Skip to content

Commit 4c92c39

Browse files
authored
Merge pull request #5561 from AbbyMSFT/posture-assessment-leaked-credentials
New posture assessment in accounts category - leaked credenials
2 parents e7c7519 + e469dc9 commit 4c92c39

File tree

2 files changed

+27
-3
lines changed

2 files changed

+27
-3
lines changed

defender-for-identity/security-posture-assessments/accounts.md

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: 'Accounts security posture assessment'
33
ms.service: microsoft-defender-for-identity
44
ms.topic: article
5-
ms.date: 09/15/2025
5+
ms.date: 11/11/2025
66
ms.reviewer: LiorShapiraa
77
description: Lists all Microsoft Defender for Identity security posture assessments for Active Directory accounts, with detailed impacts and remediation steps to help improve your Secure Score.
88
---
@@ -165,6 +165,26 @@ If the KRBTGT account's password is compromised, an attacker can use its hash to
165165
> The krbtgt Kerberos account in all Active Directory domains supports key storage in all Kerberos Key Distribution Centers (KDC). To renew the Kerberos keys for TGT encryption, periodically change the krbtgt account password. It's recommended to use the [Microsoft-provided script.](https://github.com/microsoft/New-KrbtgtKeys.ps1)
166166
> When resetting the password twice, wait at least 10 hours between resets to avoid Kerberos authentication issues. This wait time is enforced by the script and aligns with best practices.
167167
168+
## Change password for on-prem account with potentially leaked credentials (Preview)
169+
170+
**Description**
171+
172+
This report lists users whose valid credentials have been leaked. When cybercriminals compromise valid passwords of legitimate users, the criminals often share those credentials. This is usually done by posting them publicly on the dark web or paste sites or by trading or selling the credentials on the black market. The Microsoft leaked credentials service acquires username/password pairs by monitoring public and dark web sites and by working with Researchers Law enforcement Security teams at Microsoft Other trusted sources.
173+
174+
**User impact**
175+
176+
When the service acquires user credentials from the dark web, paste sites or the above sources,an account with compromised credentials can be exploited by malicious actors to gain unauthorized access.
177+
178+
**Implementation**
179+
180+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for **Change password for accounts with potentially leaked credentials**.
181+
1. Review the list of exposed entities to discover which of your account passwords were leaked.
182+
1. Take appropriate actions on those entities by removing the service account:
183+
1. Open the Active Directory Users and Computers (ADUC) console and sign in with an administrator account.
184+
2. Navigate to the organizational unit (OU) where the user account is located.
185+
3. Find and select the user account that needs a password change.
186+
4. Right-click on the user account, select **Reset Password**, enter the new password, and confirm it.
187+
168188

169189
## Change password of built-in domain Administrator account
170190

@@ -593,4 +613,4 @@ For example, if the **PasswordNotRequired** attribute is enabled, an attacker ca
593613
## Next steps
594614
595615
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
596-
- [Check out the Defender for Identity forum!](https://aka.ms/MDIcommunity)
616+
- [Check out the Defender for Identity forum!](https://aka.ms/MDIcommunity)

defender-for-identity/whats-new.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,11 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## November 2025
2727

28-
### Expansion of identity scoping - support for Organizational units (preview)
28+
### New security posture assessment: Change password for on-prem account with potentially leaked credentials (Preview)
29+
30+
The new security posture assessment lists users whose valid credentials have been leaked. For more information, see: [Change password for on-prem account with potentially leaked credentials(Preview)](/defender-for-identity/security-posture-assessments/accounts#change-password-for-on-prem-account-with-potentially-leaked-credentials-preview)
31+
32+
### Expansion of identity scoping - support for Organizational units (Preview)
2933

3034
In addition to the GA release of scoping by Active Directory domains a few months ago, you can now scope by **Organizational Units (OUs)** as part of XDR User Role-Based Access Control (URBAC). This enhancement provides even more granular control over which entities and resources are included in security analysis.
3135
For more information, see [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).

0 commit comments

Comments
 (0)