Skip to content

Commit 2865d39

Browse files
authored
Merge branch 'main' into patch-3
2 parents 4e969e9 + 40b8b48 commit 2865d39

25 files changed

+185
-345
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
name: (Scheduled) Stale branch removal
2+
3+
permissions:
4+
contents: write
5+
6+
on:
7+
schedule:
8+
- cron: "0 */12 * * *"
9+
10+
workflow_dispatch:
11+
12+
13+
jobs:
14+
15+
stale-branch:
16+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-StaleBranch.yml@workflows-prod
17+
with:
18+
PayloadJson: ${{ toJSON(github) }}
19+
RepoBranchSkipList: '[
20+
"ExampleBranch1",
21+
"ExampleBranch2"
22+
]'
23+
ReportOnly: true
24+
secrets:
25+
AccessToken: ${{ secrets.GITHUB_TOKEN }}

ATPDocs/manage-security-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88
# Investigate Defender for Identity security alerts in Microsoft Defender XDR
99

1010
> [!NOTE]
11-
> Defender for Identity is not designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
11+
> Defender for Identity isn't designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
1212
1313
This article explains the basics of how to work with Microsoft Defender for Identity security alerts in [Microsoft Defender XDR](/microsoft-365/security/defender/overview-security-center).
1414

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: 'Security assessment: Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account'
3+
description: 'This report lists any Entra Connect AD DS Connector account that is an Enterprise Administrator or Domain Administrator.'
4+
author: LiorShapiraa # GitHub alias
5+
ms.author: Liorshapira # Microsoft alias
6+
# ms.prod: microsoft-defender-for-identity
7+
ms.topic: article
8+
ms.date: 03/16/2025
9+
---
10+
11+
# Security assessment: Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account
12+
13+
This article describes Microsoft Defender for Identity's Microsoft Entra Connect AD DS Connector account default admin security posture assessment report.
14+
15+
> [!NOTE]
16+
> This security assessment will be available only if Microsoft Defender for Identity sensor is installed on servers running Microsoft Entra Connect services.
17+
18+
## Why might using an Enterprise or Domain Admin account for the Microsoft Entra Connect AD DS Connector be a risk?
19+
20+
Smart attackers often target Microsoft Entra Connect in on-premises environments due to the elevated privileges associated with its AD DS Connector account (typically created in Active Directory with the MSOL_ prefix). Using an **Enterprise Admin** or **Domain Admin** account for this purpose significantly increases the attack surface, as these accounts have broad control over the directory.
21+
22+
Starting with [Entra Connect build 1.4.###.#](/entra/identity/hybrid/connect/reference-connect-accounts-permissions), Enterprise Admin and Domain Admin accounts can no longer be used as the AD DS Connector account. This best practice prevents over-privileging the connector account, reducing the risk of domain-wide compromise if the account is targeted by attackers. Organizations must now create or assign a lower-privileged account specifically for directory synchronization, ensuring better adherence to the principle of least privilege and protecting critical admin accounts.
23+
24+
## How do I use this security assessment to improve my hybrid organizational security posture?
25+
26+
1. Review the recommended action at[ https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account.
27+
28+
1. Review the exposed accounts and their group memberships. The list contains members of Domain/Enterprise Admins through direct and recursive membership.
29+
30+
1. Perform one of the following actions:
31+
32+
- Remove MSOL_ user account user from privileged groups, ensuring it retains the necessary permissions to function as the Entra Connect Connector account.
33+
34+
- Change the Entra Connect AD DS Connector account (MSOL_) to a lower-privileged account.
35+
36+
> [!NOTE]
37+
> While assessments are updated in near real time, scores and statuses are updated every 24 hours. While the list of impacted entities is updated within a few minutes of your implementing the recommendations, the status may still take time until it's marked as **Completed**.
38+
39+
## Next steps
40+
41+
- Learn more about [Microsoft Secure score]().
42+
43+
- Learn more about [Defender for Identity Sensor for Microsoft Entra Connect](https://aka.ms/MdiSensorForMicrosoftEntraConnectInstallation)
44+

ATPDocs/security-assessment.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,24 +38,30 @@ Defender for Identity security posture assessments have five key categories. Eac
3838
## Access Defender for Identity security posture assessments
3939

4040
> [!NOTE]
41-
You must have a Defender for Identity license to view Defender for Identity security posture assessments in Microsoft Secure Score.
42-
While *certificate template* assessments are available to all customers with AD CS installed in their environment, *certificate authority* assessments are available only to customers who have installed a sensor on an AD CS server. For more information, see [Configuring sensors for AD FS and AD CS](deploy/active-directory-federation-services.md).
41+
> You must have a Defender for Identity license to view Defender for Identity security posture assessments in Microsoft Secure Score.
42+
>
43+
> Additionally, while *certificate template* assessments are available to all customers with AD CS installed in their environment, *certificate authority* assessments are available only to customers who have installed a sensor on an AD CS server.
44+
>
45+
> Hybrid security recommendations will be available only if Microsoft Defender for Identity sensor is installed on servers running Microsoft Entra Connect services.
46+
>
47+
> For more information, see [Configuring sensors for AD FS, AD CS and Entra Connect.](https://aka.ms/DeployMdiSensorOnYourIdentityInfrastructure)
4348
4449
**To access identity security posture assessments**:
4550

4651
1. Open the [Microsoft Secure Score dashboard](https://security.microsoft.com/securescore).
4752
1. Select the **Recommended actions** tab. You can search for a particular recommended action, or filter the results (for example, by the category **Identity**).
4853

4954
[![Recommended actions.](media/recommended-actions.png)](media/recommended-actions.png#lightbox)
50-
55+
5156
1. For more details, select the assessment.
5257

5358
[![Select the assessment.](media/select-assessment.png)](media/select-assessment.png#lightbox)
54-
59+
5560
[!INCLUDE [secure-score-note](../includes/secure-score-note.md)]
5661

5762

5863
## Next steps
5964

6065
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
61-
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)
66+
- [Check out the Defender for Identity forum!](https://aka.ms/MDIcommunity)
67+

0 commit comments

Comments
 (0)