|
| 1 | +--- |
| 2 | +title: 'Security Assessment: Unmonitored Microsoft Entra Connect servers' |
| 3 | +description: 'Detect unmonitored Microsoft Entra Connect servers and deploy Defender for Identity sensors to protect your hybrid identity infrastructure from privilege escalation.' |
| 4 | +author: LiorShapiraa # GitHub alias |
| 5 | +ms.author: liorshapira |
| 6 | +ms.service: microsoft-defender-for-identity |
| 7 | +ms.topic: article |
| 8 | +ms.date: 07/06/2025 |
| 9 | +ms.reviewer: LiorShapiraa |
| 10 | +--- |
| 11 | + |
| 12 | + |
| 13 | +# Security Assessment: Unmonitored Microsoft Entra Connect servers |
| 14 | + |
| 15 | +This article describes the Microsoft Defender for Identity's unmonitored Microsoft Entra Connect servers security posture assessment report. |
| 16 | + |
| 17 | +## What risk do unmonitored Microsoft Entra Connect servers pose to an organization? |
| 18 | + |
| 19 | +Unmonitored Microsoft Entra Connect servers (formerly Azure AD Connect) pose a significant security risk in hybrid identity environments. These servers synchronize identities between on-premises Active Directory and Entra ID. They can introduce, modify, or remove accounts and attributes that directly affect cloud access. |
| 20 | + |
| 21 | +If an attacker compromises a Microsoft Entra Connect server, they can inject shadow admins, manipulate group memberships, or sync malicious changes into the cloud without triggering traditional alerts. |
| 22 | + |
| 23 | +These servers operate at the intersection of on-premises and cloud identity, making them a prime target for privilege escalation and stealthy persistence. Without monitoring, such attacks can go undetected. Deploying Microsoft Defender for Identity version 2.0 sensors on Microsoft Entra Connect servers is critical. These sensors help detect suspicious activity in real time, protect the integrity of your hybrid identity bridge, and prevent full-domain compromise from a single point of failure. |
| 24 | + |
| 25 | +> [!NOTE] |
| 26 | +> This security assessment is only available if Microsoft Defender for Endpoint detects eligible Microsoft Entra Connect servers in the environment. |
| 27 | +
|
| 28 | +## How do I use this security assessment? |
| 29 | + |
| 30 | +1. Review the recommended action at https://security.microsoft.com/securescore?viewid=actions to discover which of your Microsoft Entra Connect servers are unmonitored. |
| 31 | + |
| 32 | + :::image type="content" source="media/unmonitored-entra-connect-servers/recommended-actions-unmonitored-entra-connect-server.png" alt-text="Screenshot that shows the recommended actions for an unmonitored Entra Connect server." lightbox="media/unmonitored-entra-connect-servers/recommended-actions-unmonitored-entra-connect-server.png"::: |
| 33 | + |
| 34 | +1. Go to the **Microsoft Defender portal > Settings > Identities > Sensors**. You can view the already installed sensors in your environment and download the install package to deploy them on your remaining servers. |
| 35 | +1. Take appropriate action on those servers by [configuring monitoring sensors](/defender-for-identity/deploy/active-directory-federation-services). |
| 36 | + |
| 37 | +> [!NOTE] |
| 38 | +> Assessment details are updated in near real time. However, scores and statuses are refreshed every 24 hours. The list of impacted entities is updated within a few minutes of implementing recommendations, but the overall status might take longer to show as completed. |
| 39 | +
|
| 40 | +## Next steps |
| 41 | + |
| 42 | +Learn more about [Microsoft Secure Score](/defender-xdr/microsoft-secure-score). |
0 commit comments