Skip to content

Commit 4c1f525

Browse files
authored
Added File extension information for Leak
While working in IcM 369181172, learned we only scan some file extensions. Customer created a file named 'config_info' and didn't get detections. It's useful to add details to it about the extension so that testing is consistently working and we avoid those honest mistakes in the future.
1 parent f59b642 commit 4c1f525

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory/identity-protection/howto-identity-protection-simulate-risk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ This risk detection indicates that the application's valid credentials have been
9797
9898
5. Get the TenantID and Application(Client)ID in the **Overview** page.
9999
6. Ensure you disable the application via **Azure Active Directory** > **Enterprise Application** > **Properties** > Set **Enabled for users to sign-in** to **No**.
100-
7. Create a **public** GitHub Repository, add the following config and commit the change.
100+
7. Create a **public** GitHub Repository, add the following config and commit the change as a file with the .txt extension.
101101
```GitHub file
102102
"AadClientId": "XXXX-2dd4-4645-98c2-960cf76a4357",
103103
"AadSecret": "p3n7Q~XXXX",

0 commit comments

Comments
 (0)