Skip to content

Commit 944d679

Browse files
authored
Merge branch 'main' into patch-2
2 parents 8d4cd99 + 304585e commit 944d679

24 files changed

+184
-344
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
name: (Scheduled) Stale branch removal
2+
3+
permissions:
4+
contents: write
5+
6+
on:
7+
schedule:
8+
- cron: "0 */12 * * *"
9+
10+
workflow_dispatch:
11+
12+
13+
jobs:
14+
15+
stale-branch:
16+
uses: MicrosoftDocs/microsoft-365-docs/.github/workflows/Shared-StaleBranch.yml@workflows-prod
17+
with:
18+
PayloadJson: ${{ toJSON(github) }}
19+
RepoBranchSkipList: '[
20+
"ExampleBranch1",
21+
"ExampleBranch2"
22+
]'
23+
ReportOnly: true
24+
secrets:
25+
AccessToken: ${{ secrets.GITHUB_TOKEN }}
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: 'Security assessment: Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account'
3+
description: 'This report lists any Entra Connect AD DS Connector account that is an Enterprise Administrator or Domain Administrator.'
4+
author: LiorShapiraa # GitHub alias
5+
ms.author: Liorshapira # Microsoft alias
6+
# ms.prod: microsoft-defender-for-identity
7+
ms.topic: article
8+
ms.date: 03/16/2025
9+
---
10+
11+
# Security assessment: Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account
12+
13+
This article describes Microsoft Defender for Identity's Microsoft Entra Connect AD DS Connector account default admin security posture assessment report.
14+
15+
> [!NOTE]
16+
> This security assessment will be available only if Microsoft Defender for Identity sensor is installed on servers running Microsoft Entra Connect services.
17+
18+
## Why might using an Enterprise or Domain Admin account for the Microsoft Entra Connect AD DS Connector be a risk?
19+
20+
Smart attackers often target Microsoft Entra Connect in on-premises environments due to the elevated privileges associated with its AD DS Connector account (typically created in Active Directory with the MSOL_ prefix). Using an **Enterprise Admin** or **Domain Admin** account for this purpose significantly increases the attack surface, as these accounts have broad control over the directory.
21+
22+
Starting with [Entra Connect build 1.4.###.#](/entra/identity/hybrid/connect/reference-connect-accounts-permissions), Enterprise Admin and Domain Admin accounts can no longer be used as the AD DS Connector account. This best practice prevents over-privileging the connector account, reducing the risk of domain-wide compromise if the account is targeted by attackers. Organizations must now create or assign a lower-privileged account specifically for directory synchronization, ensuring better adherence to the principle of least privilege and protecting critical admin accounts.
23+
24+
## How do I use this security assessment to improve my hybrid organizational security posture?
25+
26+
1. Review the recommended action at[ https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for Replace Enterprise or Domain Admin account for Entra Connect AD DS Connector account.
27+
28+
1. Review the exposed accounts and their group memberships. The list contains members of Domain/Enterprise Admins through direct and recursive membership.
29+
30+
1. Perform one of the following actions:
31+
32+
- Remove MSOL_ user account user from privileged groups, ensuring it retains the necessary permissions to function as the Entra Connect Connector account.
33+
34+
- Change the Entra Connect AD DS Connector account (MSOL_) to a lower-privileged account.
35+
36+
> [!NOTE]
37+
> While assessments are updated in near real time, scores and statuses are updated every 24 hours. While the list of impacted entities is updated within a few minutes of your implementing the recommendations, the status may still take time until it's marked as **Completed**.
38+
39+
## Next steps
40+
41+
- Learn more about [Microsoft Secure score]().
42+
43+
- Learn more about [Defender for Identity Sensor for Microsoft Entra Connect](https://aka.ms/MdiSensorForMicrosoftEntraConnectInstallation)
44+

ATPDocs/security-assessment.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,24 +38,30 @@ Defender for Identity security posture assessments have five key categories. Eac
3838
## Access Defender for Identity security posture assessments
3939

4040
> [!NOTE]
41-
You must have a Defender for Identity license to view Defender for Identity security posture assessments in Microsoft Secure Score.
42-
While *certificate template* assessments are available to all customers with AD CS installed in their environment, *certificate authority* assessments are available only to customers who have installed a sensor on an AD CS server. For more information, see [Configuring sensors for AD FS and AD CS](deploy/active-directory-federation-services.md).
41+
> You must have a Defender for Identity license to view Defender for Identity security posture assessments in Microsoft Secure Score.
42+
>
43+
> Additionally, while *certificate template* assessments are available to all customers with AD CS installed in their environment, *certificate authority* assessments are available only to customers who have installed a sensor on an AD CS server.
44+
>
45+
> Hybrid security recommendations will be available only if Microsoft Defender for Identity sensor is installed on servers running Microsoft Entra Connect services.
46+
>
47+
> For more information, see [Configuring sensors for AD FS, AD CS and Entra Connect.](https://aka.ms/DeployMdiSensorOnYourIdentityInfrastructure)
4348
4449
**To access identity security posture assessments**:
4550

4651
1. Open the [Microsoft Secure Score dashboard](https://security.microsoft.com/securescore).
4752
1. Select the **Recommended actions** tab. You can search for a particular recommended action, or filter the results (for example, by the category **Identity**).
4853

4954
[![Recommended actions.](media/recommended-actions.png)](media/recommended-actions.png#lightbox)
50-
55+
5156
1. For more details, select the assessment.
5257

5358
[![Select the assessment.](media/select-assessment.png)](media/select-assessment.png#lightbox)
54-
59+
5560
[!INCLUDE [secure-score-note](../includes/secure-score-note.md)]
5661

5762

5863
## Next steps
5964

6065
- [Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
61-
- [Check out the Defender for Identity forum!](<https://aka.ms/MDIcommunity>)
66+
- [Check out the Defender for Identity forum!](https://aka.ms/MDIcommunity)
67+

0 commit comments

Comments
 (0)