Skip to content

Commit fa0bfb6

Browse files
DeCohenElazarK
andauthored
Update ATPDocs/unmonitored-active-directory-federation-services-servers.md
Co-authored-by: Elazar Krieger <[email protected]>
1 parent c74fad4 commit fa0bfb6

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

ATPDocs/unmonitored-active-directory-federation-services-servers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This article describes the Microsoft Defender for Identity's unmonitored Active
1818
Unmonitored Active Directory Federation Services (ADFS) servers are a significant security risk to organizations. ADFS controls access to both cloud and on-premises resources as the gateway for federated authentication and single sign-on. If attackers compromise an ADFS server, they can issue forged tokens and impersonate any user, including privileged accounts. Such attacks might bypass multi-factor authentication (MFA), conditional access, and other downstream security controls, making them particularly dangerous. Without proper monitoring, suspicious activity on ADFS servers might go undetected for extended periods. Deploying Microsoft Defender for Identity version 2.0 sensors on ADFS servers is essential. These sensors enable real-time detection of suspicious behavior and help prevent token forgery, abuse of trust relationships, and stealthy lateral movement within the environment.
1919

2020
> [!NOTE]
21-
> This security assessment is only available if Microsoft Defender for Endpoint detected an eligible ADFS server in the environment.
21+
> This security assessment is only available if Microsoft Defender for Endpoint detects an eligible ADFS server in the environment.
2222
2323

2424
## How do I use this security assessment?

0 commit comments

Comments
 (0)