Register now to learn Fabric in free live sessions led by the best Microsoft experts. From Apr 16 to May 9, in English and Spanish.
Hi!
A user in my organization is using Power BI to extract user lists and information from the Active Directory.
Doing so triggers a lot of security alerts to the SOC Team for AD Scan and trigger of HoneyPots.
Is there any way that the user can refine his query to a specific "OU" and not the whole domain?
Thanks for your help.
Solved! Go to Solution.
Hi @Menzo ,
After my researching, I don't find any useful solutions in Power BI. Maybe you can solve the problem from the perspective of HoneyPots. I found an article to avoid HoneyPots: https://www.pentestpartners.com/security-blog/need-to-avoid-a-honeypot-heres-how/
If it doesn't work, you may create a support ticket.
In the field "distinguishedName" you can do a "contains" search for "OU=[name of OU]"
Hi @Menzo ,
After my researching, I don't find any useful solutions in Power BI. Maybe you can solve the problem from the perspective of HoneyPots. I found an article to avoid HoneyPots: https://www.pentestpartners.com/security-blog/need-to-avoid-a-honeypot-heres-how/
If it doesn't work, you may create a support ticket.
Thanks for your reply.
It is sad to see that 2 Microsoft products are lacking that kind of configurations.
Thanks for taking the time to answer my question.
have a good day.
Covering the world! 9:00-10:30 AM Sydney, 4:00-5:30 PM CET (Paris/Berlin), 7:00-8:30 PM Mexico City
Check out the April 2024 Power BI update to learn about new features.
User | Count |
---|---|
106 | |
94 | |
76 | |
62 | |
50 |
User | Count |
---|---|
147 | |
106 | |
104 | |
87 | |
61 |