Skip to content

Commit b45d87f

Browse files
Merge pull request #3794 from MicrosoftDocs/main
[AutoPublish] main to live - 05/15 10:31 PDT | 05/15 23:01 IST
2 parents ec9b6fe + 6fa44c3 commit b45d87f

20 files changed

+89
-56
lines changed

ATPDocs/service-account-discovery.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Service accounts are classified into several types:
1717
- sMSA (Managed Service Accounts): Designed for individual services on a single server rather than groups.
1818
- User Account: These standard user accounts are typically used for interactive logins but can also be configured to run services.
1919

20-
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria and classifies them as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
20+
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria.These criteria include having a [Service Principal Name ](/windows/win32/ad/service-principal-names)(SPN) or a "password never expires" attribute assigned. The feature then classifies these accounts as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
2121

2222
Service account types are displayed in the Identity Info table within Advanced Hunting.
2323

@@ -68,7 +68,7 @@ You can use the sort and filter functionality on each service account tab to get
6868
|**Tags** | Sensitive or Honey Token |
6969
|**Auth protocols** | Lists the available methods for verifying user identities, for example, Kerberos and NTLM (New Technology LAN Manager). |
7070
|**Sources** | The number of potential source logins. |
71-
|**Destinations** | When a service account is trying to access a destination server, the request is directed to the target system, which can include a number of resources on that server. These resources might be a database, a file server, or other services hosted on the server. |
71+
|**Destinations** | When a service account is trying to access a destination server, the request is directed to the target system, which can include many resources on that server. These resources might be a database, a file server, or other services hosted on the server. |
7272
|**Connections** | The number of unique connections made between sources and destinations. |
7373
|**Created** |The timestamp when the service account was first created. |
7474
|**Last updated** | The timestamp of the most recent update to the service account. |
@@ -79,7 +79,7 @@ You can use the sort and filter functionality on each service account tab to get
7979

8080
For a deeper dive into what's happening in your service account click on the domain name to see the following information:
8181

82-
When you investigate a specific Service account, you'll see the following details under the connections tab:
82+
When you investigate a specific Service account, you see the following details under the connections tab:
8383

8484
:::image type="content" source="media/screenshot-of-the-connections-page.png" alt-text="Screenshot of the connections page." lightbox="media/Screenshot-of-the-connections-page.png":::
8585

@@ -96,8 +96,10 @@ When you investigate a specific Service account, you'll see the following detail
9696
Last seen | The date and time of the most recent sign in event over this connection. |
9797

9898

99-
10099
For more information about the following tabs, **Overview**, **Incidents and alerts**,**Observed in organization**, **Timeline**, and **Attack paths**, see: [Investigate assets](/defender-for-identity/investigate-assets#identity-details).
101100

101+
## Related content
102+
- [Service principal names](/windows/win32/ad/service-principal-names)
103+
- [How to configure SPN](/windows-server/identity/ad-ds/manage/how-to-configure-spn?tabs=add%2Caduc)
102104

103105
If you run into any problems, we're here to help. To get assistance or support for your product issue, see how to open a support ticket at [Microsoft Defender for Identity support](support.md).

CloudAppSecurityDocs/app-governance-visibility-insights-compliance-posture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,8 +52,8 @@ For sensitivity labeling data, cards show the number apps that have accessed con
5252

5353
For example:
5454

55-
> [!div class="mx-imgBorder"]
56-
> ![number apps that have accessed content with sensitivity labels.](sensitive-data-accessed-chart1.png)
55+
The number of apps that have accessed content with sensitivity labels.
56+
> :::image type="content" source="media/sensitive-data-accessed-chart1.png" alt-text="Number of apps that have accessed content with sensitivity labels.":::
5757
5858
## Next steps
5959

-30.7 KB
Binary file not shown.
137 KB
Loading
27.3 KB
Loading
482 KB
Loading
17.4 KB
Loading
56.8 KB
Loading
File renamed without changes.
33.6 KB
Loading

0 commit comments

Comments
 (0)