Skip to content

Commit bdeb034

Browse files
committed
Acrolinx fixes for the MDI what's new page
1 parent 7d47799 commit bdeb034

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

ATPDocs/whats-new.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ This article is updated frequently to let you know what's new in the latest rele
1212

1313
## What's new scope and references
1414

15-
Defenders for Identity releases are deployed gradually across customer tenants. If there's a feature documented here that you don't see yet in your tenant, check back later for the update.
15+
Defender for Identity releases are deployed gradually across customer tenants. If there's a feature documented here that you don't see yet in your tenant, check back later for the update.
1616

1717
For more information, see also:
1818

@@ -84,7 +84,7 @@ New LDAP query events were added to the `IdentityQueryEvents` table in Advanced
8484
### DefenderForIdentity PowerShell module updates (version 1.0.0.3)
8585

8686
New Features and Improvements:
87-
- Support for getting, testing, and setting the Active Directory Recycle Bin in Get/Set/Test MDIConfiguration.
87+
- Support for getting, testing, and setting the Active Directory Recycle Bin in Get/Set/Test MDI Configuration.
8888
- Support for getting, testing, and setting the proxy configuration on new MDI sensor.
8989
- The Active Directory Certificate Services registry value for audit filtering now properly sets the type.
9090
- New-MDIConfigurationReport now shows the name of the tested GPO and supports Server and Identity arguments.
@@ -128,7 +128,7 @@ Additionally, the **built-in schema reference** for Advanced Hunting in Microsof
128128

129129
### New Identity guide tour
130130

131-
Explore key MDI features with the new **Identities Tour** in the M365 portal. Navigate Incidents, Hunting, and Settings to enhance identity security and threat investigation.
131+
Explore key MDI features with the new **Identities Tour** in the Microsoft 365 portal. Navigate Incidents, Hunting, and Settings to enhance identity security and threat investigation.
132132

133133
## December 2024
134134

@@ -184,11 +184,11 @@ As part of our ongoing effort to enhance Microsoft Defender for Identity coverag
184184
**New Microsoft Entra Connect Identity posture recommendations:**
185185

186186
* **Rotate password for Microsoft Entra Connect connector account**
187-
* A compromised Microsoft Entra Connect connector account (AD DS connector account, commonly shown as MSOL_XXXXXXXX) can grant access to high-privilege functions like replication and password resets, allowing attackers to modify synchronization settings and compromise security in both cloud and on-premises environments as well as offering several paths for compromising the entire domain. In this assessment we recommend customers change the password of MSOL accounts with the password last set over 90 days ago. For more information click [here](rotate-password-microsoft-entra-connect.md).
187+
* A compromised Microsoft Entra Connect connector account (AD DS connector account, commonly shown as MSOL_XXXXXXXX) can grant access to high-privilege functions like replication and password resets, allowing attackers to modify synchronization settings and compromise security in both cloud and on-premises environments as well as offering several paths for compromising the entire domain. In this assessment we recommend customers change the password of MSOL accounts with the password last set over 90 days ago. For more information, click [here](rotate-password-microsoft-entra-connect.md).
188188
* **Remove unnecessary replication permissions for Microsoft Entra Connect Account**
189-
* By default, the Microsoft Entra Connect connector account has extensive permissions to ensure proper synchronization (even if they aren't actually required). If Password Hash Sync isn't configured, it’s important to remove unnecessary permissions to reduce the potential attack surface. For more information click [here](remove-replication-permissions-microsoft-entra-connect.md)
189+
* By default, the Microsoft Entra Connect connector account has extensive permissions to ensure proper synchronization (even if they aren't required). If Password Hash Sync isn't configured, it’s important to remove unnecessary permissions to reduce the potential attack surface. For more information, click [here](remove-replication-permissions-microsoft-entra-connect.md)
190190
* **Change password for Microsoft Entra seamless SSO account configuration**
191-
* This report lists all [Microsoft Entra seamless SSO](/entra/identity/hybrid/connect/how-to-connect-sso) computer accounts with password last set over 90 days ago. The password for the Azure SSO computer account isn't automatically changed every 30 days. If an attacker compromises this account, they can generate service tickets for the AZUREADSSOACC account on behalf of any user and impersonate any user in the Microsoft Entra tenant that is synchronized from Active Directory. An attacker can use this to move laterally from Active Directory into Microsoft Entra ID. For more information click [here](change-password-microsoft-entra-seamless-single-sign-on.md).
191+
* This report lists all [Microsoft Entra seamless SSO](/entra/identity/hybrid/connect/how-to-connect-sso) computer accounts with password last set over 90 days ago. The password for the Azure SSO computer account isn't automatically changed every 30 days. If an attacker compromises this account, they can generate service tickets for the AZUREADSSOACC account on behalf of any user and impersonate any user in the Microsoft Entra tenant that is synchronized from Active Directory. An attacker can use this to move laterally from Active Directory into Microsoft Entra ID. For more information, click [here](change-password-microsoft-entra-seamless-single-sign-on.md).
192192

193193
**New Microsoft Entra Connect detections:**
194194

0 commit comments

Comments
 (0)