+
64+
The Enterprise application 'Microsoft Defender for Cloud Apps – Session Controls' is used internally by the Conditional Access App Control service.
65+
Ensure there's no CA policy restricting access to this application.
2766
For policies that restrict all or certain applications, please ensure this application is listed as an exception or confirm that the blocking policy is deliberate.
2867

2968
For more information, see [Sample: Create Microsoft Entra ID Conditional Access policies for use with Defender for Cloud Apps](session-policy-aad.md#sample-create-microsoft-entra-id-conditional-access-policies-for-use-with-defender-for-cloud-apps).
@@ -73,13 +112,13 @@ For more information, see [OAuth app data usage insights on app governance](/def
73112
### New anomaly data in advanced hunting CloudAppEvents table
74113

75114
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal, can now utilize the new *LastSeenForUser* and *UncommonForUser* columns for queries and detections rules.
76-
The new columns are designed to assist you to better __identify uncommon activities__ that may appear suspicious, and allow you to create more accurate custom detections, as well as investigate any suspicious activities that arise.
115+
The new columns are designed to assist you to better __identify uncommon activities__ that may appear suspicious, and allow you to create more accurate custom detections, as well as investigate any suspicious activities that arise.
77116

78117
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
79118

80119
### New Conditional Access app control / inline data in advanced hunting CloudAppEvents table
81120

82-
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *AuditSource* and *SessionData* columns for queries and detection rules.
121+
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *AuditSource* and *SessionData* columns for queries and detection rules.
83122
Using this data allows for queries that consider specific audit sources, including access and session control, and queries by specific inline sessions.
84123

85124
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
@@ -100,8 +139,7 @@ Administrators who understand the power of Edge in-browser protection, can now r
100139

101140
A primary reason is security, since the barrier to circumventing session controls using Edge is much higher than with reverse proxy technology.
102141

103-
For more information see:
104-
[Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps)
142+
For more information, see [Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps).
105143

106144
### Connect Mural to Defender for Cloud Apps (Preview)
107145

@@ -140,7 +178,7 @@ Use the feedback mechanisms at the top and bottom of each documentation page to
140178

141179
### Large scale export of Activity logs (Preview)
142180

143-
A new user experience dedicated to providing users the option to export from activity log page up to six months back or up to 100K events.
181+
A new user experience dedicated to providing users the option to export from 'activity log' page up to six months back or up to 100K events.
144182

145183
You can filter the results using time range and various other filters and even hide private activities.
146184

@@ -151,11 +189,12 @@ For more information, see [Export activities six months back](activity-filters-q
151189

152190
Customize the Microsoft Defender for Cloud Apps(MDA) block experience for apps that are blocked using Cloud Discovery.
153191

154-
You can set up a custom redirect URL on block pages
192+
You can set up a custom redirect URL on block pages:
193+
155194
- To educate and redirect end users to organization acceptable use policy
156195
- To guide end users on steps to follow to secure an exception for block
157196

158-
For more information, see [Configure custom URL for MDA block pages](mde-govern.md#educate-users-when-accessing-blocked-apps--customize-the-block-page)
197+
For more information, see [Configure custom URL for MDA block pages](mde-govern.md#educate-users-when-accessing-blocked-apps--customize-the-block-page).
159198

160199

161200
### In-browser protection for macOS users and newly supported policies (Preview)

0 commit comments

Comments
 (0)