Skip to content

Commit 8726cc1

Browse files
committed
acrolinx fixes
1 parent b1acc93 commit 8726cc1

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

ATPDocs/security-assessment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
99

1010
Typically, organizations of all sizes have limited visibility into whether or not their on-premises apps and services could introduce a security vulnerability to their organization. The problem of limited visibility is especially true regarding use of unsupported or outdated components.
1111

12-
While your company may invest significant time and effort on hardening identities and identity infrastructure (such as Active Directory, Active Directory Connect) as an ongoing project, it's easy to remain unaware of common misconfigurations and use of legacy components that represent one of the greatest threat risks to your organization.
12+
While your company might invest significant time and effort on hardening identities and identity infrastructure (such as Active Directory, Active Directory Connect) as an ongoing project, it's easy to remain unaware of common misconfigurations and use of legacy components that represent one of the greatest threat risks to your organization.
1313

1414
Microsoft security research reveals that most identity attacks utilize common misconfigurations in Active Directory and continued use of legacy components (such as NTLMv1 protocol) to compromise identities and successfully breach your organization. To combat this effectively, Microsoft Defender for Identity now offers proactive identity security posture assessments to detect and recommend actions across your on-premises Active Directory configurations.
1515

@@ -29,7 +29,7 @@ Microsoft Secure Score is a measurement of an organization's security posture, w
2929

3030
Defender for Identity security posture assessments are divided into five key categories. Each category addresses specific identity security risks and provides remediation guidance:
3131

32-
- **Hybrid security**: Identifies misconfigurations in environments that integrate on-premises (e.g., Active Directory) and cloud-based identity providers (e.g., Entra ID, Okta). Assesses risks related to synchronization, authentication, and authorization across platforms.
32+
- **Hybrid security**: Identifies misconfigurations in environments that integrate on-premises (for example, Active Directory) and cloud-based identity providers (for example, Microsoft Entra ID or Okta). Assesses risks related to synchronization, authentication, and authorization across platforms.
3333
- **Identity infrastructure**: Detects misconfigurations and vulnerabilities in core identity components, including domain controllers.
3434
- **Certificates**: Assesses Active Directory Certificate Services (AD CS) for security gaps, such as misconfigured certificate templates or weak certificate authority settings. Identifying and addressing these issues helps prevent unauthorized access from certificate-related vulnerabilities.
3535
- **Group policy**: Analyzes Group Policy configurations to identify settings that might allow privilege escalation or unauthorized lateral movement within the network. Secure Group Policy settings help maintain proper access controls and system configurations.

0 commit comments

Comments
 (0)