Skip to content

Commit be3fb1b

Browse files
DeCohenElazarK
andauthored
Update ATPDocs/unmonitored-entra-connect-servers.md
Co-authored-by: Elazar Krieger <[email protected]>
1 parent 8a80764 commit be3fb1b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

ATPDocs/unmonitored-entra-connect-servers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This article describes Microsoft Defender for Identity's unmonitored Microsoft E
1616

1717
## What risk do unmonitored Microsoft Entra Connect servers pose to an organization?
1818

19-
Unmonitored Microsoft Entra Connect servers (formerly Azure AD Connect) represent a significant security risk in hybrid identity environments. These servers synchronize identities between on-premises Active Directory and Entra ID. As a result, they have the power to introduce, modify, or remove accounts and attributes that directly affect cloud access.
19+
Unmonitored Microsoft Entra Connect servers (formerly Azure AD Connect) pose a significant security risk in hybrid identity environments. These servers synchronize identities between on-premises Active Directory and Entra ID. They can introduce, modify, or remove accounts and attributes that directly affect cloud access.
2020

2121
If an attacker compromises a Microsoft Entra Connect server, they can inject shadow admins, manipulate group memberships, or sync malicious changes into the cloud without triggering traditional alerts.
2222

0 commit comments

Comments
 (0)