You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/service-account-discovery.md
+25-5Lines changed: 25 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.topic: conceptual
5
5
ms.date: 03/25/2025
6
6
---
7
7
8
-
# Investigate and protect Service Accounts | Microsoft Defender for Identity
8
+
# Investigate and protect Service Accounts
9
9
10
10
### What are Service Accounts?
11
11
@@ -17,7 +17,7 @@ Service accounts are classified into several types:
17
17
- sMSA (Managed Service Accounts): Designed for individual services on a single server rather than groups.
18
18
- User Account: These standard user accounts are typically used for interactive logins but can also be configured to run services.
19
19
20
-
The auto discovery feature quickly identifies gMSA and sMSA accounts as well as user accounts within Active Directory that meet specific criteria.These criteria include having a [Service Principal Name](/windows/win32/ad/service-principal-names)(SPN) or a "password never expires" attribute assigned. The feature then classifies these accounts as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
20
+
The auto discovery feature quickly identifies gMSA and sMSA accounts and user accounts within Active Directory that meet specific criteria.These criteria include having a [Service Principal Name](/windows/win32/ad/service-principal-names)(SPN) or a "password never expires" attribute assigned. The feature then classifies these accounts as service accounts. These accounts are then highlighted and presented, along with relevant information including insights into recent authentications and the sources and destinations of those interactions, as part of a dedicated inventory within the Defender experience. This helps you better understand the accounts' purpose so you can more easily spot anomalous activity and understand its implications.
21
21
22
22
Service account types are displayed in the Identity Info table within Advanced Hunting.
23
23
@@ -77,7 +77,7 @@ You can use the sort and filter functionality on each service account tab to get
77
77
### Connections
78
78
79
79
80
-
For a deeper dive into what's happening in your service account click on the domain name to see the following information:
80
+
For a deeper dive into what's happening in your service account select the domain name to see the following information:
81
81
82
82
When you investigate a specific Service account, you see the following details under the connections tab:
83
83
@@ -96,10 +96,30 @@ When you investigate a specific Service account, you see the following details u
96
96
Last seen | The date and time of the most recent sign in event over this connection. |
97
97
98
98
99
-
For more information about the following tabs, **Overview**, **Incidents and alerts**,**Observed in organization**, **Timeline**, and **Attack paths**, see: [Investigate assets](/defender-for-identity/investigate-assets#identity-details).
99
+
### Define Service Account classification rules
100
+
101
+
Service account classification rules let you define your own criteria for identifying service accounts. These rules help you include service accounts that Defender for Identity doesn't identify automatically. For example, some organizations name all their service accounts with a prefix like `srv`. Defender for Identity doesn't automatically detect such naming conventions. By creating a classification rule based on that pattern, you can include those accounts in the Service accounts view.
102
+
103
+
Classification rules work alongside Defender for Identity’s automatic discovery and provide a more complete and customized view of service accounts in your environment.
104
+
105
+
To create a rule:
106
+
107
+
1. Go to Settings > Microsoft Defender XDR > Service accounts classification.
108
+
1. Select on **+ Create a new rule**.
109
+
1. Enter a name for the rule.
110
+
2. Optional: Add a description.
111
+
1. Select one or more of the following filters:
112
+
-**Account display name**
113
+
-**Account domain**
114
+
-**Account SAM name**
115
+
-**Organizational unit**
116
+
1. Select Create to save the rule.
117
+
118
+
119
+
For more information about Defender for Identity details, see: [Investigate assets](/defender-for-identity/investigate-assets#identity-details).
100
120
101
121
## Related content
102
122
-[Service principal names](/windows/win32/ad/service-principal-names)
103
123
-[How to configure SPN](/windows-server/identity/ad-ds/manage/how-to-configure-spn?tabs=add%2Caduc)
104
124
105
-
If you run into any problems, we're here to help. To get assistance or support for your product issue, see how to open a support ticket at [Microsoft Defender for Identity support](support.md).
125
+
If you run into any problems, we're here to help. To get assistance or support for your product issue, see how to open a support ticket at [Microsoft Defender for Identity support](support.md).
### Service account classification rules now available
29
+
30
+
You can now create custom classification rules to identify service accounts based on your organization’s specific criteria. This complements automatic discovery, enabling more accurate identification of service accounts.
31
+
For more information, see [Service account discovery](service-account-discovery.md)
32
+
33
+
### Defender For Identity PowerShell module updates (version 1.0.0.4)
29
34
30
35
New Features and Improvements:
31
36
- Added remote domain functionality
@@ -40,18 +45,19 @@ Bug Fixes:
40
45
- Fixed issue with Test-MDIDSA not parsing Deleted Object permissions.
41
46
- Other reliability fixes.
42
47
48
+
43
49
## May 2025
44
50
45
51
### Expanded New Sensor Deployment Support for Domain Controllers (Preview)
46
52
Defender for Identity now supports deploying its new sensor on Domain Controllers without requiring Defender for Endpoint onboarding. This simplifies sensor activation and expands deployment flexibility. [Learn more](deploy/activate-capabilities.md).
47
53
48
54
49
55
### Improved Visibility into Defender for Identity New Sensor Eligibility in the Activation page
50
-
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify non-eligible servers and take action to update and onboard them for enhanced identity protection.
56
+
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify noneligible servers and take action to update and onboard them for enhanced identity protection.
51
57
52
58
53
59
### Local administrators collection (using SAM-R queries) feature will be disabled
54
-
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change will occur automatically by the specified date, and no administrative action is required.
60
+
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change occurs automatically by the specified date, and no administrative action is required.
55
61
56
62
### New Health Issue
57
63
@@ -182,7 +188,7 @@ For more information, see:
182
188
The new Identity security posture assessments (ISPMs) can help customers monitor misconfiguration by watching for weak spots and reduce the risk of potential attack on on-premises infrastructure.
183
189
These new identity recommendations, as part of Microsoft Secure Score, are new security posture reports related to Active Directory infrastructure and Group policy Objects:
184
190
185
-
-[Accounts with non-default Primary Group ID](/defender-for-identity/accounts-with-non-default-pgid)
191
+
-[Accounts with nondefault Primary Group ID](/defender-for-identity/accounts-with-non-default-pgid)
186
192
187
193
-[Change Domain Controller computer account old password](/defender-for-identity/domain-controller-account-password-change)
188
194
@@ -224,7 +230,7 @@ As part of our ongoing effort to enhance Microsoft Defender for Identity coverag
224
230
***Suspicious Interactive Logon to the Microsoft Entra Connect Server**
225
231
* Direct logins to Microsoft Entra Connect servers are highly unusual and potentially malicious. Attackers often target these servers to steal credentials for broader network access. Microsoft Defender for Identity can now detect abnormal logins to Microsoft Entra Connect servers, helping you identify and respond to these potential threats faster. It's specifically applicable when the Microsoft Entra Connect server is a standalone server and not operating as a Domain Controller.
226
232
***User Password Reset by Microsoft Entra Connect Account**
227
-
* The Microsoft Entra Connect connector account often holds high privileges, including the ability to reset user’s passwords. Microsoft Defender for Identity now has visibility into those actions and will detect any usage of those permissions that were identified as malicious and non-legitimate. This alert will be triggered only if the [password writeback feature](/entra/identity/authentication/concept-sspr-writeback) is disabled.
233
+
* The Microsoft Entra Connect connector account often holds high privileges, including the ability to reset user’s passwords. Microsoft Defender for Identity now has visibility into those actions and will detect any usage of those permissions that were identified as malicious and non-legitimate. This alert is triggered only if the [password writeback feature](/entra/identity/authentication/concept-sspr-writeback) is disabled.
228
234
***Suspicious writeback by Microsoft Entra Connect on a sensitive user**
229
235
* While Microsoft Entra Connect already prevents writeback for users in privileged groups, Microsoft Defender for Identity expands this protection by identifying additional types of sensitive accounts. This enhanced detection helps prevent unauthorized password resets on critical accounts, which can be a crucial step in advanced attacks targeting both cloud and on-premises environments.
230
236
@@ -253,7 +259,7 @@ For more information, see:
253
259
254
260
## July 2024
255
261
256
-
6 New detections are new in public preview:
262
+
Six New detections are new in public preview:
257
263
***Possible NetSync attack**
258
264
* NetSync is a module in Mimikatz, a post-exploitation tool, that requests the password hash of a target device's password by pretending to be a domain controller. An attacker might be performing malicious activities inside the network using this feature to gain access to the organization's resources.
259
265
***Possible takeover of a Microsoft Entra seamless SSO account**
@@ -304,7 +310,7 @@ With this data customers can now easily create their own [custom detection rules
Now, you can copy our recommended query as provided below, and click on “Create detection rule”. Please be aware that our provided query also tracks failed logon attempts, which may generate information unrelated to a potential attack. Therefore, feel free to customize the query to suit your specific requirements.
313
+
Now, you can copy our recommended query as provided below, and click on “Create detection rule”. Be aware that our provided query also tracks failed logon attempts, which may generate information unrelated to a potential attack. Therefore, feel free to customize the query to suit your specific requirements.
308
314
309
315
310
316
```
@@ -476,13 +482,13 @@ This version includes improvements and bug fixes for cloud services and the Defe
476
482
> [!NOTE]
477
483
> If you're seeing a decreased number of *Remote code execution attempt* alerts, see our updated [September announcements](#september-2023), which include an [update to the Defender for Identity detection logic](#decreased-number-of-alerts-for-remote-code-execution-attempts). Defender for Identity continues to record the remote code execution activities as before.
478
484
479
-
### New Identities area and dashboard in Microsoft 365 Defender (Preview)
485
+
### New Identities area and dashboard in Microsoft Defender XDR (Preview)
480
486
481
-
Defender for Identity customers now have a new **Identities** area in Microsoft 365 Defender for information about identity security with Defender for Identity.
487
+
Defender for Identity customers now have a new **Identities** area in Microsoft Defender XDR for information about identity security with Defender for Identity.
482
488
483
-
In Microsoft 365 Defender, select **Identities** to see any of the following new pages:
489
+
In Microsoft Defender XDR, select **Identities** to see any of the following new pages:
484
490
485
-
-**Dashboard**: This page shows graphs and widgets to help you monitor identity threat detection and response activities. For example:
491
+
-**Dashboard**: This page shows graphs and widgets to help you monitor identity threat detection and response activities. For example:
@@ -498,7 +504,7 @@ This version includes improvements and bug fixes for cloud services and the Defe
498
504
499
505
### Security posture assessments for AD CS sensors (Preview)
500
506
501
-
Defender for Identity's security posture assessments proactively detect and recommend actions across your on-premises Active Directory configurations.
507
+
Defenders for Identity's security posture assessments proactively detect and recommend actions across your on-premises Active Directory configurations.
502
508
503
509
Recommended actions now include the following new security posture assessments, specifically for certificate templates and certificate authorities.
504
510
@@ -516,7 +522,7 @@ Recommended actions now include the following new security posture assessments,
-[Enforce encryption for RPC certificate enrollment interface (ESC11)](security-assessment-enforce-encryption-rpc.md)
518
524
519
-
The new assessments are available in Microsoft Secure Score, surfacing security issues and severe misconfigurations that pose risks to the entire organization, alongside detections. Your score is updated accordingly.
525
+
The new assessments are available in Microsoft Secure Score, surfacing security issues, and severe misconfigurations that pose risks to the entire organization, alongside detections. Your score is updated accordingly.
520
526
521
527
For example:
522
528
@@ -525,7 +531,7 @@ For example:
525
531
For more information, see [Microsoft Defender for Identity's security posture assessments](security-assessment.md).
526
532
527
533
> [!NOTE]
528
-
> While *certificate template* assessments are available to all customers that have AD CS installed on their environment, *certificate authority* assessments are available only to customers who've installed a sensor on an AD CS server. For more information, see [New sensor type for Active Directory Certificate Services (AD CS)](#new-sensor-type-for-active-directory-certificate-services-ad-cs).
534
+
> While *certificate template* assessments are available to all customers that have AD CS installed on their environment, *certificate authority* assessments are available only to customers who have installed a sensor on an AD CS server. For more information, see [New sensor type for Active Directory Certificate Services (AD CS)](#new-sensor-type-for-active-directory-certificate-services-ad-cs).
529
535
530
536
### Defender for Identity release 2.223
531
537
@@ -598,7 +604,7 @@ While this change results in a decreased number of *Remote code execution attemp
598
604
599
605
### Alert sensitivity settings and learning period enhancements
600
606
601
-
Some Defender for Identity alerts wait for a *learning period* before alerts are triggered, while building a profile of patterns to use when distinguishing between legitimate and suspicious activities.
607
+
Some Defenders for Identity alerts wait for a *learning period* before alerts are triggered, while building a profile of patterns to use when distinguishing between legitimate and suspicious activities.
602
608
603
609
Defender for Identity now provides the following enhancements for the learning period experience:
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/behaviors.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.topic: conceptual
6
6
#CustomerIntent: As a Defender for Cloud Apps customer, I want to understand how behaviors work so that I can investigate more effectively.
7
7
---
8
8
9
-
# Investigate behaviors with advanced hunting (Preview)
9
+
# Investigate behaviors with advanced hunting
10
10
11
11
12
12
@@ -57,7 +57,7 @@ This process aims to remove policies from alerts that give low-quality detection
57
57
58
58
1. (Complete) Defender for Cloud Apps sends behaviors in parallel to alerts.
59
59
60
-
1. (Currently in Preview) Policies that generate behaviors are now disabled by default, and don't send alerts.
60
+
1. (Complete) Policies that generate behaviors are now disabled by default, and don't send alerts.
61
61
62
62
1. Move to a cloud-managed detection model, removing customer-facing policies completely. This phase is planned to provide both custom detections and selected alerts generated by internal policies for high-fidelity, security-focused scenarios.
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-defender-use-custom-rules.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ For editable functions, more options are available when you select the vertical
43
43
-**Edit details** – Opens the function side pane to allow you to edit details about the function (except folder names for Sentinel functions).
44
44
-**Delete** – Deletes the function.
45
45
46
-
### Use adx() operator for Azure Data Explorer queries (Preview)
46
+
### Use adx() operator for Azure Data Explorer queries
47
47
Use the `adx()` operator to query tables stored in Azure Data Explorer. Read [What is Azure Data Explorer?](/azure/data-explorer/data-explorer-overview) for more details.
48
48
49
49
This feature was previously only available in log analytics in Microsoft Sentinel. Users can now use the operator in advanced hunting in the unified Microsoft Defender portal without needing to manually open a Microsoft Sentinel window.
0 commit comments