Skip to content

Commit 778c68e

Browse files
Merge pull request #4114 from MicrosoftDocs/main
[AutoPublish] main to live - 06/03 01:35 PDT | 06/03 14:05 IST
2 parents cf4231a + f97c1cd commit 778c68e

File tree

2 files changed

+0
-20
lines changed

2 files changed

+0
-20
lines changed

ATPDocs/alerts-overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,6 @@ The following table lists the mapping between alert names, their corresponding u
9898
| [Suspicious modifications to the AD CS security permissions/settings](persistence-privilege-escalation-alerts.md#suspicious-modifications-to-the-ad-cs-security-permissionssettings--external-id-2435) | 2435 | Medium | Privilege escalation |
9999
| [Account Enumeration reconnaissance (LDAP)](reconnaissance-discovery-alerts.md#account-enumeration-reconnaissance-ldap-external-id-2437-preview) (Preview) | 2437 | Medium | Account Discovery, Domain Account |
100100
| [Directory Services Restore Mode Password Change](other-alerts.md#directory-services-restore-mode-password-change-external-id-2438) | 2438 | Medium | Persistence, Account Manipulation |
101-
| [Honeytoken was queried via SAM-R](reconnaissance-discovery-alerts.md#honeytoken-was-queried-via-sam-r-external-id-2439) | 2439 | Low | Discovery |
102101
|[Group Policy Tampering ](/defender-for-identity/other-alerts)|2440|Medium|Defense evasion|
103102

104103
> [!NOTE]

ATPDocs/reconnaissance-discovery-alerts.md

Lines changed: 0 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -173,25 +173,6 @@ None
173173
|MITRE attack technique | [Account Discovery (T1087)](https://attack.mitre.org/techniques/T1087/), [Indirect Command Execution (T1202)](https://attack.mitre.org/techniques/T1202/), [Permission Groups Discovery (T1069)](https://attack.mitre.org/techniques/T1069/) |
174174
|MITRE attack sub-technique | [Domain Account (T1087.002)](https://attack.mitre.org/techniques/T1087/002/), [Domain Groups (T1069.002)](https://attack.mitre.org/techniques/T1069/002/) |
175175

176-
## Honeytoken was queried via SAM-R (external ID 2439)
177-
178-
**Severity**: Low
179-
180-
**Description**:
181-
182-
User reconnaissance is used by attackers to map the directory structure and target privileged accounts for later steps in their attack. The Security Account Manager Remote (SAM-R) protocol is one of the methods used to query the directory to perform this type of mapping.
183-
In this detection, Microsoft Defender for Identity will trigger this alert for any reconnaissance activities against a pre-configured [honeytoken user](entity-tags.md)
184-
185-
**Learning period**:
186-
187-
None
188-
189-
**MITRE**:
190-
191-
|Primary MITRE tactic |[Discovery (TA0007)](https://attack.mitre.org/tactics/TA0007/) |
192-
|---------|---------|
193-
|MITRE attack technique | [Account Discovery (T1087)](https://attack.mitre.org/techniques/T1087/)|
194-
|MITRE attack sub-technique | [Domain Account (T1087.002)](https://attack.mitre.org/techniques/T1087/002/)|
195176

196177
## Honeytoken was queried via LDAP (external ID 2429)
197178

0 commit comments

Comments
 (0)