You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/service-accounts-govern-on-premises.md
+17-12Lines changed: 17 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.subservice: fundamentals
10
10
ms.topic: conceptual
11
-
ms.date: 02/07/2023
11
+
ms.date: 02/10/2023
12
12
ms.author: jricketts
13
13
ms.reviewer: ajburnle
14
14
ms.custom: "it-pro, seodec18"
@@ -45,17 +45,17 @@ When you create service accounts, consider the information in the following tabl
45
45
| Ownership| Ensure there's an account owner who requests and assumes responsibility |
46
46
| Scope| Define the scope, and anticipate usage duration|
47
47
| Purpose| Create service accounts for one purpose |
48
-
| Permissions | Apply the principle of least permission:<li>Don't assign permissions to built-in groups, such as administrators<li>Remove local machine permissions, where feasible<li>Tailor access, and use AD delegation for directory access<li>Use granular access permissions<li>Set account expiration and location restrictions on user-based service accounts |
49
-
| Monitor and audit use|<li>Monitor sign-in data, and ensure it matches the intended usage <li>Set alerts for anomalous usage |
48
+
| Permissions | Apply the principle of least permission:</br> - Don't assign permissions to built-in groups, such as administrators</br> - Remove local machine permissions, where feasible</br> - Tailor access, and use AD delegation for directory access</br> - Use granular access permissions</br> - Set account expiration and location restrictions on user-based service accounts |
49
+
| Monitor and audit use|- Monitor sign-in data, and ensure it matches the intended usage</br> - Set alerts for anomalous usage |
50
50
51
51
### User account restrictions
52
52
53
53
For user accounts used as service accounts, apply the following settings:
54
54
55
-
* Account expiration - set the service account to automatically expire, after its review period, unless the account can continue
56
-
* LogonWorkstations - restrict service account sign-in permissions
55
+
***Account expiration** - set the service account to automatically expire, after its review period, unless the account can continue
56
+
***LogonWorkstations** - restrict service account sign-in permissions
57
57
* If it runs locally and accesses resources on the machine, restrict it from signing in elsewhere
58
-
* Can't change password - set the parameter to **true** to prevent the service account from changing its own password
58
+
***Can't change password** - set the parameter to **true** to prevent the service account from changing its own password
59
59
60
60
## Lifecycle management process
61
61
@@ -135,10 +135,14 @@ Consider the following restrictions, although some might not be relevant to your
135
135
* For user accounts used as service accounts, define a realistic end date
136
136
* Use the **Account Expires** flag to set the date
* Create accounts in an [organizational unit location](/windows-server/identity/ad-ds/plan/delegating-administration-of-account-ous-and-resource-ous) that ensures only some users will manage it
141
-
* Set up and collect auditing that detects [service account changes](/windows/security/threat-protection/auditing/audit-directory-service-changes), and [service account usage](https://www.manageengine.com/products/active-directory-audit/how-to/audit-kerberos-authentication-events.html)
138
+
* See, [Set-ADUser (Active Directory)](/powershell/module/activedirectory/set-aduser)
139
+
* Password policy requirements
140
+
* See, [Password and account lockout policies on Azure AD Domain Services managed domains](../../active-directory-domain-services/password-policy.md)
141
+
* Create accounts in an organizational unit location that ensures only some users will manage it
142
+
* See, [Delegating Administration of Account OUs and Resource OUs](/windows-server/identity/ad-ds/plan/delegating-administration-of-account-ous-and-resource-ous)
143
+
* Set up and collect auditing that detects service account changes:
144
+
* See, [Audit Directory Service Changes](/windows/security/threat-protection/auditing/audit-directory-service-changes), and
145
+
* Go to manageengine.com for [How to audit Kerberos authentication events in AD](https://www.manageengine.com/products/active-directory-audit/how-to/audit-kerberos-authentication-events.html)
142
146
* Grant account access more securely before it goes into production
143
147
144
148
### Service account reviews
@@ -167,8 +171,9 @@ To deprovision:
167
171
5. Create a business policy that determines the amount of time that accounts are disabled.
168
172
6. Delete the service account.
169
173
170
-
* MSAs - see, [Uninstall the account](/powershell/module/activedirectory/uninstall-adserviceaccount?view=winserver2012-ps&preserve-view=true). Use PowerShell, or delete it manually from the managed service account container.
171
-
* Computer or user accounts - manually delete the account from Active Directory
174
+
***MSAs** - see, [Uninstall-ADServiceAccount](/powershell/module/activedirectory/uninstall-adserviceaccount?view=winserver2012-ps&preserve-view=true)
175
+
* Use PowerShell, or delete it manually from the managed service account container
176
+
***Computer or user accounts** - manually delete the account from Active Directory
0 commit comments