Skip to content

Commit d8005d5

Browse files
author
Markus Vilcinskas
committed
workbook01
1 parent 6a54424 commit d8005d5

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory/reports-monitoring/workbook-sensitive-operations-report.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ This article provides you with an overview of this workbook.
3131

3232
## Description
3333

34-
![Workbook category](./media/workbook-sesitive-operations-report/workbook-category.png)
34+
![Workbook category](./media/workbook-sensitive-operations-report/workbook-category.png)
3535

3636
This workbook identifies recent sensitive operations that have been performed in your tenant and which may service principal compromise.
3737

@@ -43,7 +43,7 @@ If you organization is new to Azure monitor workbooks, you need to integrate you
4343

4444
This workbook is split into four sections:
4545

46-
![Workbook sections](./media/workbook-sesitive-operations-report/workbook-sections.png)
46+
![Workbook sections](./media/workbook-sensitive-operations-report/workbook-sections.png)
4747

4848

4949
- **Modified application and service principal credentials/authentication methods** - This report flags actors who have recently changed many service principal credentials, as well as how many of each type of service principal credentials have been changed.
@@ -80,7 +80,7 @@ In cases where the attacker cannot find a service principal or an application wi
8080
This section includes a breakdown of the AppOnly permissions grants to existing service principals. Admins should investigate any instances of excessive high permissions being granted, including, but not limited to, Exchange Online, Microsoft Graph and Azure AD Graph.
8181

8282

83-
## Directory role and group membership updates for service principals
83+
### Directory role and group membership updates for service principals
8484

8585
Following the logic of the attacker adding new permissions to existing service principals and applications, another approach is adding them to existing directory roles or groups.
8686

0 commit comments

Comments
 (0)