Skip to content

Commit 06a5f19

Browse files
Merge pull request #3814 from rlitinsky/patch-24
Update remote-calls-sam.md
2 parents 228c8b4 + 3330888 commit 06a5f19

File tree

1 file changed

+1
-8
lines changed

1 file changed

+1
-8
lines changed

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,18 +8,11 @@ ms.topic: how-to
88
# Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity
99

1010
> [!IMPORTANT]
11-
> Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. This change will happen automatically by the specified dates. No admin action is required.
11+
> The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. The change will occur automatically by the specified date, and no administrative action is required.
1212
>
1313
1414
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
1515

16-
> [!NOTE]
17-
> This feature can potentially be exploited by an adversary to obtain the NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
18-
> The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods.
19-
>
20-
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.
21-
> Please note that this will result in reduced data available for the [attack path feature in Exposure Management](/security-exposure-management/review-attack-paths).
22-
2316
This article describes the configuration changes required to allow the Defender for Identity Directory Services Account (DSA) to perform the SAM-R queries.
2417

2518
> [!TIP]

0 commit comments

Comments
 (0)