Skip to content

Commit 83261ea

Browse files
committed
update ms date & remove —often without triggering traditional alerts.
1 parent 1c79510 commit 83261ea

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

ATPDocs/remove-discoverable-passwords-active-directory-account-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: 'Security Assessment: Remove Discoverable Passwords in Active Directory Account Attributes (Preview)'
33
description: Learn how to identify and address discoverable passwords in Active Directory account attributes to mitigate security risks and improve your organization's security posture.
4-
ms.date: 08/04/2025
4+
ms.date: 08/12/2025
55
ms.topic: how-to
66
---
77

@@ -10,7 +10,7 @@ ms.topic: how-to
1010

1111
## Why do discoverable passwords in Active Directory account attributes pose a risk?
1212

13-
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges—often without triggering traditional alerts.
13+
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges.
1414

1515
Attackers seek low-friction paths to expand access. Exposed passwords in these attributes represent an easy win because:
1616

0 commit comments

Comments
 (0)