Skip to content

Commit 7a1b185

Browse files
authored
Fix markdown formatting issues
1 parent 5f7b76d commit 7a1b185

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

ATADocs/whats-new-version-1.7.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -41,41 +41,41 @@ The update to ATA 1.7 provides improvements in the following areas:
4141
### New & updated detections
4242

4343

44-
- **Reconnaissance using Directory Services Enumeration**
44+
- **Reconnaissance using Directory Services Enumeration**:
4545
As part of the reconnaissance phase, attackers gather information about the entities in the network using different methods. Directory services enumeration using the SAM-R protocol enables attackers to obtain the list of users and groups in a domain and understand the interaction between the different entities.
4646

47-
- **Pass-the-Hash Enhancements**
47+
- **Pass-the-Hash Enhancements**:
4848
To enhance Pass-the-Hash detection, we added additional behavioral models for the authentication patterns of entities. These models enable ATA to correlate entity behavior with suspicious NTLM authentications, and differentiate real Pass-the-Hash attacks from the behavior of false positive scenarios.
4949

50-
- **Pass-the-Ticket Enhancements**
50+
- **Pass-the-Ticket Enhancements**:
5151
To successfully detect advanced attacks in general and Pass-the-Ticket in particular, the correlation between an IP address and the computer account must be accurate. This is a challenge in environments where IP addresses change rapidly by design (for example Wi-Fi networks and multiple virtual machines sharing the same host). To overcome this challenge and improve the accuracy of the Pass-the-Ticket detection, ATA’s Network Name Resolution (NNR) mechanism was improved significantly to reduce false-positives.
5252

53-
- **Abnormal Behavior Enhancements**
53+
- **Abnormal Behavior Enhancements**:
5454
In ATA 1.7, NTLM authentication data was added as a data source for the abnormal behavior detections, providing the algorithms with broader coverage of entity behavior in the network.
5555

56-
- **Unusual Protocol Implementation Enhancements**
56+
- **Unusual Protocol Implementation Enhancements**:
5757
ATA now detects unusual protocol implementation in the Kerberos protocol, along with additional anomalies in the NTLM protocol. Specifically, these new anomalies for Kerberos are commonly used in Over-pass-the-Hash attacks.
5858

5959

6060
### Infrastructure
6161

62-
- **Role based access control**
62+
- **Role based access control**:
6363
Role-Based Access Control (RBAC) capability. ATA 1.7 includes three roles: ATA Administrator, ATA Analyst and ATA Executive.
6464

65-
- **Support for Windows Server 2016 and Windows Server Core**
65+
- **Support for Windows Server 2016 and Windows Server Core**:
6666
ATA 1.7 supports the deployment of Lightweight Gateways on domain controllers running Windows Server 2008 R2 SP1 (not including Server Core), Windows Server 2012, Windows Server 2012 R2, Windows Server 2016 (including Core but not Nano). Additionally, this release supports Windows Server 2016 both for the ATA Center and ATA Gateway components.
6767

6868
### User Experience
69-
- **Configuration Experience**
69+
- **Configuration Experience**:
7070
In this release, the ATA configuration experience was redesigned for a better user experience and to better support of environments with multiple ATA Gateways. This release also introduces the ATA Gateway update page for simpler, better management of automatic updates for the various Gateways.
7171

7272
## Known issues
7373
The following known issues exist in this version.
7474

7575
### Gateway automatic update may fail
76-
**Symptoms:** In environments with slow WAN links, the ATA Gateway update may reach the timeout for the update (100 seconds) and fail to complete successfully.
76+
**Symptoms**: In environments with slow WAN links, the ATA Gateway update may reach the timeout for the update (100 seconds) and fail to complete successfully.
7777
In the ATA Console, the ATA Gateway will have the status of "Updating (downloading package)" for a long amount of time and it eventually fails.
78-
**Workaround:** To work around this issue, download the latest ATA Gateway package from the ATA Console, and update the ATA Gateway manually.
78+
**Workaround**: To work around this issue, download the latest ATA Gateway package from the ATA Console, and update the ATA Gateway manually.
7979

8080
> [!IMPORTANT]
8181
> Automatic certificate renewal for the certificates used by ATA is not supported. The use of these certificates may cause ATA to stop functioning when the certificate is automatically renewed.
@@ -120,8 +120,8 @@ When trying to export suspicious activity details to an Excel file, the operatio
120120
*Error [BsonClassMapSerializer`1] System.FormatException: An error occurred while deserializing the Activity property of class Microsoft.Tri.Common.Data.NetworkActivities.SuspiciousActivityActivity: Element 'ResourceIdentifier' does not match any field or property of class Microsoft.Tri.Common.Data.EventActivities.NtlmEvent. ---> System.FormatException: Element 'ResourceIdentifier' does not match any field or property of class Microsoft.Tri.Common.Data.EventActivities.NtlmEvent.*
121121

122122
To resolve this issue, from an elevated command prompt, browse to the following location: **%ProgramFiles%\Microsoft Advanced Threat Analytics\Center\MongoDB\bin** and run the following commands:
123-
1. `Mongo.exe ATA` (ATA must be capitalized)
124-
2. `db.SuspiciousActivityActivity.update({ "Activity._t": "NtlmEvent" },{$unset: {"Activity.ResourceIdentifier": ""}}, {multi: true});`
123+
- `Mongo.exe ATA` (ATA must be capitalized)
124+
- `db.SuspiciousActivityActivity.update({ "Activity._t": "NtlmEvent" },{$unset: {"Activity.ResourceIdentifier": ""}}, {multi: true});`
125125

126126
## Minor changes
127127

0 commit comments

Comments
 (0)