Skip to content

Commit 64c3193

Browse files
committed
article updates
1 parent b35f195 commit 64c3193

File tree

3 files changed

+8
-6
lines changed

3 files changed

+8
-6
lines changed
119 KB
Loading

ATPDocs/service-account-discovery.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,14 +11,14 @@ ms.date: 03/25/2025
1111

1212
Service accounts are specialized identities within Active Directory used to run applications, services, and automated tasks. These accounts often require elevated privileges to perform their designated job. However, because they can't authenticate in the same way as human accounts, they typically don't benefit from the increased security of modern authentication methods like MFA (multifactor authentication). Given their potential elevated privilege and the inherent limitations of the access policies that govern them, careful management and monitoring are crucial to ensure they don't become a security vulnerability.
1313

14-
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria and classifies them as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
15-
1614
Service accounts can be broadly classified into several types, including:
1715

1816
- gMSA (Group Managed Service Accounts): gMSAs provide a single identity solution for multiple services that require mutual authentication across multiple servers, as they allow Windows to handle password management, reducing administrative overhead.
1917
- sMSA (Managed Service Accounts): Designed for individual services on a single server rather than groups.
2018
- User Account: These standard user accounts are typically used for interactive logins but can also be configured to run services.
2119

20+
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria and classifies them as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
21+
2222
> [!NOTE]
2323
> Service account tags are exposed within the Identity Info table within Advanced Hunting.
2424
@@ -44,7 +44,6 @@ There are several options you can choose from to customize the identities list v
4444
4545
### Service account details
4646

47-
4847
- Total: The total number of service accounts listed.
4948

5049
- Managed: The total number of service accounts that are gMSA (Group Managed Service Accounts) or sMSA (Managed Service Accounts)
@@ -66,8 +65,8 @@ You can use the sort and filter functionality on each service account tab to get
6665
- Tags: Sensitive or Honey Token
6766
- Auth protocols: Lists the available methods for verifying user identities, for example, Kerberos and NTLM (New Technology LAN Manager).
6867
- Sources: The number of potential source logins.
69-
- Destinations: The number of destinations the service account tried to access, such as a Domain Controller or remote desktop session.
70-
- Connections: The number of connections made by the service account.
68+
- Destinations: When a service account is trying to access a destination server, the request is directed to the target system, which can include a number of resources on that server. These resources might be a database, a file server, or other services hosted on the server.
69+
- Connections: The number of unique connections made between sources and destinations.
7170
- Created: The timestamp when the service account was first created.
7271
- Last updated: The timestamp of the most recent update to the service account.
7372

@@ -91,6 +90,9 @@ When you investigate a specific Service account, you'll see the following detail
9190
|Count | How many sign in events occurred over this connection in the last 180 days.
9291
Last seen | The date and time of the most recent sign in event over this connection. |
9392

93+
:::image type="content" source="media/Screenshot-of-the-connections-page.png" alt-text="Screenshot of the connections page" lightbox="media/Screenshot-of-the-connections-page.png":::
94+
95+
9496
For more information about the following tabs, **Overview**, **Incidents and alerts**,**Observed in organization**, **Timeline**, and **Attack paths**, see: [Investigate assets](/defender-for-identity/investigate-assets#identity-details)
9597

9698

ATPDocs/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ This update provides:
3333

3434
- Automatic identification of Group Managed Service Accounts, Managed Service Accounts, and user accounts operating as service accounts.
3535

36-
- A centralized Service Accounts inventory, displaying key attributes like account type, authentication activity, privileges, and criticality.
36+
- A centralized Service Accounts inventory, displaying key attributes like account type, authentication type, unique connections, last log-on, service class and criticality.
3737

3838
For more information, see: [Investigate and protect Service Accounts | Microsoft Defender for Identity](service-account-discovery.md)
3939

0 commit comments

Comments
 (0)