Skip to content

Commit 0fea123

Browse files
authored
Update service-accounts-govern-on-premises.md
1 parent 63506b9 commit 0fea123

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/fundamentals/service-accounts-govern-on-premises.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 02/07/2023
11+
ms.date: 02/10/2023
1212
ms.author: jricketts
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
@@ -137,7 +137,7 @@ Consider the following restrictions, although some might not be relevant to your
137137
* Learn more: [Set-ADAccountExpiration](/powershell/module/activedirectory/set-adaccountexpiration)
138138
* See, [Set-ADUser (Active Directory)](/powershell/module/activedirectory/set-aduser)
139139
* Password policy requirements
140-
* See, [Password and account lockout policies on Azure Active Directory Domain Services managed domains](../../active-directory-domain-services/password-policy.md)
140+
* See, [Password and account lockout policies on Azure AD Domain Services managed domains](../../active-directory-domain-services/password-policy.md)
141141
* Create accounts in an organizational unit location that ensures only some users will manage it
142142
* See, [Delegating Administration of Account OUs and Resource OUs](/windows-server/identity/ad-ds/plan/delegating-administration-of-account-ous-and-resource-ous)
143143
* Set up and collect auditing that detects service account changes:

0 commit comments

Comments
 (0)