Skip to content

Commit a6c66f4

Browse files
Merge pull request #4729 from DeCohen/WI475700-remove-discoverable-passwords-in-active-directory
security posture assessment: Remove discoverable passwords in Active Directory account attributes (Preview)
2 parents c43b840 + 75faa80 commit a6c66f4

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

ATPDocs/remove-discoverable-passwords-active-directory-account-attributes.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: 'Security Assessment: Remove Discoverable Passwords in Active Directory Account Attributes (Preview)'
33
description: Learn how to identify and address discoverable passwords in Active Directory account attributes to mitigate security risks and improve your organization's security posture.
4-
ms.date: 08/04/2025
4+
ms.date: 08/12/2025
55
ms.topic: how-to
66
---
77

@@ -10,7 +10,7 @@ ms.topic: how-to
1010

1111
## Why do discoverable passwords in Active Directory account attributes pose a risk?
1212

13-
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges—often without triggering traditional alerts.
13+
Certain free-text attributes are often overlooked during hardening but are readable by any authenticated user in the domain. When credentials or clues are mistakenly stored in these attributes, attackers can abuse them to move laterally across the environment or escalate privileges.
1414

1515
Attackers seek low-friction paths to expand access. Exposed passwords in these attributes represent an easy win because:
1616

@@ -26,12 +26,12 @@ Removing exposed credentials from these attributes reduces the risk of identity
2626
## How does Microsoft Defender for Identity detect discoverable passwords?
2727

2828
> [!NOTE]
29-
> This security recommendation is part of Microsoft Defender for Identity and is powered by AI-based analysis of free-text attributes in Active Directory.
3029
> Findings can include false positives. Always validate the results before taking action.
3130
32-
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse. Microsoft Defender for Identity detects indicators such as:
31+
Microsoft Defender for Identity detects potential credential exposure in Active Directory by analyzing commonly used free-text attributes. This includes looking for common password formats, hints, `'description'`, `'info'`, and `'adminComment'` fields, and other contextual clues that might suggest the presence of credential misuse.
32+
This recommendation uses GenAI-powered analysis of Active directory attributes to detect:
3333

34-
- Plaintext passwords or variations. For example, '`Password=Summer2024!'`
34+
- Plaintext passwords or variations. For example, '`Password=Summer2025!'`
3535

3636
- Credential patterns, reset hints, or sensitive account information.
3737

0 commit comments

Comments
 (0)