Skip to content

Commit b4abc54

Browse files
committed
article and what's new updates
1 parent b99a7ce commit b4abc54

File tree

2 files changed

+30
-26
lines changed

2 files changed

+30
-26
lines changed

ATPDocs/service-account-discovery.md

Lines changed: 28 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -11,26 +11,28 @@ ms.date: 03/25/2025
1111

1212
Service accounts are specialized identities within Active Directory used to run applications, services, and automated tasks. These accounts often require elevated privileges to perform their designated job. However, because they can't authenticate in the same way as human accounts, they typically don't benefit from the increased security of modern authentication methods like MFA (multifactor authentication). Given their potential elevated privilege and the inherent limitations of the access policies that govern them, careful management and monitoring are crucial to ensure they don't become a security vulnerability.
1313

14-
Service accounts can be broadly classified into several types, including:
14+
Service accounts are classified into several types:
1515

1616
- gMSA (Group Managed Service Accounts): gMSAs provide a single identity solution for multiple services that require mutual authentication across multiple servers, as they allow Windows to handle password management, reducing administrative overhead.
1717
- sMSA (Managed Service Accounts): Designed for individual services on a single server rather than groups.
1818
- User Account: These standard user accounts are typically used for interactive logins but can also be configured to run services.
1919

2020
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria and classifies them as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
2121

22-
> [!NOTE]
23-
> Service account types are exposed in the Identity Info table within Advanced Hunting.
22+
Service account types are displayed in the Identity Info table within Advanced Hunting.
2423

24+
## Service accounts page
2525

26-
### Navigate to the Identity inventory page
26+
#### Navigate to the Service accounts page
2727

2828
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to Identities > Service Accounts.
2929

3030
The following image depicts the Service accounts page
3131

3232
:::image type="content" source="media/service-accounts-page.png" alt-text="Screenshot of the Service accounts page in the Defender portal" lightbox="media/service-accounts-page.png":::
3333

34+
### Customize the page view
35+
3436
There are several options you can choose from to customize the identities list view. On the top navigation you can:
3537

3638
- Add or remove columns.
@@ -39,6 +41,8 @@ There are several options you can choose from to customize the identities list v
3941

4042
- Export the list to a CSV file.
4143

44+
- Sort and filter the Service accounts list.
45+
4246
> [!NOTE]
4347
> When exporting the service accounts list to a CSV file, a maximum of 2,000 service accounts are displayed.
4448
@@ -52,32 +56,33 @@ There are several options you can choose from to customize the identities list v
5256

5357
- Critical: The total number of service accounts identified as critical.
5458

55-
### Sort and filter the Service accounts list
56-
57-
5859
You can use the sort and filter functionality on each service account tab to get a more focused view.
5960

60-
- Display name: The full name of the identity as shown in the directory.
61-
- SID: The Security Identifier, a unique value used to identify the identity in Active Directory.
62-
- Domain: The Active Directory domain to which the identity belongs.
63-
- Type: Specifies if the service account is gMSA (Group Managed Service Accounts), sMSA (Managed Service Accounts) or a user account.
64-
- Criticality level: Indicates the critical level of the service account, ranging from low to very high.
65-
- Tags: Sensitive or Honey Token
66-
- Auth protocols: Lists the available methods for verifying user identities, for example, Kerberos and NTLM (New Technology LAN Manager).
67-
- Sources: The number of potential source logins.
68-
- Destinations: When a service account is trying to access a destination server, the request is directed to the target system, which can include a number of resources on that server. These resources might be a database, a file server, or other services hosted on the server.
69-
- Connections: The number of unique connections made between sources and destinations.
70-
- Created: The timestamp when the service account was first created.
71-
- Last updated: The timestamp of the most recent update to the service account.
72-
73-
### Service accounts overview
61+
| Service account details | Description |
62+
|---------|---------|
63+
|**Display name** | The full name of the service account as shown in the directory.
64+
|**SID** | The Security Identifier, a unique value used to identify the identity in Active Directory. |
65+
|**Domain** | The Active Directory domain to which the identity belongs. |
66+
|**Type** | Specifies if the service account is gMSA (Group Managed Service Accounts), sMSA (Managed Service Accounts) or a user account. |
67+
|**Criticality level** | Indicates the critical level of the service account, ranging from low to very high. |
68+
|**Tags** | Sensitive or Honey Token |
69+
|**Auth protocols** | Lists the available methods for verifying user identities, for example, Kerberos and NTLM (New Technology LAN Manager). |
70+
|**Sources** | The number of potential source logins. |
71+
|**Destinations** | When a service account is trying to access a destination server, the request is directed to the target system, which can include a number of resources on that server. These resources might be a database, a file server, or other services hosted on the server. |
72+
|**Connections** | The number of unique connections made between sources and destinations. |
73+
|**Created** |The timestamp when the service account was first created. |
74+
|**Last updated** | The timestamp of the most recent update to the service account. |
75+
|
76+
77+
### Connections
7478

75-
For a deeper dive into what's happening in your service account click on the domain name to see the following information:
7679

77-
**Connections**
80+
For a deeper dive into what's happening in your service account click on the domain name to see the following information:
7881

7982
When you investigate a specific Service account, you'll see the following details under the connections tab:
8083

84+
:::image type="content" source="media/Screenshot-of-the-connections-page.png" alt-text="Screenshot of the connections page" lightbox="media/Screenshot-of-the-connections-page.png":::
85+
8186
|Service account connection details |Description |
8287
|---------|---------|
8388
|Source | Where the network traffic or request originates from. |
@@ -90,7 +95,6 @@ When you investigate a specific Service account, you'll see the following detail
9095
|Count | How many sign in events occurred over this connection in the last 180 days.
9196
Last seen | The date and time of the most recent sign in event over this connection. |
9297

93-
:::image type="content" source="media/Screenshot-of-the-connections-page.png" alt-text="Screenshot of the connections page" lightbox="media/Screenshot-of-the-connections-page.png":::
9498

9599

96100
For more information about the following tabs, **Overview**, **Incidents and alerts**,**Observed in organization**, **Timeline**, and **Attack paths**, see: [Investigate assets](/defender-for-identity/investigate-assets#identity-details)

ATPDocs/whats-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ For updates about versions and features released six months ago or earlier, see
2424

2525
## March 2025
2626

27-
### New: Service Account Discovery in Defender for Identity
27+
### New Service Account Discovery page
2828

2929

3030
Microsoft Defender for Identity now includes a Service Account Discovery capability, offering you centralized visibility into service accounts across your Active Directory environment.
@@ -35,7 +35,7 @@ This update provides:
3535

3636
- A centralized Service Accounts inventory, displaying key attributes like account type, authentication type, unique connections, last log-on, service class and criticality.
3737

38-
For more information, see: [Investigate and protect Service Accounts | Microsoft Defender for Identity](service-account-discovery.md)
38+
For more information, see: [Investigate and protect Service Accounts | Microsoft Defender for Identity](service-account-discovery.md).
3939

4040

4141
### New Health Issue

0 commit comments

Comments
 (0)