Skip to content

Commit 7d9473c

Browse files
Update 21834.md
1 parent 3ee849b commit 7d9473c

File tree

1 file changed

+4
-4
lines changed
  • docs/includes/secure-recommendations

1 file changed

+4
-4
lines changed

docs/includes/secure-recommendations/21834.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ ai-usage: ai-assisted
1717
Directory synchronization accounts are highly privileged service accounts that facilitate identity synchronization between on-premises Active Directory and Microsoft Entra ID. Without location-based access controls, threat actors who compromise these accounts can synchronize malicious changes from any location, including unauthorized networks or geographic regions.
1818

1919
Once a directory sync account is compromised, threat actors can:
20-
- manipulate identity synchronization processes
21-
- create unauthorized user accounts
22-
- escalate privileges of existing accounts
23-
- persist access by modifying synchronization rules
20+
- Manipulate identity synchronization processes
21+
- Create unauthorized user accounts
22+
- Escalate privileges of existing accounts
23+
- Persist access by modifying synchronization rules
2424

2525
Unrestricted network access allows threat actors to operate remotely from compromised infrastructure, making detection harder while maintaining long-term access to the hybrid identity environment. Restricting these accounts to trusted named locations through Conditional Access policies limits the attack surface by ensuring synchronization operations only occur from authorized network locations.
2626

0 commit comments

Comments
 (0)