You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/remove-discoverable-passwords-active-directory-account-attributes.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: 'Security Assessment: Remove Discoverable Passwords in Active Directory Account Attributes (Preview)'
3
3
description: Learn how to identify and address discoverable passwords in Active Directory account attributes to mitigate security risks and improve your organization's security posture.
4
-
ms.date: 08/04/2025
4
+
ms.date: 08/12/2025
5
5
ms.topic: how-to
6
6
---
7
7
@@ -10,7 +10,7 @@ ms.topic: how-to
10
10
11
11
## Why do discoverable passwords in Active Directory account attributes pose a risk?
12
12
13
-
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges—often without triggering traditional alerts.
13
+
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges.
14
14
15
15
Attackers seek low-friction paths to expand access. Exposed passwords in these attributes represent an easy win because:
16
16
@@ -26,12 +26,12 @@ Removing exposed credentials from these attributes reduces the risk of identity
26
26
## How does Microsoft Defender for Identity detect discoverable passwords?
27
27
28
28
> [!NOTE]
29
-
> This security recommendation is part of Microsoft Defender for Identity and is powered by AI-based analysis of free-text attributes in Active Directory.
30
29
> Findings can include false positives. Always validate the results before taking action.
31
30
32
-
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse. Microsoft Defender for Identity detects indicators such as:
31
+
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse.
32
+
This recommendation uses GenAI-powered analysis of Active directory attributes to detect:
33
33
34
-
- Plaintext passwords or variations. For example, '`Password=Summer2024!'`
34
+
- Plaintext passwords or variations. For example, '`Password=Summer2025!'`
35
35
36
36
- Credential patterns, reset hints, or sensitive account information.
Copy file name to clipboardExpand all lines: defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,6 +49,7 @@ For more information on what's new with other Microsoft Defender security produc
49
49
## July 2025
50
50
51
51
- (GA) [Microsoft Defender Core service](/defender-endpoint/microsoft-defender-core-service-overview) is now generally available on Windows Server 2019 or later. Helps with the stability and performance of Microsoft Defender Antivirus.
52
+
- Support for Azure Stack HCI OS is rolling out across commercial and government clouds.
0 commit comments