<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Defender for Identity topics</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/bd-p/AzureAdvancedThreatProtection</link>
    <description>Microsoft Defender for Identity topics</description>
    <pubDate>Sat, 25 Apr 2026 05:53:26 GMT</pubDate>
    <dc:creator>AzureAdvancedThreatProtection</dc:creator>
    <dc:date>2026-04-25T05:53:26Z</dc:date>
    <item>
      <title>Defender for Identity health issues - Not Closing</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/defender-for-identity-health-issues-not-closing/m-p/4476063#M4286</link>
      <description>&lt;P&gt;We have old issues and they're not being "Closed" as reported.&lt;/P&gt;&lt;P&gt;Are we missing something or is this "Microsoft Defender for Identity" Health Issues process broken? Thanks!&lt;/P&gt;&lt;P&gt;Closed: A health issue is automatically marked as Closed when Microsoft Defender for Identity detects that the underlying issue is resolved. If you have the Azure ATP (workspace name) Administrator role, you can also manually close a health issue.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Dec 2025 15:09:42 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/defender-for-identity-health-issues-not-closing/m-p/4476063#M4286</guid>
      <dc:creator>MPH2</dc:creator>
      <dc:date>2025-12-08T15:09:42Z</dc:date>
    </item>
    <item>
      <title>IdentityLogonEvents - IsNtlmV1</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/identitylogonevents-isntlmv1/m-p/4473821#M4284</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I cannot find documentation on how the IdentityLogonEvents table's AdditionalFields.IsNtlmV1 populated.&lt;/P&gt;&lt;P&gt;In a demo environment, I intentionally "enforced" NTLMv1 and made an NTLMv1 connection to a domain controller.&lt;/P&gt;&lt;P&gt;On the DC's Security log, event ID 4624 shows correct info:&lt;/P&gt;&lt;DIV&gt;&lt;EM&gt;Detailed Authentication Information:&lt;/EM&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;EM&gt;Logon Process: NtLmSsp&amp;nbsp;&lt;/EM&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;EM&gt;Authentication Package: NTLM&lt;/EM&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;EM&gt;Transited Services: -&lt;/EM&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;EM&gt;Package Name (NTLM only): &lt;STRONG&gt;NTLM V1&lt;/STRONG&gt;&lt;/EM&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;EM&gt;Key Length: 128&lt;/EM&gt;&lt;/DIV&gt;&lt;P&gt;&lt;BR /&gt;On MDI side however it looks like this:&lt;BR /&gt;(using the following KQL to display relevant info here:&lt;/P&gt;&lt;P&gt;IdentityLogonEvents&lt;BR /&gt;| where ReportId == @"f70dbd37-af8e-4e4e-a77d-b4250f9e0d0b"&lt;/P&gt;&lt;P&gt;| extend todynamic(AdditionalFields)&lt;/P&gt;&lt;P&gt;| project TimeGenerated, ActionType, Application, LogonType, Protocol,IsNtlmV1 = AdditionalFields.IsNtlmV1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;)&lt;/P&gt;&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table&gt;&lt;tbody&gt;&lt;tr&gt;&lt;th&gt;TimeGenerated&lt;/th&gt;&lt;th&gt;ActionType&lt;/th&gt;&lt;th&gt;Application&lt;/th&gt;&lt;th&gt;LogonType&lt;/th&gt;&lt;th&gt;Protocol&lt;/th&gt;&lt;th&gt;IsNtlmV1&lt;/th&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Nov 28, 2025 10:43:05 PM&lt;/td&gt;&lt;td&gt;LogonSuccess&lt;/td&gt;&lt;td&gt;Active Directory&lt;/td&gt;&lt;td&gt;Credentials validation&lt;/td&gt;&lt;td&gt;Ntlm&lt;/td&gt;&lt;td&gt;false&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;&lt;P&gt;Can someone please explain, under which circumstances will the IsNtlmV1 property become "true"?&lt;/P&gt;&lt;P&gt;Thank you in advance&lt;/P&gt;</description>
      <pubDate>Fri, 28 Nov 2025 22:43:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/identitylogonevents-isntlmv1/m-p/4473821#M4284</guid>
      <dc:creator>kuglidani</dc:creator>
      <dc:date>2025-11-28T22:43:06Z</dc:date>
    </item>
    <item>
      <title>sensor service fails to start</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/sensor-service-fails-to-start/m-p/4469726#M4277</link>
      <description>&lt;P&gt;Hello, i've installed MDI on all of our domain controllers and everything went fine. I am trying to install MDI our Entra connect server and our certificate authority server (which are not domain controllers) and the service is continually failing to start. Could someone please point me in the right direction on how to rectify this? I've tried:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;recreating the service account (3x),&lt;/LI&gt;&lt;LI&gt;checking the service account with Test-ADServiceAccount (works fine from both member servers)&lt;/LI&gt;&lt;LI&gt;verified the service account is given the right to log on as service.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The error log is very vague:&lt;/P&gt;&lt;LI-CODE lang=""&gt;
2025-11-13 19:05:30.0968 Error DirectoryServicesClient+&amp;lt;CreateLdapConnectionAsync&amp;gt;d__49 Microsoft.Tri.Infrastructure.ExtendedException: CreateLdapConnectionAsync failed [DomainControllerDnsName={FQDN of DC}]
   at async Task&amp;lt;LdapConnection&amp;gt; Microsoft.Tri.Sensor.DirectoryServicesClient.CreateLdapConnectionAsync(DomainControllerConnectionData domainControllerConnectionData, bool isGlobalCatalog, bool isTraversing)
   at async Task&amp;lt;bool&amp;gt; Microsoft.Tri.Sensor.DirectoryServicesClient.TryCreateLdapConnectionAsync(DomainControllerConnectionData domainControllerConnectionData, bool isGlobalCatalog, bool isTraversing)
2025-11-13 19:05:30.1124 Error DirectoryServicesClient Microsoft.Tri.Infrastructure.ExtendedException: Failed to communicate with configured domain controllers [ _domainControllerConnectionDatas={FQDN of DC}]
   at new Microsoft.Tri.Sensor.DirectoryServicesClient(IConfigurationManager configurationManager, IDirectoryServicesDomainNetworkCredentialsManager domainNetworkCredentialsManager, IDomainTrustMappingManager domainTrustMappingManager, IRemoteImpersonationManager remoteImpersonationManager, IMetricManager metricManager, IWorkspaceApplicationSensorApiJsonProxy workspaceApplicationSensorApiJsonProxy)
   at object lambda_method(Closure, object[])
   at object Autofac.Core.Activators.Reflection.ConstructorParameterBinding.Instantiate()
   at void Microsoft.Tri.Infrastructure.ModuleManager.AddModules(Type[] moduleTypes)
   at new Microsoft.Tri.Sensor.SensorModuleManager()
   at ModuleManager Microsoft.Tri.Sensor.SensorService.CreateModuleManager()
   at async Task Microsoft.Tri.Infrastructure.Service.OnStartAsync()
   at void Microsoft.Tri.Infrastructure.TaskExtension.Await(Task task)
   at void Microsoft.Tri.Infrastructure.Service.OnStart(string[] args)&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 13 Nov 2025 19:46:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/sensor-service-fails-to-start/m-p/4469726#M4277</guid>
      <dc:creator>tandersn</dc:creator>
      <dc:date>2025-11-13T19:46:40Z</dc:date>
    </item>
    <item>
      <title>MDI AD CS sensor not switching from removed DC</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/mdi-ad-cs-sensor-not-switching-from-removed-dc/m-p/4468098#M4274</link>
      <description>&lt;P&gt;We are in the process of replacing our Domain Controllers.&lt;/P&gt;&lt;P&gt;What I found is that the MDI sensor on our PKI server is still stuck with a domain controller which has been demoted and removed from the domain.&lt;/P&gt;&lt;P&gt;(Sensor version: 2.250.18972.18405)&lt;/P&gt;&lt;P&gt;I guess, if I reinstall the sensor, it will find a new domain controller - but what if it finds a DC that is to be decommissioned? Should I reinstall the sensor until it choses a "new" DC?&lt;/P&gt;&lt;P&gt;Thank you in advance,&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2025 14:15:57 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/mdi-ad-cs-sensor-not-switching-from-removed-dc/m-p/4468098#M4274</guid>
      <dc:creator>kuglidani</dc:creator>
      <dc:date>2025-11-07T14:15:57Z</dc:date>
    </item>
    <item>
      <title>Sizing tool for v3 sensor</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/sizing-tool-for-v3-sensor/m-p/4468056#M4273</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm looking at the Defender for Identity v3 sensor. With the v2 sensor we have the sizing tool.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is the existing sizing tool applicable / needed for the v3 sensor?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Alastair.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2025 10:46:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/sizing-tool-for-v3-sensor/m-p/4468056#M4273</guid>
      <dc:creator>AlastairCain</dc:creator>
      <dc:date>2025-11-07T10:46:16Z</dc:date>
    </item>
    <item>
      <title>Incorrect Secure Score recommendation -  Remove unnecessary replication permissions</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/incorrect-secure-score-recommendation-remove-unnecessary/m-p/4458603#M4270</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;In our environment, we got the "Remove unnecessary replication permissions for Entra Connect AD DS Connector Account" secure score recommendation.&lt;/P&gt;&lt;P&gt;Based on the &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-for-identity/remove-replication-permissions-microsoft-entra-connect" target="_blank"&gt;docs&lt;/A&gt; replication permission is needed when PHS is in use. We are using PTA, but PHS is also enabled as a fallback.&lt;/P&gt;&lt;P&gt;On the Entra Connect server I ran the following:&lt;/P&gt;&lt;P&gt;Import-Module ADSyncDiagnostics&lt;/P&gt;&lt;P&gt;Invoke-ADSyncDiagnostics -PasswordSync&lt;/P&gt;&lt;P&gt;The result is: Password Hash Synchronization cloud configuration is enabled&lt;/P&gt;&lt;P&gt;If I remove the replication permission, we soon receive an alert that password hash sync did not occour.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it normal? I would say that the sensor should be able to detect PHS usage hence not recommending to remove the permissions.&lt;/P&gt;&lt;P&gt;Thank you in advance,&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2025 12:54:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/incorrect-secure-score-recommendation-remove-unnecessary/m-p/4458603#M4270</guid>
      <dc:creator>kuglidani</dc:creator>
      <dc:date>2025-10-02T12:54:58Z</dc:date>
    </item>
    <item>
      <title>Entra ID Sensitive Groups</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/entra-id-sensitive-groups/m-p/4446619#M4266</link>
      <description>&lt;P&gt;We have our AD sensitive groups programmed into the identity module but we don't know how to add Entra security groups to the sensitive groups list. Has anyone done this before?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 20:12:49 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/entra-id-sensitive-groups/m-p/4446619#M4266</guid>
      <dc:creator>beikjrir</dc:creator>
      <dc:date>2025-08-21T20:12:49Z</dc:date>
    </item>
    <item>
      <title>Alert Not Found</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/alert-not-found/m-p/4444283#M4263</link>
      <description>&lt;P&gt;We are receiving the following the follow alert from Defender;&lt;BR /&gt;2025-08-15T09:26:42-07:00 {&lt;EM&gt;SERVERNAME&lt;/EM&gt;} CEF[6208]0|Microsoft|Azure ATP|##########|AccountEnumerationSecurityAlert|Account enumeration reconnaissance|5|start=2025-08-15T16:23:14.5550516Z app=Ntlm shost=NULL shostfqdn= msg=An actor on NULL performed suspicious account enumeration, exposing 6 existing account names. externalId=2003 cs1Label=url cs1=https://security.microsoft.com/alerts/xx###xxxx-#xx#-####-#x##-##x##x#x#x#x cs2Label=trigger cs2=update&lt;BR /&gt;But when we go to the URL listed, we get an error that it can't be found. We are able to see other alerts that come in.&lt;BR /&gt;How do I go about finding the details on this error?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2025 21:03:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/alert-not-found/m-p/4444283#M4263</guid>
      <dc:creator>edhealea</dc:creator>
      <dc:date>2025-08-15T21:03:39Z</dc:date>
    </item>
    <item>
      <title>Low success rate of active name resolution  NetBIOS (failed rates 80%) andRdpTls (failed rate 90%).</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/low-success-rate-of-active-name-resolution-netbios-failed-rates/m-p/4437174#M4259</link>
      <description>&lt;P&gt;Low success rate of active name resolution&lt;BR /&gt;Three&amp;nbsp; Domain controllers are failing name resolution using NetBIOS (failed rates 80%), NetworkNameResolverMethod RdpTls (failed rate 90%) however&amp;nbsp;&lt;BR /&gt;RPC over NTLM and reverse DNS working confirmed by Microsoft support.The three domain controllers are runing windows server 2016 with the installed&amp;nbsp; Azure ATP Sensor on the DCs is&amp;nbsp; version is 2.243 I need assistance how to get this issue resoves on the failing three dc please.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2025 13:36:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/low-success-rate-of-active-name-resolution-netbios-failed-rates/m-p/4437174#M4259</guid>
      <dc:creator>paddypowers</dc:creator>
      <dc:date>2025-07-28T13:36:17Z</dc:date>
    </item>
    <item>
      <title>Sensor install failing, error log indicates proxy issue</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/sensor-install-failing-error-log-indicates-proxy-issue/m-p/4428951#M4257</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was re-installing a sensor that was stuck on updates and I get an error in the logs -&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;failed connecting to service. The issue can be caused by a transparent proxy configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I can find that's related to either missing certificates or SSL inspection.&amp;nbsp; The proxy works fine for other sensors and I know it's not inspecting this traffic anyway.&amp;nbsp; I found a troubleshooting page that calls out the specific Root CA - "DigiCert Global Root G2" which exists on this machine.&lt;/P&gt;&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-for-identity/troubleshooting-known-issues#proxy-authentication-problem-presents-as-a-connection-error" target="_blank"&gt;https://learn.microsoft.com/en-us/defender-for-identity/troubleshooting-known-issues#proxy-authentication-problem-presents-as-a-connection-error&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe this sChannel error is related&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The remote server has requested SSL client authentication, but no suitable client certificate could be found.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am stumped at this point, any help is appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 17:58:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/sensor-install-failing-error-log-indicates-proxy-issue/m-p/4428951#M4257</guid>
      <dc:creator>Bobbers</dc:creator>
      <dc:date>2025-07-01T17:58:10Z</dc:date>
    </item>
    <item>
      <title>Agent install error</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/agent-install-error/m-p/4428887#M4256</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of the servers running the agent was failing to update so I attempted a reinstall.&amp;nbsp; During install it fails / rollsback with an error in the log stating "failed connecting to service.&amp;nbsp; The issue can be caused by a transparent proxy configuration".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The device does use a proxy set via netsh, and I've tried specifying it on the command line of the install.&amp;nbsp; I have read elsewhere that this can be related to SSL inspection or an issue with Root CAs on the device.&amp;nbsp; I know there is no inspection going on in this case.&amp;nbsp; I have compared the Root CA list on this device to working devices and don't see anything related to Microsoft that is different.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 13:56:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/agent-install-error/m-p/4428887#M4256</guid>
      <dc:creator>Bobbers</dc:creator>
      <dc:date>2025-07-01T13:56:38Z</dc:date>
    </item>
    <item>
      <title>Capture DFS activity</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/capture-dfs-activity/m-p/4423130#M4253</link>
      <description>&lt;P&gt;Hello, did you have a best pratice baseline to capture DFS activity specially the one done avia a remote console.&lt;/P&gt;&lt;P&gt;For example removing and DFS-N or DFS-Target or modify ACL on it ?&lt;/P&gt;&lt;P&gt;Thanks you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jun 2025 06:54:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/capture-dfs-activity/m-p/4423130#M4253</guid>
      <dc:creator>Olivier Mangon</dc:creator>
      <dc:date>2025-06-12T06:54:21Z</dc:date>
    </item>
    <item>
      <title>Clarification over "dormant" account status</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/clarification-over-quot-dormant-quot-account-status/m-p/4422036#M4251</link>
      <description>&lt;P&gt;I was looking today at our list of "Remove dormant accounts from sensitive groups" within Microsoft Defender for Identity, and one service account has caused a bit of discussion. The account would only be used on-premise and would never be carrying out authentications out of our estate. In this case would Defender for Identity still see the account as being "dormant", or is the reason because it's not carried out any of those off-estate authentications?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apologies if this is a simple question, but it would be very helpful to know the answer.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jun 2025 11:34:23 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/clarification-over-quot-dormant-quot-account-status/m-p/4422036#M4251</guid>
      <dc:creator>jasonbourne5379</dc:creator>
      <dc:date>2025-06-09T11:34:23Z</dc:date>
    </item>
    <item>
      <title>Activity logs not showing in cloud apps</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/activity-logs-not-showing-in-cloud-apps/m-p/4419583#M4249</link>
      <description>&lt;P&gt;Hi folks,&amp;nbsp;&lt;/P&gt;&lt;P&gt;MDI activity logs not showing in cloud apps, the last log was on May 13, 2025, It is showing for multiple tenants.&lt;/P&gt;&lt;P&gt;Anybody experiencing similar issue?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2025 08:23:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/activity-logs-not-showing-in-cloud-apps/m-p/4419583#M4249</guid>
      <dc:creator>prasanthpro7</dc:creator>
      <dc:date>2025-06-02T08:23:27Z</dc:date>
    </item>
    <item>
      <title>Spurious health alerts with sensor 2.241.18721.18894</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/spurious-health-alerts-with-sensor-2-241-18721-18894/m-p/4417588#M4246</link>
      <description>&lt;P&gt;We use delayed update on half of our sensors to help catch possible issues with new sensor versions.&lt;/P&gt;&lt;P&gt;Only on half of our DCs running the latest sensor 2.241.18721.18894, we are receiving alerts "The virtual machine that sensor [hostname.domain] is installed on has a network configuration mismatch. This issue may affect the performance and reliability of the sensor"&lt;/P&gt;&lt;P&gt;Looking at the alert in the portal, MDI alleges that the affected virtual machines virtual NICs have Large Send Offload (LSO) enabled. However, the virtual machines do NOT have LSO enabled.&lt;/P&gt;&lt;P&gt;We are not seeing these alerts from the other half of our sensors that are still running 2.241.18708.7989. The issue is only appearing on VM DCs running sensor 2.241.18721.18894.&lt;/P&gt;&lt;P&gt;Anyone else see this issue?&lt;/P&gt;&lt;P&gt;All the affected DCs are virtual machines. We do have some bare-metal DCs, but they are still running 2.241.18708.7989.&lt;/P&gt;</description>
      <pubDate>Mon, 26 May 2025 13:30:05 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/spurious-health-alerts-with-sensor-2-241-18721-18894/m-p/4417588#M4246</guid>
      <dc:creator>robmacf9108931</dc:creator>
      <dc:date>2025-05-26T13:30:05Z</dc:date>
    </item>
    <item>
      <title>MDI port requisites - May 2025</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/mdi-port-requisites-may-2025/m-p/4412997#M4243</link>
      <description>&lt;P&gt;Port 445 is not needed anymore from May 2025 forward. Microsoft disabled SAM-R queries for MDI. Update the documentation.&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 15:24:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/mdi-port-requisites-may-2025/m-p/4412997#M4243</guid>
      <dc:creator>Kikoooooo2</dc:creator>
      <dc:date>2025-05-12T15:24:48Z</dc:date>
    </item>
    <item>
      <title>Melsan</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/melsan/m-p/4409139#M4242</link>
      <description>&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 29 Apr 2025 12:35:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/melsan/m-p/4409139#M4242</guid>
      <dc:creator>Thirisanptt</dc:creator>
      <dc:date>2025-04-29T12:35:14Z</dc:date>
    </item>
    <item>
      <title>Defender for Identity Certificate Requirements</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/defender-for-identity-certificate-requirements/m-p/4408041#M4240</link>
      <description>&lt;P&gt;One of the required certificates for the MDI sensor to run is this certificate:&lt;BR /&gt;&lt;BR /&gt;Subject &amp;nbsp; &amp;nbsp; &amp;nbsp;: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE&lt;BR /&gt;Issuer &amp;nbsp; &amp;nbsp; &amp;nbsp; : CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE&lt;BR /&gt;Thumbprint &amp;nbsp; : D4DE20D05E66FC53FE1A50882C78DB2852CAE474&lt;BR /&gt;FriendlyName : DigiCert Baltimore Root&lt;BR /&gt;NotBefore &amp;nbsp; &amp;nbsp;: 5/12/2000 11:46:00 AM&lt;BR /&gt;&lt;SPAN class="lia-text-color-8"&gt;NotAfter &amp;nbsp; &amp;nbsp; : 5/12/2025 4:59:00 PM&lt;/SPAN&gt;&lt;BR /&gt;Extensions &amp;nbsp; : {System.Security.Cryptography.Oid, System.Security.Cryptography.Oid, System.Security.Cryptography.Oid}&lt;BR /&gt;&lt;BR /&gt;It expires in a little over 2 weeks.&amp;nbsp; I still see it listed as required here:&lt;BR /&gt;&lt;BR /&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-for-identity/troubleshooting-known-issues" target="_blank"&gt;https://learn.microsoft.com/en-us/defender-for-identity/troubleshooting-known-issues&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Does anyone know if that requirement will be going away and/or will the certificate be updated before this one expires?&amp;nbsp; I haven't been able to find anything related to its replacement through my various searches so I apologize if this has been covered already.&lt;BR /&gt;&lt;BR /&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2025 13:40:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/defender-for-identity-certificate-requirements/m-p/4408041#M4240</guid>
      <dc:creator>I_tried</dc:creator>
      <dc:date>2025-04-25T13:40:38Z</dc:date>
    </item>
    <item>
      <title>Segreation of views for different sub-companies</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/segreation-of-views-for-different-sub-companies/m-p/4408038#M4239</link>
      <description>&lt;P&gt;I am in a group of companies and due to various legal reasons they are not allowed to see each others data, but we are all part of the same azure tenant and active directories.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So i want to use the idnetity sensor, and it to feed data into dfi, but i want to give the it teams from the different companies access to ONLY their own data and also allow them to do investations on only their own users.&lt;BR /&gt;&lt;BR /&gt;How can i do this segregation within defender?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2025 13:19:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/segreation-of-views-for-different-sub-companies/m-p/4408038#M4239</guid>
      <dc:creator>DunfieldMark</dc:creator>
      <dc:date>2025-04-25T13:19:08Z</dc:date>
    </item>
    <item>
      <title>ATP Sensor will not install on Windows 2016</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/atp-sensor-will-not-install-on-windows-2016/m-p/4392853#M4220</link>
      <description>&lt;P&gt;Environment: Windows Server Standard 2016, vSphere 7x, Hardware requirements met, .Net Framework 4.8.&lt;/P&gt;&lt;P&gt;We have 4 Windows Server 2016 Domain Controllers that all experience the exact same error that prevents us from installing the download classic sensor. I have tried rebooting, run as admin, upgrading .Net framework (from 4.7 to 4.8), etc. This occurs on all 4 DCs that are 2016. We have successfully installed on the 2019 DCs. I have searched online for this error but all suggested fixes are Visual Studio related and I dont think it applies to our situation.&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Error DeploymentManager ShowErrorMessage System.IO.FileLoadException: Could not load file or assembly 'System.ValueTuple, Version=4.0.2.0, Culture=neutral, PublicKeyToken=cc7b13ffcd2ddd51' or one of its dependencies. The located assembly's manifest definition does not match the assembly reference. (Exception from HRESULT: 0x80131040)" error.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Mar 2025 12:11:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/atp-sensor-will-not-install-on-windows-2016/m-p/4392853#M4220</guid>
      <dc:creator>ChristianT</dc:creator>
      <dc:date>2025-03-13T12:11:46Z</dc:date>
    </item>
  </channel>
</rss>

