Aug 05 2019 05:21 AM
We use AD Connect in order to replicate our on premise AD accounts to Azure AD. The replication process is completed under the context of the 'MSOL_xxxxxxxx' user account. The AD Connect application is installed on a member server (i.e. not on a DC). AATP is reporting "Suspected DCSync attack (replication of directory services)" for the MSOL_ user account running on that member server. This appears to be a false positive. Is this a known issue/false positive?
Aug 05 2019 06:32 AM
@Brian_Sutton Yes it is, you should exclude the account or the machine from this alert for now.
(Until we will have some news on this, we are working on a feature around this case, but it will take time to see results ...)
Aug 05 2019 06:41 AM
@EliOfek How do I exclude this account/machine from this alert? I only see an option to Close the alert or to Suppress it (resumes after 7 days). Thanks!
Aug 05 2019 06:45 AM
@Brian_Sutton Go to the configuration section , into the exclusions tab.
Jun 14 2020 07:15 PM
@EliOfek How do we do this in MCAS as all ATP exclusions are now greyed out?!
The DCSync pre-configured policy doesn't seem to have an exclusion option. How should the AADConnect server be tagged to be excluded from the default Suspected DCSync attack (replication of directory services) policy ?
Jun 17 2020 02:02 AM
Hi,
From your message I am not sure whether it's not available in MCAS or in AATP. you can either change the setting in AATP if the MCAS is disabled or vice versa - but not both.
There are some customers who are part of our preview program for AATP alert policies in AATP. Once the preview program is completed we will move the experience to MCAS, but until then you should use the AATP portal for that.
Oct 26 2020 12:54 PM
@Daniel Naim I can't find this exclusion in both systems. Please help.
Oct 28 2020 03:12 AM
@Michael Platt What does Setting > Exclusions shows you?
Nov 06 2020 11:26 AM
May 08 2024 04:43 AM
Jun 27 2024 03:07 AM
Aug 13 2024 04:22 AM