Earn a 50% discount on the DP-600 certification exam by completing the Fabric 30 Days to Learn It challenge.
Hi!
A user in my organization is using Power BI to extract user lists and information from the Active Directory.
Doing so triggers a lot of security alerts to the SOC Team for AD Scan and trigger of HoneyPots.
Is there any way that the user can refine his query to a specific "OU" and not the whole domain?
Thanks for your help.
Solved! Go to Solution.
Hi @Menzo ,
After my researching, I don't find any useful solutions in Power BI. Maybe you can solve the problem from the perspective of HoneyPots. I found an article to avoid HoneyPots: https://www.pentestpartners.com/security-blog/need-to-avoid-a-honeypot-heres-how/
If it doesn't work, you may create a support ticket.
In the field "distinguishedName" you can do a "contains" search for "OU=[name of OU]"
Hi @Menzo ,
After my researching, I don't find any useful solutions in Power BI. Maybe you can solve the problem from the perspective of HoneyPots. I found an article to avoid HoneyPots: https://www.pentestpartners.com/security-blog/need-to-avoid-a-honeypot-heres-how/
If it doesn't work, you may create a support ticket.
Thanks for your reply.
It is sad to see that 2 Microsoft products are lacking that kind of configurations.
Thanks for taking the time to answer my question.
have a good day.
User | Count |
---|---|
98 | |
90 | |
83 | |
70 | |
67 |
User | Count |
---|---|
113 | |
104 | |
101 | |
73 | |
65 |