You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/service-account-discovery.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ Service accounts are classified into several types:
17
17
- sMSA (Managed Service Accounts): Designed for individual services on a single server rather than groups.
18
18
- User Account: These standard user accounts are typically used for interactive logins but can also be configured to run services.
19
19
20
-
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria such as having a [Service Principal Name ](/windows/win32/ad/service-principal-names)(SPN) or password never expires assigned to them and classifies them as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
20
+
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria such as having a [Service Principal Name ](/windows/win32/ad/service-principal-names)(SPN) or a "password never expires" attribute assigned, and classifies them as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
21
21
22
22
Service account types are displayed in the Identity Info table within Advanced Hunting.
23
23
@@ -68,7 +68,7 @@ You can use the sort and filter functionality on each service account tab to get
68
68
|**Tags**| Sensitive or Honey Token |
69
69
|**Auth protocols**| Lists the available methods for verifying user identities, for example, Kerberos and NTLM (New Technology LAN Manager). |
70
70
|**Sources**| The number of potential source logins. |
71
-
|**Destinations**| When a service account is trying to access a destination server, the request is directed to the target system, which can include a number of resources on that server. These resources might be a database, a file server, or other services hosted on the server. |
71
+
|**Destinations**| When a service account is trying to access a destination server, the request is directed to the target system, which can include many resources on that server. These resources might be a database, a file server, or other services hosted on the server. |
72
72
|**Connections**| The number of unique connections made between sources and destinations. |
73
73
|**Created**|The timestamp when the service account was first created. |
74
74
|**Last updated**| The timestamp of the most recent update to the service account. |
@@ -79,7 +79,7 @@ You can use the sort and filter functionality on each service account tab to get
79
79
80
80
For a deeper dive into what's happening in your service account click on the domain name to see the following information:
81
81
82
-
When you investigate a specific Service account, you'll see the following details under the connections tab:
82
+
When you investigate a specific Service account, you see the following details under the connections tab:
83
83
84
84
:::image type="content" source="media/screenshot-of-the-connections-page.png" alt-text="Screenshot of the connections page." lightbox="media/Screenshot-of-the-connections-page.png":::
0 commit comments