Skip to content

Commit 171f39b

Browse files
committed
add quotation marks around password never expires
1 parent 88c3b94 commit 171f39b

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

ATPDocs/service-account-discovery.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Service accounts are classified into several types:
1717
- sMSA (Managed Service Accounts): Designed for individual services on a single server rather than groups.
1818
- User Account: These standard user accounts are typically used for interactive logins but can also be configured to run services.
1919

20-
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria such as having a [Service Principal Name ](/windows/win32/ad/service-principal-names)(SPN) or password never expires assigned to them and classifies them as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
20+
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria such as having a [Service Principal Name ](/windows/win32/ad/service-principal-names)(SPN) or a "password never expires" attribute assigned, and classifies them as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
2121

2222
Service account types are displayed in the Identity Info table within Advanced Hunting.
2323

@@ -68,7 +68,7 @@ You can use the sort and filter functionality on each service account tab to get
6868
|**Tags** | Sensitive or Honey Token |
6969
|**Auth protocols** | Lists the available methods for verifying user identities, for example, Kerberos and NTLM (New Technology LAN Manager). |
7070
|**Sources** | The number of potential source logins. |
71-
|**Destinations** | When a service account is trying to access a destination server, the request is directed to the target system, which can include a number of resources on that server. These resources might be a database, a file server, or other services hosted on the server. |
71+
|**Destinations** | When a service account is trying to access a destination server, the request is directed to the target system, which can include many resources on that server. These resources might be a database, a file server, or other services hosted on the server. |
7272
|**Connections** | The number of unique connections made between sources and destinations. |
7373
|**Created** |The timestamp when the service account was first created. |
7474
|**Last updated** | The timestamp of the most recent update to the service account. |
@@ -79,7 +79,7 @@ You can use the sort and filter functionality on each service account tab to get
7979

8080
For a deeper dive into what's happening in your service account click on the domain name to see the following information:
8181

82-
When you investigate a specific Service account, you'll see the following details under the connections tab:
82+
When you investigate a specific Service account, you see the following details under the connections tab:
8383

8484
:::image type="content" source="media/screenshot-of-the-connections-page.png" alt-text="Screenshot of the connections page." lightbox="media/Screenshot-of-the-connections-page.png":::
8585

0 commit comments

Comments
 (0)