Skip to content

Commit 9fc0512

Browse files
authored
Merge pull request #5293 from MicrosoftDocs/AbbyMSFT-patch-4
Update service account discovery documentation
2 parents 2834992 + 1dfda9d commit 9fc0512

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-for-identity/service-account-discovery.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,9 @@ Service accounts are classified into several types:
1717
- sMSA (Managed Service Accounts): Designed for individual services on a single server rather than groups.
1818
- User Account: These standard user accounts are typically used for interactive logins but can also be configured to run services.
1919

20-
The auto discovery feature quickly identifies gMSA and sMSA accounts and user accounts within Active Directory that meet specific criteria. These criteria include having a [Service Principal Name](/windows/win32/ad/service-principal-names)(SPN) or a "password never expires" attribute assigned. The feature then classifies these accounts as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
20+
The auto discovery feature quickly identifies gMSA and sMSA accounts and user accounts within Active Directory that meet specific criteria. These criteria include having a [Service Principal Name](/windows/win32/ad/service-principal-names)(SPN) and has an assigned ***password never expires*** attribute. The feature classifies these accounts as service accounts. These accounts are highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
2121

22-
Service account types are displayed in the Identity Info table within Advanced Hunting.
22+
Service account types are displayed in the **Identity Info** table within Advanced Hunting.
2323

2424
## Service accounts page
2525

0 commit comments

Comments
 (0)