Skip to content

Commit 31e447f

Browse files
committed
article updates
1 parent d13b724 commit 31e447f

File tree

2 files changed

+32
-32
lines changed

2 files changed

+32
-32
lines changed

ATPDocs/service-account-discovery.md

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -9,20 +9,18 @@ ms.date: 03/25/2025
99

1010
### What are Service Accounts?
1111

12-
Service accounts are specialized identities within the Active Directory that are used to run applications, services, and automated tasks. These accounts often require elevated privileges to perform their designated job. However, because they can't authenticate in the same way as human accounts, they typically don't benefit from the increased security of modern authentication methods like MFA (multifactor authentication). Given their potential elevated privilege and the inherent limitations of the access policies that govern them, careful management and monitoring are crucial to ensure they don't become a security vulnerability.
12+
Service accounts are specialized identities within Active Directory used to run applications, services, and automated tasks. These accounts often require elevated privileges to perform their designated job. However, because they can't authenticate like human accounts, they typically don't benefit from the increased security of modern authentication methods like MFA (multifactor authentication). Given their potential elevated privilege and the inherent limitations of the access policies that govern them, careful management and monitoring are crucial to ensure they don't become a security vulnerability.
1313

1414
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria and classifies them as service accounts. These accounts are then surfaced, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
1515

16-
They can be broadly classified into several types, including:
16+
Service accounts can be broadly classified into several types, including:
1717

1818
- gMSA (Group Managed Service Accounts): gMSAs provide a single identity solution for multiple services that require mutual authentication across multiple servers, as they allow Windows to handle password management, reducing administrative overhead.
1919
- sMSA (Managed Service Accounts): Designed for individual services on a single server rather than groups.
2020
- User Account: These standard user accounts are typically used for interactive logins but can also be configured to run services.
2121

22-
In addition to the inventory views, each of the accounts also has its own details page which is enriched with other data from across the Defender experience. Things like account creation date, last sign-in, recent activities, privileges, and criticality level provide valuable insights into the service accounts themselves. You can also take direct action on these identities, like disabling a user, directly within this view.
23-
2422
> [!NOTE]
25-
> Service account tags are exposed within the Identity Info table within Advanced Hunting.
23+
> Service account tags are exposed within the Identity Info table within Advanced Hunting.
2624
2725

2826
### Navigate to the Identity inventory page
@@ -39,11 +37,10 @@ There are several options you can choose from to customize the identities list v
3937

4038
- Apply filters.
4139

42-
- Search for an identity by name or full UPN, Sid, and Object ID.
43-
4440
- Export the list to a CSV file.
4541

46-
- Copy list link with the included filters configured.
42+
> [!NOTE]
43+
> When exporting the Service accounts list to a CSV file, a maximum of 2000 Service accounts are displayed.
4744
4845
### Service account details
4946

@@ -64,34 +61,37 @@ You can use the sort and filter functionality on each service account tab to get
6461
- Display name: The full name of the identity as shown in the directory.
6562
- SID: The Security Identifier, a unique value used to identify the identity in Active Directory.
6663
- Domain: The Active Directory domain to which the identity belongs.
67-
- Type: Specifies if the identity is a user account or service account.
68-
- Criticality level: Indicates the critical level of the identity.
64+
- Type: Specifies if the service account is gMSA (Group Managed Service Accounts), sMSA (Managed Service Accounts) or a user account.
65+
- Criticality level: Indicates the critical level of the service account, ranging from low to very high.
6966
- Tags: Sensitive or Honey Token
7067
- Auth protocols: Lists the available methods for verifying user identities, for example, Kerberos and NTLM (New Technology LAN Manager).
71-
- Service classes: Lists
72-
- Sources: Indicates whether the identity is on-premises (originate from Active Directory), Cloud only (Microsoft Entra ID) or Hybrid (synced from AD to Microsoft Entra ID).
73-
- Destinations -The number of resources the account is trying to access, such as a Domain Controller or remote desktop session.
74-
- Connections:
75-
- Created: The timestamp when the identity was first created.
76-
- Last updated: The timestamp of the most recent update to the identity's attributes in Active Directory.
68+
- Sources: The number of potential source logins.
69+
- Destinations: The number of destinations the service account tried to access, such as a Domain Controller or remote desktop session.
70+
- Connections: The number of connections made by the service account.
71+
- Created: The timestamp when the service account was first created.
72+
- Last updated: The timestamp of the most recent update to the service account.
7773

7874
### Service accounts overview
7975

8076
For a deeper dive into what's happening in your service account click on the domain name to see the following information:
8177

8278
**Connections**
83-
Explore the connections made by these accounts, see insights into which machines were involved, their potential risk level, and identify abnormal interactions.
84-
85-
In order to capture network traffic we need to gather data from various places such as the device, service account, destination and what resource was requested.
86-
87-
Source: Where the network traffic or request originates from.
88-
Source type: What kind of device or system is initiating the request. For example, server ,workstation, domain controller.
89-
Source risk: Identicates the risk posed to the source from no risk to high risk.
90-
Destination: Where the request is being directed to. The target system that the service account is trying to access. For example, when trying to access a destination server, there can be multiple resources on that server (e.g. a database and a file-server).
91-
Destination type:
92-
Auth protocols:
93-
Service Class: A category of services within a network that defines the type of service being provided, often used for authentication and resource management. These include: Lightweight Directory Access Protoco (LDAP), Common Internet File System (CIFS), Remote Procedure Call (RPC), Remote Procedure Call Subsystem (RPCSS), "HTTP", Terminal Services (TERMSRV), and "HOST"
94-
Count:
95-
Last seen:
96-
97-
For more information about the following tabs, **Overview**, **Incidents and alerts**,**Observed in organization**, **Timeline**, and **Attack paths** see: [Investigate assets](/ATPDocs/investigate-assets.md#identity-details)
79+
80+
When you investigate a specific Service account, you'll see the following details under the connections tab:
81+
82+
|Service account connection details |Description |
83+
|---------|---------|
84+
|Source | Where the network traffic or request originates from. |
85+
|Source type | What kind of device or system is initiating the request. For example, server, workstation or domain controller. |
86+
|Source risk | Identicates the risk posed to the source from no risk to high risk. |
87+
|Destination | Where the request is being directed to. The target system that the service account is trying to access. For example, when trying to access a destination server, there can be multiple resources on that server (for example, a database and a file-server). |
88+
|Destination type | Server, Workstation or Domain controller. |
89+
|Auth protocols | Kerberos and NTLM |
90+
|Service Class | The services within a network that define the type of service being provided, often used for authentication and resource management. These include: Lightweight Directory Access Protocol (LDAP), Common Internet File System (CIFS), Remote Procedure Call (RPC), Remote Procedure Call Subsystem (RPCSS), "HTTP", Terminal Services (TERMSRV), and "HOST" |
91+
|Count | How many sign in events occurred over this connection in the last 180 days.
92+
Last seen | The date and time of the most recent sign in event over this connection. |
93+
94+
For more information about the following tabs, **Overview**, **Incidents and alerts**,**Observed in organization**, **Timeline**, and **Attack paths**, see: [Investigate assets](/defender-for-identity/investigate-assets#identity-details)
95+
96+
97+
If you run into any problems, we're here to help. To get assistance or support for your product issue, see how to open a support ticket at [Microsoft Defender for Identity support](support.md)

ATPDocs/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Microsoft Defender for Identity now includes a Service Account Discovery capabil
3131

3232
This update provides:
3333

34-
- Automatic identification of Group Managed Service Accounts) ,Managed Service Accounts, and user accounts operating as service accounts.
34+
- Automatic identification of Group Managed Service Accounts ,Managed Service Accounts, and user accounts operating as service accounts.
3535

3636
- A centralized Service Accounts inventory, displaying key attributes like account type, authentication activity, privileges, and criticality.
3737

0 commit comments

Comments
 (0)