Forum Discussion
DefenderAdmin
Nov 30, 2022Brass Contributor
Honeytoken alerts FP
Hi! We do have a lot of "Honeytoken activity" since 23.11.2022 starting in the evening (MET timezone). Normally, in the past this kind of alert only appeared during planed penetration tests and ...
Alexander Bunk
Dec 30, 2022Copper Contributor
We have the same experience. Any updates on this?
- JacampbellJan 27, 2023
Microsoft
Hey - have you opened a support ticket- DefenderAdminJan 27, 2023Brass Contributorno, i didn't open a support ticket yet. i was hoping that an agent update will solve the issue, which didn't happened yet. But to be honest, i don't have the time or nerve right now for handling a Microsoft ticket case with some indian MS supporter...
- JacampbellJan 27, 2023
Microsoft
So LDAP and SAMR detections were added to the Honeytoken tagged entities.Points to note with this:- There will never be a false positive scenario for the honey token despite that being an option under the manage alert drop down in M365.
- We cannot exclude the device for this Honeytoken activity
Please review EVERY tool that is associated with LDAP and SAMR and queries users. If any tool or service queries a Honeytoken tagged account, it will create and activity. So based on the frequency of your activity, you should be able to narrow down what service/tool is querying the users on these trusted domains. Does any service/tool come to mind?