updates
9 TopicsMissing features in Security portal
With the Azure ATP portal we where able to do a lot more of investigation for on premises actions. We are in a large hybrid environment. Is there a way to access the old portal to get back that timeline for a user? The things we are missing out on currently that we found are the following: Password resets, where able to see that easy at the users timeline. Users being added to or removed from groups and who did it Failed logins to on premises resources You can no longer search for groups Can't export the same data as in the ATP portal. Some of us used this daily and are having trouble to figure out how to get the correct information now. I'm aware that we can see some of those things in the users audit logs for example but would be nice to be able to see it in the timeline as before.SolvedMicrosoft Defender for Identity and Npcap
Hi everyone, Note that starting from MDI version 2.156, we are including the 1.0 OEM version of the Npcap executable in the Sensor deployment package file. What's new in Microsoft Defender for Identity | Microsoft Docs So all you have to do is download the new package and extract the file from the ZIP archive. The Microsoft Defender for Identity team is currently recommending that all customers deploy the Npcap driver before deploying the sensor on a domain controller or AD FS server. This will ensure that Npcap driver will be used instead of the WinPcap driver. For more information on MDI and NPCAP, please refer to our FAQSolvedMicrosoft Defender for Identity and cloud based security
Hi everyone, I'm Ricky and I'm the Product Marketing Manager for Microsoft Defender for Identity. I was looking to start a discussion with the outstanding community we are fortunate to have here around a topic I've been tracking. I was looking for input around cloud based security and the merits it provides, and how this stacks up against your views of how you've maybe tackled security updates in the past. Defender for Identity's capabilities are excellent because we offer cloud based protection in an age of advanced threats being able to propagate throughout an environment very quickly. I'm looking to uncover your views on the process of connecting your DCs to the internet (via a highly configured one way proxy of course) to gain all the benefits that Defender for Identity offers. Specifically, I'd be interested to know whether it would be perceived as a bigger or smaller risk of not having Defender for Identity protection, and what you're doing to help protect your on-premises identities as is. If this is the case, how are you correlating this information with other data sources from security products? It would also be great to see any opinions on how updates are perceived. Does the benefits of having cloud based servicing to Defender for Identity provide enough advantages in today's security landscape as opposed to waiting for updates to land on Patch Tuesday, for example? Maybe you're already a Defender for Identity customer and you went through this risk analysis before you implemented the solution - it would be great to get your viewpoint too. There are no right or wrong answers here, and I just want to see a variety of opinions on the subject. Thanks for getting involved. Will be great to see some feedback on this! Ricky