You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/service-account-discovery.md
+31-31Lines changed: 31 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,20 +9,18 @@ ms.date: 03/25/2025
9
9
10
10
### What are Service Accounts?
11
11
12
-
Service accounts are specialized identities within the Active Directory that are used to run applications, services, and automated tasks. These accounts often require elevated privileges to perform their designated job. However, because they can't authenticate in the same way as human accounts, they typically don't benefit from the increased security of modern authentication methods like MFA (multifactor authentication). Given their potential elevated privilege and the inherent limitations of the access policies that govern them, careful management and monitoring are crucial to ensure they don't become a security vulnerability.
12
+
Service accounts are specialized identities within Active Directory used to run applications, services, and automated tasks. These accounts often require elevated privileges to perform their designated job. However, because they can't authenticate like human accounts, they typically don't benefit from the increased security of modern authentication methods like MFA (multifactor authentication). Given their potential elevated privilege and the inherent limitations of the access policies that govern them, careful management and monitoring are crucial to ensure they don't become a security vulnerability.
13
13
14
14
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria and classifies them as service accounts. These accounts are then surfaced, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
15
15
16
-
They can be broadly classified into several types, including:
16
+
Service accounts can be broadly classified into several types, including:
17
17
18
18
- gMSA (Group Managed Service Accounts): gMSAs provide a single identity solution for multiple services that require mutual authentication across multiple servers, as they allow Windows to handle password management, reducing administrative overhead.
19
19
- sMSA (Managed Service Accounts): Designed for individual services on a single server rather than groups.
20
20
- User Account: These standard user accounts are typically used for interactive logins but can also be configured to run services.
21
21
22
-
In addition to the inventory views, each of the accounts also has its own details page which is enriched with other data from across the Defender experience. Things like account creation date, last sign-in, recent activities, privileges, and criticality level provide valuable insights into the service accounts themselves. You can also take direct action on these identities, like disabling a user, directly within this view.
23
-
24
22
> [!NOTE]
25
-
> Service account tags are exposed within the Identity Info table within Advanced Hunting.
23
+
> Service account tags are exposed within the Identity Info table within Advanced Hunting.
26
24
27
25
28
26
### Navigate to the Identity inventory page
@@ -39,11 +37,10 @@ There are several options you can choose from to customize the identities list v
39
37
40
38
- Apply filters.
41
39
42
-
- Search for an identity by name or full UPN, Sid, and Object ID.
43
-
44
40
- Export the list to a CSV file.
45
41
46
-
- Copy list link with the included filters configured.
42
+
> [!NOTE]
43
+
> When exporting the Service accounts list to a CSV file, a maximum of 2000 Service accounts are displayed.
47
44
48
45
### Service account details
49
46
@@ -64,34 +61,37 @@ You can use the sort and filter functionality on each service account tab to get
64
61
- Display name: The full name of the identity as shown in the directory.
65
62
- SID: The Security Identifier, a unique value used to identify the identity in Active Directory.
66
63
- Domain: The Active Directory domain to which the identity belongs.
67
-
- Type: Specifies if the identity is a user account or service account.
68
-
- Criticality level: Indicates the critical level of the identity.
64
+
- Type: Specifies if the service account is gMSA (Group Managed Service Accounts), sMSA (Managed Service Accounts) or a user account.
65
+
- Criticality level: Indicates the critical level of the service account, ranging from low to very high.
69
66
- Tags: Sensitive or Honey Token
70
67
- Auth protocols: Lists the available methods for verifying user identities, for example, Kerberos and NTLM (New Technology LAN Manager).
71
-
- Service classes: Lists
72
-
- Sources: Indicates whether the identity is on-premises (originate from Active Directory), Cloud only (Microsoft Entra ID) or Hybrid (synced from AD to Microsoft Entra ID).
73
-
- Destinations -The number of resources the account is trying to access, such as a Domain Controller or remote desktop session.
74
-
- Connections:
75
-
- Created: The timestamp when the identity was first created.
76
-
- Last updated: The timestamp of the most recent update to the identity's attributes in Active Directory.
68
+
- Sources: The number of potential source logins.
69
+
- Destinations: The number of destinations the service account tried to access, such as a Domain Controller or remote desktop session.
70
+
- Connections: The number of connections made by the service account.
71
+
- Created: The timestamp when the service account was first created.
72
+
- Last updated: The timestamp of the most recent update to the service account.
77
73
78
74
### Service accounts overview
79
75
80
76
For a deeper dive into what's happening in your service account click on the domain name to see the following information:
81
77
82
78
**Connections**
83
-
Explore the connections made by these accounts, see insights into which machines were involved, their potential risk level, and identify abnormal interactions.
84
-
85
-
In order to capture network traffic we need to gather data from various places such as the device, service account, destination and what resource was requested.
86
-
87
-
Source: Where the network traffic or request originates from.
88
-
Source type: What kind of device or system is initiating the request. For example, server ,workstation, domain controller.
89
-
Source risk: Identicates the risk posed to the source from no risk to high risk.
90
-
Destination: Where the request is being directed to. The target system that the service account is trying to access. For example, when trying to access a destination server, there can be multiple resources on that server (e.g. a database and a file-server).
91
-
Destination type:
92
-
Auth protocols:
93
-
Service Class: A category of services within a network that defines the type of service being provided, often used for authentication and resource management. These include: Lightweight Directory Access Protoco (LDAP), Common Internet File System (CIFS), Remote Procedure Call (RPC), Remote Procedure Call Subsystem (RPCSS), "HTTP", Terminal Services (TERMSRV), and "HOST"
94
-
Count:
95
-
Last seen:
96
-
97
-
For more information about the following tabs, **Overview**, **Incidents and alerts**,**Observed in organization**, **Timeline**, and **Attack paths** see: [Investigate assets](/ATPDocs/investigate-assets.md#identity-details)
79
+
80
+
When you investigate a specific Service account, you'll see the following details under the connections tab:
|Source | Where the network traffic or request originates from. |
85
+
|Source type | What kind of device or system is initiating the request. For example, server, workstation or domain controller. |
86
+
|Source risk | Identicates the risk posed to the source from no risk to high risk. |
87
+
|Destination | Where the request is being directed to. The target system that the service account is trying to access. For example, when trying to access a destination server, there can be multiple resources on that server (for example, a database and a file-server). |
88
+
|Destination type | Server, Workstation or Domain controller. |
89
+
|Auth protocols | Kerberos and NTLM |
90
+
|Service Class | The services within a network that define the type of service being provided, often used for authentication and resource management. These include: Lightweight Directory Access Protocol (LDAP), Common Internet File System (CIFS), Remote Procedure Call (RPC), Remote Procedure Call Subsystem (RPCSS), "HTTP", Terminal Services (TERMSRV), and "HOST" |
91
+
|Count | How many sign in events occurred over this connection in the last 180 days.
92
+
Last seen | The date and time of the most recent sign in event over this connection. |
93
+
94
+
For more information about the following tabs, **Overview**, **Incidents and alerts**,**Observed in organization**, **Timeline**, and **Attack paths**, see: [Investigate assets](/defender-for-identity/investigate-assets#identity-details)
95
+
96
+
97
+
If you run into any problems, we're here to help. To get assistance or support for your product issue, see how to open a support ticket at [Microsoft Defender for Identity support](support.md)
0 commit comments