Skip to content

Commit 9dc1387

Browse files
committed
fixing links
1 parent 12e0c9a commit 9dc1387

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/security/fundamentals/recover-from-identity-compromise.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -232,7 +232,7 @@ We recommend the following actions to ensure your general security posture:
232232

233233
- **Ensure that your organization has extended detection and response (XDR) and security information and event management (SIEM) solutions in place**, such as [Microsoft Defender XDR for Endpoint](/microsoft-365/security/defender/microsoft-365-defender), [Microsoft Sentinel](../../sentinel/overview.md), and [Microsoft Defender for IoT](../../defender-for-iot/organizations/index.yml).
234234

235-
- **Review Microsoft’s Enterprise access model**
235+
- **Review [Microsoft’s Enterprise access model](/security/privileged-access-workstations/privileged-access-access-model)**
236236

237237
### Improve identity security posture
238238

@@ -269,7 +269,7 @@ This section provides possible methods and steps to consider when building your
269269
> [!IMPORTANT]
270270
> The exact steps required in your organization will depend on what persistence you've discovered in your investigation, and how confident you are that your investigation was complete and has discovered all possible entry and persistence methods.
271271
>
272-
> Ensure that any actions taken are performed from a trusted device, built from a clean source. For example, use a fresh, privileged access workstation.
272+
> Ensure that any actions taken are performed from a [trusted device](/security/privileged-access-workstations/privileged-access-devices), built from a clean source. For example, use a fresh, [privileged access workstation](/security/privileged-access-workstations/privileged-access-deployment).
273273
>
274274
275275
The following sections include the following types of recommendations for remediating and retaining administrative control:
@@ -323,7 +323,7 @@ In addition to the recommendations listed earlier in this article, we also recom
323323
|---------|---------|
324324
|**Rebuild affected systems** | Rebuild systems that were identified as compromised by the attacker during your investigation. |
325325
|**Remove unnecessary admin users** | Remove unnecessary members from Domain Admins, Backup Operators, and Enterprise Admin groups. For more information, see Securing Privileged Access. |
326-
|**Reset passwords to privileged accounts** | Reset passwords of all privileged accounts in the environment. <br><br>**Note**: Privileged accounts are not limited to built-in groups, but can also be groups that are delegated access to server administration, workstation administration, or other areas of your environment. |
326+
|**Reset passwords to privileged accounts** | Reset passwords of all [privileged accounts](/security/privileged-access-workstations/overview) in the environment. <br><br>**Note**: Privileged accounts are not limited to built-in groups, but can also be groups that are delegated access to server administration, workstation administration, or other areas of your environment. |
327327
|**Reset the krbtgt account** | Reset the **krbtgt** account twice using the [New-KrbtgtKeys](https://github.com/microsoft/New-KrbtgtKeys.ps1/blob/master/New-KrbtgtKeys.ps1) script. <br><br>**Note**: If you are using Read-Only Domain Controllers, you will need to run the script separately for Read-Write Domain Controllers and for Read-Only Domain Controllers. |
328328
|**Schedule a system restart** | After you validate that no persistence mechanisms created by the attacker exist or remain on your system, schedule a system restart to assist with removing memory-resident malware. |
329329
|**Reset the DSRM password** | Reset each domain controller’s DSRM (Directory Services Restore Mode) password to something unique and complex. |

0 commit comments

Comments
 (0)