Skip to content

Commit 3425ba2

Browse files
authored
Update service-accounts-standalone-managed.md
1 parent 18f54b9 commit 3425ba2

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/fundamentals/service-accounts-standalone-managed.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ In Active Directory (AD), sMSAs are tied to a server that runs a service. You ca
3030

3131
sMSAs have greater security than user accounts used as service accounts. They help reduce administrative overhead:
3232

33-
* Set strong passwords - sMSAs use 240-byte, randomly generated complex passwords
33+
* Set strong passwords - sMSAs use 240 byte, randomly generated complex passwords
3434
* The complexity minimizes the likelihood of compromise by brute force or dictionary attacks
3535
* Cycle passwords regularly - Windows changes the sMSA password every 30 days.
3636
* Service and domain administrators don’t need to schedule password changes or manage the associated downtime
@@ -47,7 +47,7 @@ Use sMSAs to simplify management and security tasks. sMSAs are useful when servi
4747
> [!NOTE]
4848
> You can use sMSAs for more than one service, but it's recommended that each service has an identity for auditing.
4949
50-
If the software creator can’t tell you if the applicaiton uses an MSA, test the application. Create a test environment and ensure it accesses required resources.
50+
If the software creator can’t tell you if the application uses an MSA, test the application. Create a test environment and ensure it accesses required resources.
5151

5252
Learn more: [Managed Service Accounts: Understanding, Implementing, Best Practices, and Troubleshooting](/archive/blogs/askds/managed-service-accounts-understanding-implementing-best-practices-and-troubleshooting)
5353

0 commit comments

Comments
 (0)