You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/service-account-discovery.md
+25-5Lines changed: 25 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.topic: conceptual
5
5
ms.date: 03/25/2025
6
6
---
7
7
8
-
# Investigate and protect Service Accounts | Microsoft Defender for Identity
8
+
# Investigate and protect Service Accounts
9
9
10
10
### What are Service Accounts?
11
11
@@ -17,7 +17,7 @@ Service accounts are classified into several types:
17
17
- sMSA (Managed Service Accounts): Designed for individual services on a single server rather than groups.
18
18
- User Account: These standard user accounts are typically used for interactive logins but can also be configured to run services.
19
19
20
-
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria.These criteria include having a [Service Principal Name](/windows/win32/ad/service-principal-names)(SPN) or a "password never expires" attribute assigned. The feature then classifies these accounts as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
20
+
The auto discovery feature quickly identifies gMSA and sMSA accounts and user accounts within Active Directory that meet specific criteria.These criteria include having a [Service Principal Name](/windows/win32/ad/service-principal-names)(SPN) or a "password never expires" attribute assigned. The feature then classifies these accounts as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
21
21
22
22
Service account types are displayed in the Identity Info table within Advanced Hunting.
23
23
@@ -77,7 +77,7 @@ You can use the sort and filter functionality on each service account tab to get
77
77
### Connections
78
78
79
79
80
-
For a deeper dive into what's happening in your service account click on the domain name to see the following information:
80
+
For a deeper dive into what's happening in your service account select the domain name to see the following information:
81
81
82
82
When you investigate a specific Service account, you see the following details under the connections tab:
83
83
@@ -96,10 +96,30 @@ When you investigate a specific Service account, you see the following details u
96
96
Last seen | The date and time of the most recent sign in event over this connection. |
97
97
98
98
99
-
For more information about the following tabs, **Overview**, **Incidents and alerts**,**Observed in organization**, **Timeline**, and **Attack paths**, see: [Investigate assets](/defender-for-identity/investigate-assets#identity-details).
99
+
### Define Service Account classification rules
100
+
101
+
Service account classification rules let you define your own criteria for identifying service accounts. These rules help you include service accounts that Defender for Identity doesn't identify automatically. For example, some organizations name all their service accounts with a prefix like `srv`. Defender for Identity doesn't automatically detect such naming conventions. By creating a classification rule based on that pattern, you can include those accounts in the Service accounts view.
102
+
103
+
Classification rules work alongside Defender for Identity’s automatic discovery and provide a more complete and customized view of service accounts in your environment.
104
+
105
+
To create a rule:
106
+
107
+
1. Go to Settings > Microsoft Defender XDR > Service accounts classification.
108
+
1. Select on **+ Create a new rule**.
109
+
1. Enter a name for the rule.
110
+
2. Optional: Add a description.
111
+
1. Select one or more of the following filters:
112
+
-**Account display name**
113
+
-**Account domain**
114
+
-**Account SAM name**
115
+
-**Organizational unit**
116
+
1. Select Create to save the rule.
117
+
118
+
119
+
For more information about Defender for Identity details, see: [Investigate assets](/defender-for-identity/investigate-assets#identity-details).
100
120
101
121
## Related content
102
122
-[Service principal names](/windows/win32/ad/service-principal-names)
103
123
-[How to configure SPN](/windows-server/identity/ad-ds/manage/how-to-configure-spn?tabs=add%2Caduc)
104
124
105
-
If you run into any problems, we're here to help. To get assistance or support for your product issue, see how to open a support ticket at [Microsoft Defender for Identity support](support.md).
125
+
If you run into any problems, we're here to help. To get assistance or support for your product issue, see how to open a support ticket at [Microsoft Defender for Identity support](support.md).
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+23-14Lines changed: 23 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,6 +26,7 @@ For updates about versions and features released six months ago or earlier, see
26
26
## June 2025
27
27
28
28
29
+
29
30
### Okta integration is now available in Microsoft Defender for Identity
30
31
31
32
Microsoft Defender for Identity now supports integration with Okta, enabling detection of identity-based threats across cloud and on-premises environments. This integration helps identify suspicious sign-ins, risky role assignments, and potential privilege misuse within your Okta environment.
@@ -34,6 +35,14 @@ For prerequisites and configuration steps, see [Integrate Okta with Microsoft De
34
35
35
36
### Microsoft Defender For Identity PowerShell module updates (version 1.0.0.4)
36
37
38
+
### Service account classification rules now available
39
+
40
+
You can now create custom classification rules to identify service accounts based on your organization’s specific criteria. This complements automatic discovery, enabling more accurate identification of service accounts.
41
+
For more information, see [Service account discovery](service-account-discovery.md)
42
+
43
+
### Defender For Identity PowerShell module updates (version 1.0.0.4)
44
+
45
+
37
46
New Features and Improvements:
38
47
- Added remote domain functionality.
39
48
- Added SensorType parameter to Test-MDISensorApiConnection to inform endpoint URL.
@@ -55,11 +64,11 @@ Defender for Identity now supports deploying its new sensor on Domain Controller
55
64
56
65
57
66
### Improved Visibility into Defender for Identity New Sensor Eligibility in the Activation page
58
-
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify non-eligible servers and take action to update and onboard them for enhanced identity protection.
67
+
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify noneligible servers and take action to update and onboard them for enhanced identity protection.
59
68
60
69
61
70
### Local administrators collection (using SAM-R queries) feature will be disabled
62
-
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change will occur automatically by the specified date, and no administrative action is required.
71
+
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change occurs automatically by the specified date, and no administrative action is required.
63
72
64
73
### New Health Issue
65
74
@@ -190,7 +199,7 @@ For more information, see:
190
199
The new Identity security posture assessments (ISPMs) can help customers monitor misconfiguration by watching for weak spots and reduce the risk of potential attack on on-premises infrastructure.
191
200
These new identity recommendations, as part of Microsoft Secure Score, are new security posture reports related to Active Directory infrastructure and Group policy Objects:
192
201
193
-
-[Accounts with non-default Primary Group ID](/defender-for-identity/accounts-with-non-default-pgid)
202
+
-[Accounts with nondefault Primary Group ID](/defender-for-identity/accounts-with-non-default-pgid)
194
203
195
204
-[Change Domain Controller computer account old password](/defender-for-identity/domain-controller-account-password-change)
196
205
@@ -232,7 +241,7 @@ As part of our ongoing effort to enhance Microsoft Defender for Identity coverag
232
241
***Suspicious Interactive Logon to the Microsoft Entra Connect Server**
233
242
* Direct logins to Microsoft Entra Connect servers are highly unusual and potentially malicious. Attackers often target these servers to steal credentials for broader network access. Microsoft Defender for Identity can now detect abnormal logins to Microsoft Entra Connect servers, helping you identify and respond to these potential threats faster. It's specifically applicable when the Microsoft Entra Connect server is a standalone server and not operating as a Domain Controller.
234
243
***User Password Reset by Microsoft Entra Connect Account**
235
-
* The Microsoft Entra Connect connector account often holds high privileges, including the ability to reset user’s passwords. Microsoft Defender for Identity now has visibility into those actions and will detect any usage of those permissions that were identified as malicious and non-legitimate. This alert will be triggered only if the [password writeback feature](/entra/identity/authentication/concept-sspr-writeback) is disabled.
244
+
* The Microsoft Entra Connect connector account often holds high privileges, including the ability to reset user’s passwords. Microsoft Defender for Identity now has visibility into those actions and will detect any usage of those permissions that were identified as malicious and non-legitimate. This alert is triggered only if the [password writeback feature](/entra/identity/authentication/concept-sspr-writeback) is disabled.
236
245
***Suspicious writeback by Microsoft Entra Connect on a sensitive user**
237
246
* While Microsoft Entra Connect already prevents writeback for users in privileged groups, Microsoft Defender for Identity expands this protection by identifying additional types of sensitive accounts. This enhanced detection helps prevent unauthorized password resets on critical accounts, which can be a crucial step in advanced attacks targeting both cloud and on-premises environments.
238
247
@@ -261,7 +270,7 @@ For more information, see:
261
270
262
271
## July 2024
263
272
264
-
6 New detections are new in public preview:
273
+
Six New detections are new in public preview:
265
274
***Possible NetSync attack**
266
275
* NetSync is a module in Mimikatz, a post-exploitation tool, that requests the password hash of a target device's password by pretending to be a domain controller. An attacker might be performing malicious activities inside the network using this feature to gain access to the organization's resources.
267
276
***Possible takeover of a Microsoft Entra seamless SSO account**
@@ -312,7 +321,7 @@ With this data customers can now easily create their own [custom detection rules
Now, you can copy our recommended query as provided below, and click on “Create detection rule”. Please be aware that our provided query also tracks failed logon attempts, which may generate information unrelated to a potential attack. Therefore, feel free to customize the query to suit your specific requirements.
324
+
Now, you can copy our recommended query as provided below, and click on “Create detection rule”. Be aware that our provided query also tracks failed logon attempts, which may generate information unrelated to a potential attack. Therefore, feel free to customize the query to suit your specific requirements.
316
325
317
326
318
327
```
@@ -484,13 +493,13 @@ This version includes improvements and bug fixes for cloud services and the Defe
484
493
> [!NOTE]
485
494
> If you're seeing a decreased number of *Remote code execution attempt* alerts, see our updated [September announcements](#september-2023), which include an [update to the Defender for Identity detection logic](#decreased-number-of-alerts-for-remote-code-execution-attempts). Defender for Identity continues to record the remote code execution activities as before.
486
495
487
-
### New Identities area and dashboard in Microsoft 365 Defender (Preview)
496
+
### New Identities area and dashboard in Microsoft Defender XDR (Preview)
488
497
489
-
Defender for Identity customers now have a new **Identities** area in Microsoft 365 Defender for information about identity security with Defender for Identity.
498
+
Defender for Identity customers now have a new **Identities** area in Microsoft Defender XDR for information about identity security with Defender for Identity.
490
499
491
-
In Microsoft 365 Defender, select **Identities** to see any of the following new pages:
500
+
In Microsoft Defender XDR, select **Identities** to see any of the following new pages:
492
501
493
-
-**Dashboard**: This page shows graphs and widgets to help you monitor identity threat detection and response activities. For example:
502
+
-**Dashboard**: This page shows graphs and widgets to help you monitor identity threat detection and response activities. For example:
@@ -506,7 +515,7 @@ This version includes improvements and bug fixes for cloud services and the Defe
506
515
507
516
### Security posture assessments for AD CS sensors (Preview)
508
517
509
-
Defender for Identity's security posture assessments proactively detect and recommend actions across your on-premises Active Directory configurations.
518
+
Defenders for Identity's security posture assessments proactively detect and recommend actions across your on-premises Active Directory configurations.
510
519
511
520
Recommended actions now include the following new security posture assessments, specifically for certificate templates and certificate authorities.
512
521
@@ -524,7 +533,7 @@ Recommended actions now include the following new security posture assessments,
-[Enforce encryption for RPC certificate enrollment interface (ESC11)](security-assessment-enforce-encryption-rpc.md)
526
535
527
-
The new assessments are available in Microsoft Secure Score, surfacing security issues and severe misconfigurations that pose risks to the entire organization, alongside detections. Your score is updated accordingly.
536
+
The new assessments are available in Microsoft Secure Score, surfacing security issues, and severe misconfigurations that pose risks to the entire organization, alongside detections. Your score is updated accordingly.
528
537
529
538
For example:
530
539
@@ -533,7 +542,7 @@ For example:
533
542
For more information, see [Microsoft Defender for Identity's security posture assessments](security-assessment.md).
534
543
535
544
> [!NOTE]
536
-
> While *certificate template* assessments are available to all customers that have AD CS installed on their environment, *certificate authority* assessments are available only to customers who've installed a sensor on an AD CS server. For more information, see [New sensor type for Active Directory Certificate Services (AD CS)](#new-sensor-type-for-active-directory-certificate-services-ad-cs).
545
+
> While *certificate template* assessments are available to all customers that have AD CS installed on their environment, *certificate authority* assessments are available only to customers who have installed a sensor on an AD CS server. For more information, see [New sensor type for Active Directory Certificate Services (AD CS)](#new-sensor-type-for-active-directory-certificate-services-ad-cs).
537
546
538
547
### Defender for Identity release 2.223
539
548
@@ -606,7 +615,7 @@ While this change results in a decreased number of *Remote code execution attemp
606
615
607
616
### Alert sensitivity settings and learning period enhancements
608
617
609
-
Some Defender for Identity alerts wait for a *learning period* before alerts are triggered, while building a profile of patterns to use when distinguishing between legitimate and suspicious activities.
618
+
Some Defenders for Identity alerts wait for a *learning period* before alerts are triggered, while building a profile of patterns to use when distinguishing between legitimate and suspicious activities.
610
619
611
620
Defender for Identity now provides the following enhancements for the learning period experience:
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/behaviors.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.topic: conceptual
6
6
#CustomerIntent: As a Defender for Cloud Apps customer, I want to understand how behaviors work so that I can investigate more effectively.
7
7
---
8
8
9
-
# Investigate behaviors with advanced hunting (Preview)
9
+
# Investigate behaviors with advanced hunting
10
10
11
11
12
12
@@ -57,7 +57,7 @@ This process aims to remove policies from alerts that give low-quality detection
57
57
58
58
1. (Complete) Defender for Cloud Apps sends behaviors in parallel to alerts.
59
59
60
-
1. (Currently in Preview) Policies that generate behaviors are now disabled by default, and don't send alerts.
60
+
1. (Complete) Policies that generate behaviors are now disabled by default, and don't send alerts.
61
61
62
62
1. Move to a cloud-managed detection model, removing customer-facing policies completely. This phase is planned to provide both custom detections and selected alerts generated by internal policies for high-fidelity, security-focused scenarios.
0 commit comments