Skip to content

Commit 4e917ce

Browse files
Merge pull request #5617 from MicrosoftDocs/main
[AutoPublish] main to live - 11/16 22:37 PST | 11/17 12:07 IST
2 parents 09b0754 + ad7ed83 commit 4e917ce

File tree

2 files changed

+14
-2
lines changed

2 files changed

+14
-2
lines changed

defender-for-identity/deploy/configure-windows-event-collection.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Configure audit policies for Windows event logs | Microsoft Defender for Identity
33
description: This article describes how to configure audit policies for Windows event logs as part of deploying a Microsoft Defender for Identity sensor.
4-
ms.date: 06/04/2025
4+
ms.date: 11/05/2025
55
ms.topic: how-to
66
ms.reviewer: rlitinsky
77
---
@@ -23,9 +23,13 @@ Defender for Identity generates health issues for each of these scenarios if the
2323
Before you start creating new event and audit policies, we recommend that you run the following PowerShell command to generate a report of your current domain configurations:
2424

2525
```powershell
26-
New-MDIConfigurationReport [-Path] <String> [-Mode] <String> [-OpenHtmlReport]
26+
New-MDIConfigurationReport -Path "C:\Reports" -Mode Domain -Identity "DOMAIN\ServiceAccountName" -OpenHtmlReport
2727
```
2828

29+
> [!NOTE]
30+
> When using `-Mode Domain`, include the `-Identity` parameter to avoid an interactive prompt.
31+
> For more information, see: [New-MDIConfigurationReport](/powershell/module/defenderforidentity/new-mdiconfigurationreport?view=defenderforidentity-latest&preserve-view=true).
32+
2933
In the preceding command:
3034

3135
- `Path` specifies the path to save the reports to.

defender-for-identity/whats-new.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,14 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## November 2025
2727

28+
Defender for Identity now offers an opt-in automatic event-auditing configuration for unified sensors (V3.x). This feature streamlines deployment by automatically applying required Windows auditing settings to new sensors and fixing misconfigurations on existing ones. Admins can enable the option in the Defender for Identity Settings -> Advanced Features or via Graph API. The capability and its related health alerts will roll out globally beginning mid-November 2025.
29+
**Releated Health alerts:**
30+
- NTLM Auditing is not enabled
31+
- Directory Services Advanced Auditing is not enabled as required
32+
- Directory Services Object Auditing is not enabled as required
33+
- Auditing on the Configuration container is not enabled as required
34+
- Auditing on the ADFS container is not enabled as required
35+
2836
### New security posture assessment: Change password for on-prem account with potentially leaked credentials (Preview)
2937

3038
The new security posture assessment lists users whose valid credentials have been leaked. For more information, see: [Change password for on-prem account with potentially leaked credentials (Preview)](/defender-for-identity/security-posture-assessments/accounts#change-password-for-on-prem-account-with-potentially-leaked-credentials-preview)

0 commit comments

Comments
 (0)