Skip to content

Commit c8e1abf

Browse files
DeCohenElazarK
andauthored
Update ATPDocs/unmonitored-entra-connect-servers.md
Co-authored-by: Elazar Krieger <[email protected]>
1 parent be3fb1b commit c8e1abf

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

ATPDocs/unmonitored-entra-connect-servers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ If an attacker compromises a Microsoft Entra Connect server, they can inject sha
2323
These servers operate at the intersection of on-premises and cloud identity, making them a prime target for privilege escalation and stealthy persistence. Without monitoring, such attacks can go undetected. Deploying Microsoft Defender for Identity version 2.0 sensors on Microsoft Entra Connect servers is critical. These sensors help detect suspicious activity in real time, protect the integrity of your hybrid identity bridge, and prevent full-domain compromise from a single point of failure.
2424

2525
> [!NOTE]
26-
> This security assessment is only available if Microsoft Defender for Endpoint has detected eligible Microsoft Entra Connect servers in the environment.
26+
> This security assessment is only available if Microsoft Defender for Endpoint detects eligible Microsoft Entra Connect servers in the environment.
2727
2828
## How do I use this security assessment?
2929

0 commit comments

Comments
 (0)