Skip to content

Commit 8a2e2b7

Browse files
committed
fixing merge conflicts
2 parents b6a5915 + 7110ab7 commit 8a2e2b7

File tree

80 files changed

+1119
-423
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+1119
-423
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ permissions:
55

66
on:
77
schedule:
8-
- cron: "0 */12 * * *"
8+
- cron: "0 9 1 * *"
99

10-
workflow_dispatch:
10+
# workflow_dispatch:
1111

1212

1313
jobs:
@@ -21,6 +21,6 @@ jobs:
2121
"ExampleBranch1",
2222
"ExampleBranch2"
2323
]'
24-
ReportOnly: true
24+
ReportOnly: false
2525
secrets:
2626
AccessToken: ${{ secrets.GITHUB_TOKEN }}

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1004,6 +1004,11 @@
10041004
"source_path": "CloudAppSecurityDocs/file-filters.md",
10051005
"redirect_url": "/defender-cloud-apps/data-protection-policies",
10061006
"redirect_document_id": false
1007+
},
1008+
{
1009+
"source_path": "CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md",
1010+
"redirect_url": "/defender-cloud-apps/troubleshooting-api-connectors-errors",
1011+
"redirect_document_id": true
10071012
}
10081013
]
10091014
}

ATPDocs/docfx.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,9 @@
3838
"breadcrumb_path": "/azure-advanced-threat-protection/bread/toc.json",
3939
"searchScope": ["Defender for Identity"],
4040
"titleSuffix": "Microsoft Defender for Identity",
41-
"author": "batamig",
42-
"manager": "batamig",
43-
"ms.author": "bagol",
41+
"author": "AbbyMSFT",
42+
"manager": "AbbyMSFT",
43+
"ms.author": "abbyweisberg",
4444
"ms.collection": "M365-security-compliance",
4545
"ms.service": "microsoft-defender-for-identity",
4646
"uhfHeaderId": "MSDocsHeader-MicrosoftDefender",

ATPDocs/identity-inventory.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -36,13 +36,16 @@ There are several options you can choose from to customize the identities list v
3636

3737
- Apply filters.
3838

39-
- Search for an identity by name or full UPN, Sid and Object ID.
39+
- Search for an identity by name or full UPN, SID and Object ID.
4040

4141
- Export the list to a CSV file.
4242

4343
- Copy list link with the included filters configured.
4444

45-
## ![A screenshot of identity inventory page.](media/identity-inventory/inventory11.png)
45+
> [!NOTE]
46+
> When exporting the identities list to a CSV file, a maximum of 5,000 identities are displayed.
47+
48+
## ![A screenshot of identity inventory page.](media/identity-inventory/inventory11.png)
4649

4750
### Identity details
4851

@@ -120,8 +123,7 @@ You can use this information to help you prioritize devices for security posture
120123

121124
### Navigate to the Identity inventory page
122125

123-
Use relative links instead of absolute links.
124-
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to Assets > Identities. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
126+
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to **Assets** > **Identities**. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
125127

126128
### Related Articles
127129

119 KB
Loading
97.9 KB
Loading
Lines changed: 103 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,103 @@
1+
---
2+
title: Service Account Discovery
3+
description: The Service Accounts page provides a centralized location for customers to view and manage identity information across their environment, ensuring optimal visibility and a comprehensive experience.
4+
ms.topic: conceptual
5+
ms.date: 03/25/2025
6+
---
7+
8+
# Investigate and protect Service Accounts | Microsoft Defender for Identity
9+
10+
### What are Service Accounts?
11+
12+
Service accounts are specialized identities within Active Directory used to run applications, services, and automated tasks. These accounts often require elevated privileges to perform their designated job. However, because they can't authenticate in the same way as human accounts, they typically don't benefit from the increased security of modern authentication methods like MFA (multifactor authentication). Given their potential elevated privilege and the inherent limitations of the access policies that govern them, careful management and monitoring are crucial to ensure they don't become a security vulnerability.
13+
14+
Service accounts are classified into several types:
15+
16+
- gMSA (Group Managed Service Accounts): gMSAs provide a single identity solution for multiple services that require mutual authentication across multiple servers, as they allow Windows to handle password management, reducing administrative overhead.
17+
- sMSA (Managed Service Accounts): Designed for individual services on a single server rather than groups.
18+
- User Account: These standard user accounts are typically used for interactive logins but can also be configured to run services.
19+
20+
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria and classifies them as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
21+
22+
Service account types are displayed in the Identity Info table within Advanced Hunting.
23+
24+
## Service accounts page
25+
26+
#### Navigate to the Service accounts page
27+
28+
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to Identities > Service Accounts.
29+
30+
The following image depicts the Service accounts page:
31+
32+
:::image type="content" source="media/service-accounts-page.png" alt-text="Screenshot of the Service accounts page in the Defender portal." lightbox="media/service-accounts-page.png":::
33+
34+
### Customize the page view
35+
36+
There are several options you can choose from to customize the identities list view. On the top navigation you can:
37+
38+
- Add or remove columns.
39+
40+
- Apply filters.
41+
42+
- Export the list to a CSV file.
43+
44+
- Sort and filter the Service accounts list.
45+
46+
> [!NOTE]
47+
> When exporting the service accounts list to a CSV file, a maximum of 2,000 service accounts are displayed.
48+
49+
### Service account details
50+
51+
- Total: The total number of service accounts listed.
52+
53+
- Managed: The total number of service accounts that are gMSA (Group Managed Service Accounts) or sMSA (Managed Service Accounts).
54+
55+
- User: The total number of standard user accounts used for interactive logins or configured to run services.
56+
57+
- Critical: The total number of service accounts identified as critical.
58+
59+
You can use the sort and filter functionality on each service account tab to get a more focused view.
60+
61+
| Service account details | Description |
62+
|---------|---------|
63+
|**Display name** | The full name of the service account as shown in the directory.
64+
|**SID** | The Security Identifier, a unique value used to identify the identity in Active Directory. |
65+
|**Domain** | The Active Directory domain to which the identity belongs. |
66+
|**Type** | Specifies if the service account is gMSA (Group Managed Service Accounts), sMSA (Managed Service Accounts) or a user account. |
67+
|**Criticality level** | Indicates the critical level of the service account, ranging from low to very high. |
68+
|**Tags** | Sensitive or Honey Token |
69+
|**Auth protocols** | Lists the available methods for verifying user identities, for example, Kerberos and NTLM (New Technology LAN Manager). |
70+
|**Sources** | The number of potential source logins. |
71+
|**Destinations** | When a service account is trying to access a destination server, the request is directed to the target system, which can include a number of resources on that server. These resources might be a database, a file server, or other services hosted on the server. |
72+
|**Connections** | The number of unique connections made between sources and destinations. |
73+
|**Created** |The timestamp when the service account was first created. |
74+
|**Last updated** | The timestamp of the most recent update to the service account. |
75+
|
76+
77+
### Connections
78+
79+
80+
For a deeper dive into what's happening in your service account click on the domain name to see the following information:
81+
82+
When you investigate a specific Service account, you'll see the following details under the connections tab:
83+
84+
:::image type="content" source="media/Screenshot-of-the-connections-page.png" alt-text="Screenshot of the connections page." lightbox="media/Screenshot-of-the-connections-page.png":::
85+
86+
|Service account connection details |Description |
87+
|---------|---------|
88+
|Source | Where the network traffic or request originates from. |
89+
|Source type | What kind of device or system is initiating the request. For example, server, workstation or domain controller. |
90+
|Source risk | Identicates the risk posed to the source from no risk to high risk. |
91+
|Destination | Where the request is being directed to. The target system that the service account is trying to access. For example, when trying to access a destination server, there can be multiple resources on that server (for example, a database and a file-server). |
92+
|Destination type | Server, Workstation, or Domain controller. |
93+
|Auth protocols | Kerberos and NTLM |
94+
|Service Class | The services within a network that define the type of service being provided, often used for authentication and resource management. These include: Lightweight Directory Access Protocol (LDAP), Common Internet File System (CIFS), Remote Procedure Call (RPC), Remote Procedure Call Subsystem (RPCSS), "HTTP," Terminal Services (TERMSRV), and "HOST" |
95+
|Count | How many sign in events occurred over this connection in the last 180 days.
96+
Last seen | The date and time of the most recent sign in event over this connection. |
97+
98+
99+
100+
For more information about the following tabs, **Overview**, **Incidents and alerts**,**Observed in organization**, **Timeline**, and **Attack paths**, see: [Investigate assets](/defender-for-identity/investigate-assets#identity-details).
101+
102+
103+
If you run into any problems, we're here to help. To get assistance or support for your product issue, see how to open a support ticket at [Microsoft Defender for Identity support](support.md).

ATPDocs/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -128,6 +128,8 @@ items:
128128
href: identity-inventory.md
129129
- name: Investigate assets
130130
href: investigate-assets.md
131+
- name: Service accounts
132+
href: service-account-discovery.md
131133
- name: Lateral movement paths
132134
items:
133135
- name: Understand and investigate lateral movement paths

ATPDocs/whats-new.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,27 @@ For updates about versions and features released six months ago or earlier, see
2424

2525
## March 2025
2626

27+
### New Service Account Discovery page
28+
29+
30+
Microsoft Defender for Identity now includes a Service Account Discovery capability, offering you centralized visibility into service accounts across your Active Directory environment.
31+
32+
This update provides:
33+
34+
- Automatic identification of Group Managed Service Accounts, Managed Service Accounts, and user accounts operating as service accounts.
35+
36+
- A centralized Service Accounts inventory, displaying key attributes like account type, authentication type, unique connections, last log-on, service class and criticality.
37+
38+
- A Service Account details page, including an overview, a timeline of activities, alerts, and a new connections tab.
39+
40+
For more information, see: [Investigate and protect Service Accounts | Microsoft Defender for Identity](service-account-discovery.md).
41+
42+
2743
### New Health Issue
2844

2945
New [health issue](health-alerts.md#network-configuration-mismatch-for-sensors-running-on-vmware) for cases where sensors running on VMware have network configuration mismatch.
3046

31-
### Enhanced Identity Inventory (Preview)
47+
### Enhanced Identity Inventory
3248

3349
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment.
3450
The updated Identities Inventory page now includes the following tabs:
Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
---
2+
title: Application inventory
3+
ms.date: 03/20/2025
4+
ms.topic: overview
5+
description: The new Applications page located under Assets in Microsoft Defender XDR portal provides a centralized location for users to view and manage SaaS and SaaS connected OAuth apps information across their environment, ensuring optimal visibility and a comprehensive experience
6+
#customer intent: As a security administrator, I want to discover, monitor, and manage all SaaS and OAuth connected apps in my organization so that I can ensure security and compliance.
7+
---
8+
# Applications inventory (Preview)
9+
10+
Protecting your SaaS ecosystem requires taking inventory of all SaaS and connected OAuth apps that are in your environment. With the increasing number of applications, having a comprehensive inventory is crucial to ensure security and compliance. The Applications page provides a centralized view of all SaaS and connected OAuth apps in your organization, enabling efficient monitoring and management.
11+
At a glance you can see information such as app name, risk score, privilege level, publisher information, and other details for easy identification of SaaS and OAuth apps most at risk.
12+
13+
The Applications page includes the following tabs:
14+
15+
* SaaS apps: A consolidated view of all SaaS applications in your network. This tab highlights key details, including app name, status (unprotected/protected app) and whether the app is marked as sanctioned or unsanctioned.
16+
* OAuth apps: A comprehensive view of OAuth apps registered on Microsoft Entra ID, Google workspace and Salesforce. This tab highlights OAuth apps metadata, publisher info and app origin, permissions used, data accessed and other insights.
17+
18+
## Navigate to the Applications page
19+
20+
In the Defender portal at <https://security.microsoft.com>, go to **Assets** > **Applications**. Or, go directly to the **Applications** page, by clicking on the banner links on the existing Cloud discovery and App governance pages.
21+
22+
:::image type="content" source="media/banner-on-cloud-discovery-pages.png" alt-text="Screenshot of the Cloud Discovery page with a banner about the new unified application inventory experience" lightbox="media/banner-on-cloud-discovery-pages.png":::
23+
24+
:::image type="content" source="media/banner-message-on-app-governance-pages.png" alt-text="Screenshot of the App Governance page with a banner about the new unified application inventory experience for managing OAuth and SaaS apps" lightbox="media/banner-message-on-app-governance-pages.png":::
25+
26+
There are several options you can choose from to customize the SaaS apps and OAuth apps list view. In the top navigation panel you can:
27+
28+
* Add or remove columns.
29+
* Export the entire list in CSV format.
30+
* Select the number of items to show per page.
31+
* Apply filters
32+
33+
> [!NOTE]
34+
>When exporting the applications list to a CSV file, a maximum of 1000 SaaS or OAuth apps are displayed.
35+
36+
The following image depicts the SaaS apps list:
37+
:::image type="content" source="media/applications-tab-in-the-defender-portal.png" alt-text="Screenshot of the applications tab in the Defender portal" lightbox="media/applications-tab-in-the-defender-portal.png"
38+
39+
40+
## SaaS app details
41+
42+
At the top of Saas app tab, you can find actionable insights that allow you to quickly identify apps that need your attention and focus. The following details are displayed:
43+
44+
* **Untagged high risk apps** – Shows apps that aren't tagged and have a high-risk.
45+
* **Untagged high traffic apps** – Shows apps that aren't tagged and have a high usage traffic (greater than 1 GB of data traffic).
46+
* **Untagged GenAI apps** – Shows apps that aren't tagged and are Gen-AI based.
47+
48+
## Sort and filter the SaaS apps list
49+
50+
You can use the sort and filter functionality to get a more focused view. These controls also help you assess and manage the SaaS applications in your organization.
51+
52+
|Filter |Description |
53+
|---------|---------|
54+
|**App tags** | Select **Sanctioned**, **Unsanctioned**, or create custom tags to use in a customized filter. |
55+
|**App** | Filter for specific SaaS apps. |
56+
|**Categories** | Filter according to app categories. |
57+
|**Compliance risk factor** | Filter for specific standards, certifications, and compliance your app might comply with. For example: HIPAA, ISO 27001, SOC 2, and PCI-DSS. |
58+
| **Risk score** | Filter by a specific risk score, such as to view only risky apps. |
59+
|**Security risk factor** | Filter based on specific security measures, such as encryption at rest, multifactor authentication, and others.
60+
|
61+
62+
### OAuth Apps
63+
64+
The OAuth apps tab provides visibility into Microsoft 365, Google workspace and Salesforce. Admins can review applications and decide to disable the apps or apply policies to monitor their behavior in their environment.
65+
66+
* **New apps** – Shows apps added in the last 30 days (Available for Microsoft 365)
67+
68+
* **Highly privileged apps** – Shows apps with powerful permissions that allow them to access data or change important settings. (Available for Microsoft 365 and Google)
69+
70+
* **Overprivileged apps** – Shows apps with unused permissions. (Available for Microsoft 365)
71+
72+
* **Apps from external unverified publishers** – Shows apps that originated from an external unverified publisher tenant. (Available for Microsoft 365)
73+
74+
For more information on how to create app policies, see:[Create app policies in app governance](app-governance-app-policies-create.md)
75+
76+
The following image depicts the OAuth apps list:
77+
78+
:::image type="content" source="media/oauth-tab-in-the-applications-page.png" alt-text="Screenshot of a list of OAuth apps in the applications page in the Defender portal" lightbox="media/oauth-tab-in-the-applications-page.png":::
79+
80+
## Sort and filter the OAuth apps list
81+
82+
You can apply the following filters to get a more focused view:
83+
84+
|Column name |Description |
85+
|---------|---------|
86+
| **App name** | The display name of the app as registered on Microsoft Entra ID. |
87+
| **App status** | Shows whether the app is enabled or disabled, and if disabled by whom. |
88+
| **Graph API access**| Shows whether the app has at least one Graph API permission. |
89+
| **Permission type**| Shows whether the app has application (app only), delegated, or mixed permissions. |
90+
| **App origin**| Shows whether the app originated within the tenant or was registered in an external tenant. |
91+
| **Consent type**| Shows whether the app consent has been given at the user or the admin level, and the number of users whose data is accessible to the app. |
92+
| **Publisher**| Publisher of the app and their verification status. |
93+
| **Last modified**| Date and time when registration information was last updated on Microsoft Entra ID |
94+
| **Added on**| Shows the date and time when the app was registered to Microsoft Entra ID and assigned a service principal. |
95+
| **Permission usage**| Shows whether the app has any unused Graph API permissions in the last 90 days. |
96+
| **Data usage**| Total data downloaded or uploaded by the app in the last 30 days. |
97+
| **Privilege level** | The app's privilege level. |
98+
| **Certification**| Indicates if an app meets stringent security and compliance standards set by Microsoft 365 or if its publisher has publicly attested to its safety. |
99+
| **Sensitivity label accessed**| Sensitivity labels on content accessed by the app |
100+
| **Service accessed**| Microsoft 365 services accessed by the app
101+
|
102+
103+
104+
> [!TIP]
105+
> To see all columns, you might need to do one or more of the following steps:
106+
> * Horizontally scroll in your web browser.
107+
> * Narrow the width of appropriate columns.
108+
> * Zoom out in your web browser.
109+
110+
## Next steps
111+
112+
> [!div class="nextstepaction"]
113+
> [Best practices for protecting your organization](best-practices.md)
114+
115+
[!INCLUDE [Open support ticket](includes/support.md)]

0 commit comments

Comments
 (0)