Skip to content

Commit 878d82f

Browse files
committed
Learn Editor: Update replace-entra-connect-default-admin.md
1 parent 022e5f4 commit 878d82f

File tree

2 files changed

+49
-294
lines changed

2 files changed

+49
-294
lines changed
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
---
2+
# Required metadata
3+
# For more information, see https://review.learn.microsoft.com/en-us/help/platform/learn-editor-add-metadata?branch=main
4+
# For valid values of ms.service, ms.prod, and ms.topic, see https://review.learn.microsoft.com/en-us/help/platform/metadata-taxonomies?branch=main
5+
6+
title: # Add a title for the browser tab
7+
description: # Add a meaningful description for search results
8+
author: LiorShapiraa # GitHub alias
9+
ms.author: t-lshapira # Microsoft alias
10+
ms.service: # Add the ms.service or ms.prod value
11+
# ms.prod: # To use ms.prod, uncomment it and delete ms.service
12+
ms.topic: # Add the ms.topic value
13+
ms.date: 03/16/2025
14+
---
15+
16+
# Security assessment: Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account
17+
18+
This article describes Microsoft Defender for Identity's Microsoft Entra Connect AD DS Connector account default admin security posture assessment report.
19+
20+
> [!NOTE]
21+
> This security assessment will be available only if Microsoft Defender for Identity sensor is installed on servers running Microsoft Entra Connect services.
22+
23+
## Why might using an Enterprise or Domain Admin account for the Microsoft Entra Connect AD DS Connector be a risk?
24+
25+
Smart attackers often target Microsoft Entra Connect in on-premises environments due to the elevated privileges associated with its AD DS Connector account (typically created in Active Directory with the MSOL**_** prefix). Using an **Enterprise Admin** or **Domain Admin** account for this purpose significantly increases the attack surface, as these accounts have broad control over the directory.
26+
27+
Starting with [Entra Connect build 1.4.###.#](/entra/identity/hybrid/connect/reference-connect-accounts-permissions), Enterprise Admin and Domain Admin accounts can no longer be used as the AD DS Connector account. This best practice prevents over-privileging the connector account, reducing the risk of domain-wide compromise if the account is targeted by attackers. Organizations must now create or assign a lower-privileged account specifically for directory synchronization, ensuring better adherence to the principle of least privilege and protecting critical admin accounts.
28+
29+
## How do I use this security assessment to improve my hybrid organizational security posture?
30+
31+
1. Review the recommended action at[ https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account.
32+
33+
1. Review the exposed accounts and their group memberships. The list contains members of Domain/Enterprise Admins through direct and recursive membership.
34+
35+
1. Perform one of the following actions:
36+
37+
- Remove MSOL_ user account user from privileged groups, ensuring it retains the necessary permissions to function as the Entra Connect Connector account.
38+
39+
- Change the Entra Connect AD DS Connector account (MSOL_) to a lower-privileged account.
40+
41+
> [!NOTE]
42+
> While assessments are updated in near real time, scores and statuses are updated every 24 hours. While the list of impacted entities is updated within a few minutes of your implementing the recommendations, the status may still take time until it's marked as **Completed**.
43+
44+
## Next steps
45+
46+
- Learn more about [Microsoft Secure score]().
47+
48+
- Learn more about [Defender for Identity Sensor for Microsoft Entra Connect](https://aka.ms/MdiSensorForMicrosoftEntraConnectInstallation)
49+

ATPDocs/toc.yml

Lines changed: 0 additions & 294 deletions
Original file line numberDiff line numberDiff line change
@@ -2,297 +2,3 @@
22
Connector account
33
href: replace-entra-connect-default-admin.md
44
displayName: MDI
5-
- name: Microsoft Defender for Identity Documentation
6-
href: index.yml
7-
- name: Overview
8-
items:
9-
- name: Welcome to Defender for Identity
10-
href: what-is.md
11-
- name: What's new?
12-
href: whats-new.md
13-
- name: Deploy and monitor for Zero Trust
14-
href: zero-trust.md
15-
- name: System architecture
16-
href: architecture.md
17-
- name: Defender for Identity in the Microsoft Defender portal
18-
href: microsoft-365-security-center-mdi.md
19-
- name: Defender for Identity for US Government
20-
href: us-govt-gcc-high.md
21-
- name: Deploy
22-
expanded: true
23-
items:
24-
- name: Quick installation guide
25-
href: deploy/quick-installation-guide.md
26-
- name: Pilot and deploy Microsoft Defender XDR
27-
href: /defender-xdr/pilot-deploy-overview?toc=/defender-for-identity/toc.json&bc=/defender-for-identity/breadcrumb/toc.json
28-
- name: Defender for Identity deployment overview
29-
href: deploy/deploy-defender-identity.md
30-
- name: Plan and prepare
31-
items:
32-
- name: Defender for Identity prerequisites
33-
href: deploy/prerequisites.md
34-
- name: Plan your Defender for Identity capacity
35-
href: deploy/capacity-planning.md
36-
- name: Deploy Defender for Identity
37-
items:
38-
- name: Configure connectivity settings
39-
href: deploy/configure-proxy.md
40-
displayName: proxy
41-
- name: Test connectivity settings
42-
href: deploy/test-connectivity.md
43-
- name: Download the Defender for Identity sensor
44-
href: deploy/download-sensor.md
45-
- name: Install the Defender for Identity sensor
46-
href: deploy/install-sensor.md
47-
- name: Configure the Defender for Identity sensor
48-
href: deploy/configure-sensor-settings.md
49-
- name: Post-deployment configuration
50-
items:
51-
- name: Configure event collection
52-
items:
53-
- name: Event collection overview
54-
href: deploy/event-collection-overview.md
55-
- name: Configure audit policies for Windows event logs
56-
href: deploy/configure-windows-event-collection.md
57-
- name: Roles and permissions
58-
href: role-groups.md
59-
- name: Configure a Directory Service account
60-
items:
61-
- name: Overview
62-
href: deploy/directory-service-accounts.md
63-
displayName: Directory Service Account, DSA
64-
- name: Configure a DSA with a gMSA
65-
href: deploy/create-directory-service-account-gmsa.md
66-
- name: Configure remote calls to SAM
67-
href: deploy/remote-calls-sam.md
68-
- name: Extra deployment scenarios
69-
items:
70-
- name: Install on Microsoft AD FS / AD CS / Entra Connect servers
71-
href: deploy/active-directory-federation-services.md
72-
- name: Configure action accounts
73-
href: deploy/manage-action-accounts.md
74-
- name: Deploy for multiple Active Directory forests
75-
href: deploy/multi-forest.md
76-
- name: Configure a standalone sensor
77-
items:
78-
- name: Prerequisites for a standalone sensor
79-
href: deploy/prerequisites-standalone.md
80-
- name: Configure port mirroring
81-
href: deploy/configure-port-mirroring.md
82-
displayName: standalone
83-
- name: Configure Windows Event Forwarding
84-
href: deploy/configure-event-forwarding.md
85-
displayName: standalone
86-
- name: Listen for SIEM events
87-
href: deploy/configure-event-collection.md
88-
displayName: standalone
89-
- name: Activate Defender for Identity capabilities on your domain controller
90-
href: deploy/activate-capabilities.md
91-
- name: Manage
92-
items:
93-
- name: View the ITDR dashboard
94-
href: dashboard.md
95-
- name: View and manage health issues
96-
href: health-alerts.md
97-
- name: Defender for Identity reports
98-
href: reports.md
99-
- name: Settings
100-
items:
101-
- name: About page
102-
href: settings-about.md
103-
- name: Manage and update sensors
104-
href: sensor-settings.md
105-
- name: Uninstall a sensor
106-
href: uninstall-sensor.md
107-
- name: VPN integration
108-
href: vpn-integration.md
109-
- name: Set entity tags
110-
href: entity-tags.md
111-
- name: Configure detection exclusions
112-
href: exclusions.md
113-
- name: Automated response exclusions
114-
href: automated-response-exclusions.md
115-
- name: Email and syslog notifications
116-
href: notifications.md
117-
- name: Adjust alert thresholds
118-
href: advanced-settings.md
119-
displayName: advanced settings
120-
- name: Troubleshooting
121-
items:
122-
- name: Troubleshooting known issues
123-
href: troubleshooting-known-issues.md
124-
- name: Troubleshoot using logs
125-
href: troubleshooting-using-logs.md
126-
- name: Investigate and respond
127-
items:
128-
- name: Assets
129-
items:
130-
- name: Identity inventory
131-
href: identity-inventory.md
132-
- name: Investigate assets
133-
href: investigate-assets.md
134-
- name: Lateral movement paths
135-
items:
136-
- name: Understand and investigate lateral movement paths
137-
href: understand-lateral-movement-paths.md
138-
- name: Alerts
139-
items:
140-
- name: Alerts overview
141-
href: alerts-overview.md
142-
- name: Understanding security alerts
143-
href: understanding-security-alerts.md
144-
- name: Investigate security alerts
145-
href: manage-security-alerts.md
146-
- name: Monitored activities
147-
href: monitored-activities.md
148-
- name: Understanding Network Name Resolution (NNR)
149-
href: nnr-policy.md
150-
- name: Reconnaissance and discovery alerts
151-
href: reconnaissance-discovery-alerts.md
152-
- name: Persistence and privilege escalation alerts
153-
href: persistence-privilege-escalation-alerts.md
154-
- name: Credential access alerts
155-
href: credential-access-alerts.md
156-
- name: Lateral movement alerts
157-
href: lateral-movement-alerts.md
158-
- name: Other alerts
159-
href: other-alerts.md
160-
- name: Remediation
161-
items:
162-
- name: Remediation actions
163-
href: remediation-actions.md
164-
- name: Security posture
165-
items:
166-
- name: Overview
167-
href: security-assessment.md
168-
- name: Hybrid security
169-
items:
170-
- name: Replace Enterprise or Domain Admin account for Entra Connect AD DS
171-
Connector account
172-
href: replace-entra-connect-default-admin.md
173-
displayName: MDI
174-
- name: Change password for Microsoft Entra seamless SSO account
175-
href: change-password-microsoft-entra-seamless-single-sign-on.md
176-
displayName: Microsoft Entra connect
177-
- name: Rotate password for Microsoft Entra Connect connector account
178-
href: rotate-password-microsoft-entra-connect.md
179-
displayName: Microsoft Entra Connect
180-
- name: Remove unnecessary replication permissions for Microsoft Entra Connect connector account
181-
href: remove-replication-permissions-microsoft-entra-connect.md
182-
- name: Identity infrastructure
183-
items:
184-
- name: Built-in Active Directory Guest account is enabled
185-
href: built-in-active-directory-guest-account-is-enabled.md
186-
- name: Change Domain Controller computer account old password
187-
href: domain-controller-account-password-change.md
188-
- name: Domain controllers with Print spooler service available assessment
189-
href: security-assessment-print-spooler.md
190-
- name: Remove local admins on identity assets
191-
href: security-assessment-remove-local-admins.md
192-
- name: Unmonitored domain controllers
193-
href: security-assessment-unmonitored-domain-controller.md
194-
- name: Unsecure domain configurations
195-
href: security-assessment-unsecure-domain-configurations.md
196-
- name: Certificates
197-
items:
198-
- name: Enforce encryption for RPC certificate enrollment interface (ESC8)
199-
href: security-assessment-enforce-encryption-rpc.md
200-
- name: Insecure ADCS certificate enrollment IIS endpoints (ESC8)
201-
href: security-assessment-insecure-adcs-certificate-enrollment.md
202-
- name: Misconfigured certificate templates owner (ESC4)
203-
href: security-assessment-edit-misconfigured-owner.md
204-
- name: Misconfigured Certificate Authority ACL (ESC7)
205-
href: security-assessment-edit-misconfigured-ca-acl.md
206-
- name: Misconfigured certificate templates ACL (ESC4)
207-
href: security-assessment-edit-misconfigured-acl.md
208-
- name: Misconfigured enrollment agent certificate template (ESC3)
209-
href: security-assessment-edit-misconfigured-enrollment-agent.md
210-
- name: Overly permissive certificate template with privileged EKU (ESC2)
211-
href: security-assessment-edit-overly-permissive-template.md
212-
- name: Prevent Certificate Enrollment with arbitrary Application Policies (ESC15)
213-
href: prevent-certificate-enrollment-esc15.md
214-
- name: Prevent requests for certificates valid for arbitrary users (ESC1)
215-
href: security-assessment-prevent-users-request-certificate.md
216-
- name: Vulnerable Certificate Authority setting (ESC6)
217-
href: security-assessment-edit-vulnerable-ca-setting.md
218-
- name: Group policy
219-
items:
220-
- name: GPO assigns unprivileged identities to local groups with elevated privileges
221-
href: gpo-assigns-unprivileged-identities.md
222-
- name: GPO can be modified by unprivileged accounts
223-
href: modified-unprivileged-accounts-gpo.md
224-
- name: Reversible passwords found in GPOs
225-
href: reversible-passwords-group-policy.md
226-
- name: Accounts
227-
items:
228-
- name: Accounts with non-default Primary Group ID
229-
href: accounts-with-non-default-pgid.md
230-
- name: Admin SDHolder permissions
231-
href: security-assessment-remove-suspicious-access-rights.md
232-
- name: Change password for krbtgt account
233-
href: change-password-krbtgt-account.md
234-
- name: Change password of built-in domain Administrator account
235-
href: change-password-domain-administrator-account.md
236-
- name: Dormant entities in sensitive groups assessment
237-
href: security-assessment-dormant-entities.md
238-
- name: DCSync permissions
239-
href: security-assessment-non-admin-accounts-dcsync.md
240-
- name: Ensure privileged accounts are not delegated
241-
href: ensure-privileged-accounts-with-sensitive-flag.md
242-
- name: Entities exposing credentials in clear text assessment
243-
href: security-assessment-clear-text.md
244-
- name: LAPS usage assessment
245-
href: security-assessment-laps.md
246-
- name: Riskiest lateral movement paths
247-
href: security-assessment-riskiest-lmp.md
248-
- name: Unsecure Kerberos delegation assessment
249-
href: security-assessment-unconstrained-kerberos.md
250-
- name: Unsecure SID History attributes
251-
href: security-assessment-unsecure-sid-history-attribute.md
252-
- name: Unsecure account attributes
253-
href: security-assessment-unsecure-account-attributes.md
254-
- name: Weak cipher usage assessment
255-
href: security-assessment-weak-cipher.md
256-
- name: Reference
257-
items:
258-
- name: Operations guide
259-
items:
260-
- name: Overview
261-
displayName: operations guide
262-
href: ops-guide/ops-guide.md
263-
- name: Daily activities
264-
href: ops-guide/ops-guide-daily.md
265-
- name: Weekly activities
266-
href: ops-guide/ops-guide-weekly.md
267-
- name: Monthly activities
268-
href: ops-guide/ops-guide-monthly.md
269-
- name: Quarterly / Ad-hoc activities
270-
href: ops-guide/ops-guide-quarterly.md
271-
- name: Frequently asked questions
272-
href: technical-faq.yml
273-
- name: SIEM log reference
274-
href: cef-format-sa.md
275-
- name: PowerShell
276-
href: /powershell/defenderforidentity/overview-defenderforidentity
277-
- name: Support
278-
href: support.md
279-
- name: Defender for Identity data security and privacy
280-
href: privacy-compliance.md
281-
- name: Security baseline
282-
href: /security/benchmark/azure/baselines/defender-for-identity-security-baseline?toc=/defender-for-identity/toc.json
283-
- name: What's new archive
284-
href: whats-new-archive.md
285-
- name: Migrate from Advanced Threat Analytics (ATA)
286-
href: migrate-from-ata-overview.md
287-
- name: Microsoft Defender XDR Docs
288-
items:
289-
- name: Microsoft Defender XDR
290-
href: /microsoft-365/security/defender/
291-
- name: Microsoft Defender for Office 365
292-
href: /microsoft-365/security/office-365-security/
293-
- name: Microsoft Defender for Endpoint
294-
href: /microsoft-365/security/defender-endpoint/
295-
- name: Microsoft Defender for Cloud Apps
296-
href: /cloud-app-security/
297-
- name: Microsoft Defender Vulnerability Management
298-
href: /microsoft-365/security/defender-vulnerability-management/

0 commit comments

Comments
 (0)