Skip to content

Commit 140bcd0

Browse files
Merge pull request #5188 from MicrosoftDocs/main
[AutoPublish] main to live - 10/01 13:30 PDT | 10/02 02:00 IST
2 parents 5d20b66 + 9366515 commit 140bcd0

10 files changed

+16
-194
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{:changed-files-limit 60
22
:allowed-branchname-matches ["main" "release-.*"]
3-
:allowed-filename-matches ["ATADocs/" "ATPDocs/" "CloudAppSecurityDocs/" "defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/" "unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
3+
:allowed-filename-matches ["advanced-threat-analytics/" "defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud-apps/" "defender-for-cloud/" "defender-for-identity/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/" "unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
44

55
:use-gh-statuses true
66

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1015,5 +1015,10 @@
10151015
"redirect_url": "/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps",
10161016
"redirect_document_id": true
10171017
},
1018+
{
1019+
"source_path": "defender-for-cloud-apps/cloud-discovery-anomaly-detection-policy.md",
1020+
"redirect_url": "/defender-cloud-apps/cloud-discovery-policies",
1021+
"redirect_document_id": false
1022+
}
10181023
]
10191024
}

.openpublishing.redirection.defender-identity.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -859,6 +859,11 @@
859859
"source_path": "defender-for-identity/manage-security-alerts.md",
860860
"redirect_url": "/defender-for-identity/understanding-security-alerts",
861861
"redirect_document_id": false
862-
},
862+
},
863+
{
864+
"source_path": "defender-for-identity/automated-response-exclusions.md",
865+
"redirect_url": "/defender-xdr/automatic-attack-disruption-exclusions",
866+
"redirect_document_id": false
867+
}
863868
]
864869
}

defender-for-cloud-apps/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Integrating Defender for Cloud Apps with Microsoft Defender for Endpoint gives y
4545
**For more information**:
4646

4747
* [Cloud discovery policies](cloud-discovery-policies.md)
48-
* [Cloud discovery anomaly detection policy](cloud-discovery-anomaly-detection-policy.md)
48+
* [Cloud discovery anomaly detection policy](cloud-discovery-policies.md#cloud-discovery-anomaly-detection)
4949
* [Get instantaneous behavioral analytics and anomaly detection](anomaly-detection-policy.md)
5050

5151
---

defender-for-cloud-apps/cloud-discovery-anomaly-detection-policy.md

Lines changed: 0 additions & 137 deletions
This file was deleted.

defender-for-cloud-apps/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -182,8 +182,6 @@ items:
182182
href: create-snapshot-cloud-discovery-reports.md
183183
- name: Create app discovery policies
184184
href: cloud-discovery-policies.md
185-
- name: Create cloud discovery anomaly detection policies
186-
href: cloud-discovery-anomaly-detection-policy.md
187185
- name: Common cloud discovery policies
188186
href: policies-cloud-discovery.md
189187
- name: Troubleshooting cloud discovery

defender-for-cloud-apps/tutorial-suspicious-activity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -116,9 +116,9 @@ Once you're familiar with the policies, you should consider how you want to fine
116116

117117
## Phase 3: Tune cloud discovery anomaly detection policies
118118

119-
Like the anomaly detection policies, there are several built-in [cloud discovery anomaly detection policies](cloud-discovery-anomaly-detection-policy.md) that you can fine-tune. For example, the Data exfiltration to unsanctioned apps policy alerts you when data is being exfiltrated to an unsanctioned app and comes preconfigured with settings based on Microsoft experience in the security field.
119+
Like the anomaly detection policies, there are several built-in [cloud discovery anomaly detection policies](cloud-discovery-policies.md#cloud-discovery-anomaly-detection) that you can fine-tune. For example, the Data exfiltration to unsanctioned apps policy alerts you when data is being exfiltrated to an unsanctioned app and comes preconfigured with settings based on Microsoft experience in the security field.
120120

121-
However, you can fine-tune the built-in policies or create your own policies to aid you in identifying other scenarios that you may be interested in investigating. Since these policies are based on cloud discovery logs, they have different [tuning capabilities](cloud-discovery-anomaly-detection-policy.md#legacy-create-anomaly-detection-policy) more focused on anomalous app behavior and data exfiltration.
121+
However, you can fine-tune the built-in policies or create your own policies to aid you in identifying other scenarios that you may be interested in investigating. Since these policies are based on cloud discovery logs, they have different [tuning capabilities](cloud-discovery-policies.md#cloud-discovery-anomaly-detection) more focused on anomalous app behavior and data exfiltration.
122122

123123
1. **Tune usage monitoring**
124124
Set the usage filters to control the baseline, scope, and activity period for detecting anomalous behavior. For example, you may want to receive alerts for anomalous activities relating to executive-level employees.

defender-for-identity/automated-response-exclusions.md

Lines changed: 0 additions & 47 deletions
This file was deleted.

defender-for-identity/change-password-krbtgt-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ If the KRBTGT account's password is compromised, an attacker can use its hash to
2929
1. Take appropriate action on those accounts by resetting their password **twice** to invalidate the Golden Ticket attack. 
3030

3131
> [!NOTE]
32-
> The krbtgt Kerberos account in all Active Directory domains supports key storage in all Kerberos Key Distribution Centers (KDC). To renew the Kerberos keys for TGT encryption, periodically change the krbtgt account password. It is recommended to use the [Microsoft-provided script.](https://github.com/microsoft/New-KrbtgtKeys.ps1)
32+
> The krbtgt Kerberos account in all Active Directory domains supports key storage in all Kerberos Key Distribution Centers (KDC). To renew the Kerberos keys for TGT encryption, periodically change the krbtgt account password. We recommend using the [Microsoft KRBTGT Reset Script](https://gist.github.com/mubix/fd0c89ec021f70023695) and the [Public AD Scripts](https://github.com/zjorz/Public-AD-Scripts/blob/5666e5fcafd933c3288a47944cd6fb289dde54a1/Reset-KrbTgt-Password-For-RWDCs-And-RODCs.ps1) to change the password twice. These scripts automate the process of changing the password and ensure that the change is replicated across all domain controllers.
3333
> When resetting the password twice, wait at least 10 hours between resets to avoid Kerberos authentication issues. This wait time is enforced by the script and aligns with best practices.
3434
3535
### Next steps

defender-for-identity/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -117,8 +117,6 @@ items:
117117
href: entity-tags.md
118118
- name: Configure detection exclusions
119119
href: exclusions.md
120-
- name: Automated response exclusions
121-
href: automated-response-exclusions.md
122120
- name: Email and syslog notifications
123121
href: notifications.md
124122
- name: Adjust alert thresholds

0 commit comments

Comments
 (0)