Skip to content

Commit e846b57

Browse files
authored
Update remote-calls-sam.md
added note on SAM-R component and net-ntlm hash issue
1 parent 497b600 commit e846b57

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,13 @@ ms.topic: how-to
99

1010
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
1111

12+
> [!NOTE]
13+
> This feature can potentially be exploited by an adversary to obtain the Net-NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
14+
> The new Defender for Identity sensor is not affected by this issue as it uses different detection methods.
15+
>
16+
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.
17+
> Please note that this will result in reduced data available for the [attack path feature in Exposure Management](/security-exposure-management/review-attack-paths).
18+
1219
This article describes the configuration changes required to allow the Defender for Identity Directory Services Account (DSA) to perform the SAM-R queries.
1320

1421
> [!TIP]

0 commit comments

Comments
 (0)