Join us at FabCon Atlanta from March 16 - 20, 2026, for the ultimate Fabric, Power BI, AI and SQL community-led event. Save $200 with code FABCOMM.
Register now!To celebrate FabCon Vienna, we are offering 50% off select exams. Ends October 3rd. Request your discount now.
Hi!
A user in my organization is using Power BI to extract user lists and information from the Active Directory.
Doing so triggers a lot of security alerts to the SOC Team for AD Scan and trigger of HoneyPots.
Is there any way that the user can refine his query to a specific "OU" and not the whole domain?
Thanks for your help.
Solved! Go to Solution.
Hi @Menzo ,
After my researching, I don't find any useful solutions in Power BI. Maybe you can solve the problem from the perspective of HoneyPots. I found an article to avoid HoneyPots: https://www.pentestpartners.com/security-blog/need-to-avoid-a-honeypot-heres-how/
If it doesn't work, you may create a support ticket.
In the field "distinguishedName" you can do a "contains" search for "OU=[name of OU]"
Hi @Menzo ,
After my researching, I don't find any useful solutions in Power BI. Maybe you can solve the problem from the perspective of HoneyPots. I found an article to avoid HoneyPots: https://www.pentestpartners.com/security-blog/need-to-avoid-a-honeypot-heres-how/
If it doesn't work, you may create a support ticket.
Thanks for your reply.
It is sad to see that 2 Microsoft products are lacking that kind of configurations.
Thanks for taking the time to answer my question.
have a good day.
User | Count |
---|---|
98 | |
76 | |
76 | |
49 | |
27 |