Skip to content

Commit fdd176e

Browse files
authored
Merge branch 'main' into update-mdi-okta-article
2 parents 6ac5ba1 + 93e04b3 commit fdd176e

37 files changed

+172
-80
lines changed

ATADocs/ata-capacity-planning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: Planning your Advanced Threat Analytics deployment
55
description: Helps you plan your deployment and decide how many ATA servers will be needed to support your network
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: concept-article
88
ms.service: advanced-threat-analytics
99
ms.assetid: 1b5b24ff-0df8-4660-b4f8-64d68cc72f65
1010

ATADocs/ata-threats.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: What threats does Advanced Threat Analytics detect?
55
description: Lists the threats that Advanced Threat Analytics detects
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: concept-article
88
ms.service: advanced-threat-analytics
99
ms.assetid: 283e7b4e-996a-4491-b7f6-ff06e73790d2
1010

ATADocs/monitoring-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: Understanding ATA health alerts
55
description: Describes all the health alerts for each component, listing the cause and the steps needed to resolve the problem
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: concept-article
88
ms.collection: M365-security-compliance
99
ms.service: advanced-threat-analytics
1010
ms.assetid: b04fb8a4-b366-4b55-9d4c-6f054fa58a90

ATADocs/troubleshoot-audit.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
title: Working with ATA audit logs
55
description: This article describes how to work with ATA audit logs in the Windows Event Log.
66
ms.date: 01/10/2023
7-
ms.topic: conceptual
7+
ms.topic: concept-article
88
ms.service: advanced-threat-analytics
99
ms.assetid: 1d186a96-ef70-4787-aa64-c03d1db94ce0
1010

ATPDocs/deploy/activate-capabilities.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Activate Microsoft Defender for Identity capabilities directly on a domain controller
2+
title: Activate Microsoft Defender for Identity capabilities directly on a domain controller (Preview)
33
description: Learn about the Microsoft Defender for Identity capabilities on domain controllers and how to activate them.
44
ms.date: 08/13/2024
55
ms.topic: how-to
@@ -14,7 +14,7 @@ This article describes how to activate and test Microsoft Defender for Identity
1414
> The capabilities described in this article are currently available as Preview features. Preview features are features that aren't complete, but are made available on a "preview" basis so customers can get early access and provide feedback.
1515
>
1616
> Preview features are still in development, have limited or restricted functionality and may be available only in selected geographic areas.
17-
> For more information, see the [Microsoft Defender XDR preview features](/defender-xdr/preview)
17+
> For more information, see the [Microsoft Defender XDR preview features](/defender-xdr/preview).
1818
1919
> [!IMPORTANT]
2020
> The new Defender for Identity sensor (version 3.x) is recommended for customers looking to deploy core identity protections to new domain controllers running Windows Server 2019 or newer. For all other identity infrastructure, or for customers looking to deploy the most robust identity protections available from Microsoft Defender for Identity today, we recommend deploying the classic sensor [here](quick-installation-guide.md).
@@ -90,8 +90,8 @@ Activate the Defender for Identity from the [Microsoft Defender portal](https://
9090
[![Screenshot that shows how to activate the new sensor.](media/activate-capabilities/1.jpg)](media/activate-capabilities/1.jpg#lightbox)
9191

9292

93-
> [!NOTE]
94-
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
93+
> [!NOTE]
94+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
9595
9696
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
9797

@@ -207,9 +207,9 @@ We recommend simulating risky behavior in a test environment to trigger supporte
207207
Get-ADObject -Identity ((Get-ADDomain).distinguishedname) -Properties ms-DS-MachineAccountQuota
208208
```
209209
210-
1. In Microsoft Secure Score, select **Recommended Actions** to check for a new **Resolve unsecure domain configurations** recommendation. You might want to filter recommendations by the **Defender for Identity** product.
210+
1. In the Microsoft Secure Score, select **Recommended Actions** to check for a new **Resolve unsecure domain configurations** recommendation. You might want to filter recommendations by the **Defender for Identity** product.
211211
212-
For more information, see [Microsoft Defender for Identity's security posture assessments](../security-assessment.md)
212+
For more information, see [Microsoft Defender for Identity's security posture assessments](../security-assessment.md).
213213
214214
### Test alert functionality
215215
@@ -253,7 +253,7 @@ Deactivating Defender for Identity capabilities from your domain controller does
253253
### Offboard Defender for Identity capabilities on your domain controller
254254
Download the Defender for Identity offboarding package from the [Microsoft Defender portal](https://security.microsoft.com).
255255
256-
1. Navigate to **Settings** > **Identities** > **Activation**
256+
1. Navigate to **Settings** > **Identities** > **Activation**.
257257
258258
1. Select Download offboarding package and save the file in a location you can access from your domain controller.
259259
![Screenshot that shows how to offboard the new sensor.](media/activate-capabilities/screenshot-that-shows-how-to-offboard-the-new-sensor.png)

ATPDocs/investigate-security-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Investigate alerts that are affecting your environment, understand what they mea
1212
Begin your investigation by selecting an alert from the **Alerts** page in the Microsoft Defender portal. The alerts page displays a list of all security alerts generated by Defender for Identity, including their severity, status, and impacted assets. Selecting an alert opens the alert page, which contains the alert title, the affected assets, the details side pane, and in some cases, an alert story.
1313

1414
> [!NOTE]
15-
> The **alert story** and **export to Excel** options are only available for alerts that use the original Defender for Identity structure.
15+
> The **alert story** and **export to Excel** options are only available for alerts that use the classic Defender for Identity structure.
1616
> For more information about differences in how alerts are presented in the Defender portal, see [View and manage alerts](understanding-security-alerts.md).
1717
1818
## Investigate using the alert story
672 KB
Loading
652 KB
Loading
680 KB
Loading

ATPDocs/remove-replication-permissions-microsoft-entra-connect.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,11 @@ Smart attackers are likely to target Microsoft Entra Connect in on-premises envi
3030

3131
1. Take appropriate action on those accounts and remove their 'Replication Directory Changes' and 'Replication Directory Changes All' permissions by unchecking the following permissions:
3232

33-
![Screenshot of the replication permissions.](media/remove-replication-permissions-microsoft-entra-connect/permissions.png)
33+
[![Screenshot that shows Replicationconfiguration](media/remove-replication-permissions-microsoft-entra-connect/replicationconfiguration.png)](media/remove-replication-permissions-microsoft-entra-connect/replicationconfiguration.png#lightbox)
34+
35+
36+
37+
3438

3539
> [!IMPORTANT]
3640
> For environments with multiple Microsoft Entra Connect servers, it’s crucial to install sensors on each server to ensure Microsoft Defender for Identity can fully monitor your setup. It has been detected that your Microsoft Entra Connect configuration does not utilize Password Hash Sync, which means that replication permissions are not necessary for the accounts in the Exposed Entities list. Additionally, it’s important to ensure that each exposed MSOL account is not required for Replication Permissions by any other applications.

0 commit comments

Comments
 (0)