Skip to content

Commit 96d3ce5

Browse files
authored
Merge branch 'public' into patch-3
2 parents 6e453be + 8a871b4 commit 96d3ce5

26 files changed

+259
-75
lines changed

.github/workflows/TierManagement.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,15 @@ name: Tier management
22

33
permissions:
44
pull-requests: write
5-
contents: read
5+
contents: write
66

77
on:
88
issue_comment:
99
types: [created, edited]
1010

11+
pull_request_target:
12+
types: [opened, reopened]
13+
1114
jobs:
1215

1316
tier-mgmt:

.openpublishing.redirection.defender-xdr.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "microsoft-365/security/defender/advanced-hunting-IdentityEvents-table.md",
5+
"redirect_url": "/defender-xdr/advanced-hunting-identityevents-table",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "defender-xdr/microsoft-365-security-center-defender-cloud-apps.md",
510
"redirect_url": "/defender-cloud-apps/microsoft-365-security-center-defender-cloud-apps",
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
---
2+
title: 'Security Assessment: Remove Discoverable Passwords in Active Directory Account Attributes (Preview)'
3+
description: Learn how to identify and address discoverable passwords in Active Directory account attributes to mitigate security risks and improve your organization's security posture.
4+
ms.date: 08/12/2025
5+
ms.topic: how-to
6+
---
7+
8+
# Security Assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
9+
10+
11+
## Why do discoverable passwords in Active Directory account attributes pose a risk?
12+
13+
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges.
14+
15+
Attackers seek low-friction paths to expand access. Exposed passwords in these attributes represent an easy win because:
16+
17+
- The attributes aren't access-restricted.
18+
19+
- They aren't monitored by default.
20+
21+
- They provide context attackers can exploit for lateral movement and privilege escalation.
22+
23+
Removing exposed credentials from these attributes reduces the risk of identity compromise and strengthens your organization’s security posture.
24+
25+
26+
## How does Microsoft Defender for Identity detect discoverable passwords?
27+
28+
> [!NOTE]
29+
> Findings can include false positives. Always validate the results before taking action.
30+
31+
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse.
32+
This recommendation uses GenAI-powered analysis of Active directory attributes to detect:
33+
34+
- Plaintext passwords or variations. For example, '`Password=Summer2025!'`
35+
36+
- Credential patterns, reset hints, or sensitive account information.
37+
38+
- Other indicators suggesting operational misuse of directory fields.
39+
40+
Detected matches are surfaced in **Secure Score** and the **Security Assessment report** for review and remediation.
41+
42+
43+
## Remediation steps
44+
45+
To address this security assessment, follow these steps:
46+
47+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions](https://security.microsoft.com/securescore?viewid=actions) for Remove discoverable passwords in Active Directory account attributes.
48+
1. Review the exposed entries in the security report. Identify any field content that includes:
49+
50+
- Cleartext passwords
51+
52+
- Reset instructions or credential clues
53+
54+
- Sensitive business or system information
55+
56+
1. Remove sensitive information from the listed attribute fields using standard directory management tools (for example, PowerShell or ADSI Edit).
57+
1. Fully remove the sensitive information. Don’t just mask the value. Partial obfuscation (for example, P@ssw***) can still offer useful clues to attackers.
58+
59+
> [!NOTE]
60+
> Assessments are updated in near real time. Scores and statuses are updated every 24 hours. The list of impacted entities is updated within a few minutes of you implementing the recommendations. The status might take time until it's marked as **Completed**.
61+
62+
## Related articles
63+
64+
- [Learn more about Microsoft Secure Score](/defender-xdr/microsoft-secure-score)

ATPDocs/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -251,6 +251,8 @@ items:
251251
href: security-assessment-laps.md
252252
- name: Riskiest lateral movement paths
253253
href: security-assessment-riskiest-lmp.md
254+
- name: Remove discoverable passwords in Active Directory account attributes
255+
href: remove-discoverable-passwords-active-directory-account-attributes.md
254256
- name: Unsecure Kerberos delegation assessment
255257
href: security-assessment-unconstrained-kerberos.md
256258
- name: Unsecure SID History attributes

0 commit comments

Comments
 (0)