alerts
17 Topics- Suspected identity theft (pass-the-ticket) when switching LAN/WiFIHi, I see this alert "Suspected identity theft (pass-the-ticket)" when a user switches from LAN to WiFi or back. The laptop's DNS record has both IP addresses. I'm guessing Defender still thinks a different device is using the same Kerberos ticket. How do you deal with that? Can you tune the alert somehow so that doesn't keep alerting? Jan 16, 2025 4:15 PM This Kerberos ticket was first observed on 1/16/25 4:15 PM on [Device Name] (Laptop IP1). Jan 16, 2025 4:57 PM - Jan 16, 2025 4:57 PM [Username] accessed [Server Name] (CIFS) from [Server IP] (Laptop IP2). Thanks for your support
- MDI not firing alert - "Suspicious additions to sensitive groups (external ID 2024)"Hi everyone, i have checked our MDI installation with the Powershell - it is all green. Also the action itself is in the portal. The group is marked sensitive by default. A user gets added by another Domain Admin. This should fire an high alert? But nothin happens. Is there any setting i am missing? We started with a "german AD" so the group names are in German. But this cannot make any difference. BR Stephan609Views0likes2Comments
- User Risk Policy Migration to Conditional Access - AlertsHello all, and greetings from Portugal! I've just migrated my user risk and sign-in risk policies to Conditional Access, but I was wondering if this still allows me to receive alerts (like user risk policy did) about detected users at risk. Tks in advance, Diogo SousaSolved741Views0likes2Comments
- Missing alerts from MDI, suspicious additions to sensitive groupsHi there! Without going into specific details about how and what have happened I can clearly say that we are missing at least two alerts regarding suspicious additions to sensitive groups. What I can say is that we don't have any exclusions on that rule in MDI but still we had new members in one group without any alert. Can see the additions in the legacy portal (portal.atp.azure.com) but not classified as suspicious for some reason, meanwhile another addition to the same group raised an alert the day after. What can be the issue and how can make it so that it does not happen again?Solved4.2KViews0likes10Comments
- Create an alert on "Failure message: Strong Authentication is required"Hi, I would like to create an alert on "Failure message: Strong Authentication is required" when client IP is not from "France". My idea is to find users whose password has been stolen, but where the attacker has no knowledge of MFA/TOTP. I chose the following filter: But I dont find how to filter only "Failure message: Strong Authentication is required" and after I would like to create policy on it. Thank for you help! Regards, Lionel1.5KViews0likes0Comments
- microsoft windows defender 11Buenas tardes, comunidad microsoft, acudo a este foro porque me encuentro sumamente preocupado, desde hace algunas semanas windows defender me notifica con una alerta amarilla, y me indica que debo realizar acciones para la seguridad del computador, Sin embargo he realizado las acciones correspondientes y no encuentro solucion. La ultima advertencia que me indica es la seccion " reputation based-protection" de windows defender,intento solucionar pero no consigo nada.Temo que sea un virus que se encuentre realizando acciones peligrosas. Consulto si este problema es de Microsoft o solamente es de mi notebook, muchas gracias por la ayuda.
- Advanced Threat Protection - onPremiseHi Folks, 🙂 I have a question regarding ATA for onPremise from Microsoft. Even the software further improvements stopped, its still be maintained and I think it makes sense to make use of it in a local domain network. 🙂 My issue: I cannot find the original setup. I have an VLSC Account, but the software is not available when I search for it. Does anyone know where else do find the binaries? Or does have a better idea? 🙂 Here is what I looking for: https://learn.microsoft.com/en-us/advanced-threat-analytics/what-is-ata Thank you in advance. 🙂 Best regards PatrickSolved
- Defender for Identity sensor high severity alertMDI sensor is generating a high severity alert stating " A health issue occurred Sensor received more windows events than they can process resulting in some events not being analyzed While I checked MS docs for the possible cause I got this: "Verify that only required events are forwarded to the Defender for Identity sensor or try to forward some of the events to another Defender for Identity sensor" But I am not able find a way to verify this. If anyone has faced similar issue I wanted to know the possible solutions for the same. Thanks in advance1.6KViews0likes1Comment