Skip to content

Commit b0500ea

Browse files
DeCohenElazarK
andauthored
Update ATPDocs/unmonitored-entra-connect-servers.md
Co-authored-by: Elazar Krieger <[email protected]>
1 parent 984bd35 commit b0500ea

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

ATPDocs/unmonitored-entra-connect-servers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Unmonitored Microsoft Entra Connect servers (formerly Azure AD Connect) represen
2020

2121
If an attacker compromises a Microsoft Entra Connect server, they can inject shadow admins, manipulate group memberships, or sync malicious changes into the cloud—all without triggering traditional alerts.
2222

23-
Because these servers operate at the intersection of on-premises and cloud identity, they're a prime target for privilege escalation and stealthy persistence. Without monitoring, such attacks can go undetected. Deploying Microsoft Defender for Identity version 2.0 sensors on Microsoft Entra Connect servers is critical. This helps detect suspicious activity in real time, protect the integrity of your hybrid identity bridge, and prevent full-domain compromise from a single point of failure.
23+
These servers operate at the intersection of on-premises and cloud identity, making them a prime target for privilege escalation and stealthy persistence. Without monitoring, such attacks can go undetected. Deploying Microsoft Defender for Identity version 2.0 sensors on Microsoft Entra Connect servers is critical. These sensors help detect suspicious activity in real time, protect the integrity of your hybrid identity bridge, and prevent full-domain compromise from a single point of failure.
2424

2525
> [!NOTE]
2626
> This security assessment is only available if Microsoft Defender for Endpoint has detected eligible Microsoft Entra Connect servers in the environment.

0 commit comments

Comments
 (0)