Skip to content

Commit 9ece685

Browse files
DeCohenElazarK
andauthored
Update ATPDocs/unmonitored-active-directory-certificate-services-server.md
Co-authored-by: Elazar Krieger <[email protected]>
1 parent f7949cc commit 9ece685

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

ATPDocs/unmonitored-active-directory-certificate-services-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This article describes Microsoft Defender for Identity's unmonitored Active Dire
1919
Unmonitored Active Directory Certificate Services (AD CS) servers pose a significant risk to your organization’s identity infrastructure. AD CS, the backbone of certificate issuance and trust, is a high-value target for attackers aiming to escalate privileges or forge credentials. Without proper monitoring, attackers can exploit these servers to issue unauthorized certificates, enabling stealthy lateral movement and persistent access. Deploy Microsoft Defender for Identity version 2.0 sensors on all AD CS servers to mitigate this risk. These sensors provide real-time visibility into suspicious activity, detect advanced threats, and generate actionable alerts based on security events and network behavior.
2020

2121
> [!NOTE]
22-
>  This security assessment is only available if Microsoft Defender for Endpoint detected an eligible ADCS server in the environment.
22+
>  This security assessment is available only if Microsoft Defender for Endpoint detects an eligible AD CS server in the environment.
2323
2424
## How do I use this security assessment?
2525

0 commit comments

Comments
 (0)