Skip to content

Commit 4d78bee

Browse files
committed
fix the note
1 parent 83261ea commit 4d78bee

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

ATPDocs/remove-discoverable-passwords-active-directory-account-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,10 @@ Removing exposed credentials from these attributes reduces the risk of identity
2626
## How does Microsoft Defender for Identity detect discoverable passwords?
2727

2828
> [!NOTE]
29-
> This security recommendation is part of Microsoft Defender for Identity and is powered by AI-based analysis of free-text attributes in Active Directory.
3029
> Findings can include false positives. Always validate the results before taking action.
3130
32-
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse. Microsoft Defender for Identity detects indicators such as:
31+
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse.
32+
This recommendation leverages GenAI-powered analysis of Active directory attributes to detect:
3333

3434
- Plaintext passwords or variations. For example, '`Password=Summer2024!'`
3535

0 commit comments

Comments
 (0)