Skip to content

Commit 4c7c02f

Browse files
committed
add a section Create custom service account classification rules
1 parent f97c1cd commit 4c7c02f

File tree

1 file changed

+17
-0
lines changed

1 file changed

+17
-0
lines changed

ATPDocs/service-account-discovery.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,23 @@ When you investigate a specific Service account, you see the following details u
9696
Last seen | The date and time of the most recent sign in event over this connection. |
9797

9898

99+
### Create custom service account classification rules
100+
101+
Create custom service account classification rules to help you identify and classify service accounts based on specific criteria that are relevant to your organization. This allows you to tailor the service account discovery process to better suit your needs.
102+
103+
You can create custom service account classification rules by selecting the following supported filters:
104+
105+
- Account Display Name
106+
- Account Domain
107+
- Account Name
108+
- Organizational Unit
109+
110+
Service accounts discovered via the custom classifications are displayed on the Service Accounts page, alongside the automatically discovered service accounts that MDI identifies such as users with SPN + password set to never expire, gMSA, and sMSA.
111+
112+
> [!NOTE]
113+
> Service accounts labeled with the prefix srv are not detected.
114+
115+
99116
For more information about the following tabs, **Overview**, **Incidents and alerts**,**Observed in organization**, **Timeline**, and **Attack paths**, see: [Investigate assets](/defender-for-identity/investigate-assets#identity-details).
100117

101118
## Related content

0 commit comments

Comments
 (0)