Skip to content

Commit 4f67ad3

Browse files
Merge pull request #226990 from v-edmckillop/patch-117
Update service-accounts-govern-on-premises.md
2 parents e102e38 + 0fea123 commit 4f67ad3

File tree

1 file changed

+17
-12
lines changed

1 file changed

+17
-12
lines changed

articles/active-directory/fundamentals/service-accounts-govern-on-premises.md

Lines changed: 17 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 02/07/2023
11+
ms.date: 02/10/2023
1212
ms.author: jricketts
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
@@ -45,17 +45,17 @@ When you create service accounts, consider the information in the following tabl
4545
| Ownership| Ensure there's an account owner who requests and assumes responsibility |
4646
| Scope| Define the scope, and anticipate usage duration|
4747
| Purpose| Create service accounts for one purpose |
48-
| Permissions | Apply the principle of least permission:<li>Don't assign permissions to built-in groups, such as administrators<li>Remove local machine permissions, where feasible<li>Tailor access, and use AD delegation for directory access<li>Use granular access permissions<li>Set account expiration and location restrictions on user-based service accounts |
49-
| Monitor and audit use| <li>Monitor sign-in data, and ensure it matches the intended usage <li>Set alerts for anomalous usage |
48+
| Permissions | Apply the principle of least permission:</br> - Don't assign permissions to built-in groups, such as administrators</br> - Remove local machine permissions, where feasible</br> - Tailor access, and use AD delegation for directory access</br> - Use granular access permissions</br> - Set account expiration and location restrictions on user-based service accounts |
49+
| Monitor and audit use| - Monitor sign-in data, and ensure it matches the intended usage</br> - Set alerts for anomalous usage |
5050

5151
### User account restrictions
5252

5353
For user accounts used as service accounts, apply the following settings:
5454

55-
* Account expiration - set the service account to automatically expire, after its review period, unless the account can continue
56-
* LogonWorkstations - restrict service account sign-in permissions
55+
* **Account expiration** - set the service account to automatically expire, after its review period, unless the account can continue
56+
* **LogonWorkstations** - restrict service account sign-in permissions
5757
* If it runs locally and accesses resources on the machine, restrict it from signing in elsewhere
58-
* Can't change password - set the parameter to **true** to prevent the service account from changing its own password
58+
* **Can't change password** - set the parameter to **true** to prevent the service account from changing its own password
5959

6060
## Lifecycle management process
6161

@@ -135,10 +135,14 @@ Consider the following restrictions, although some might not be relevant to your
135135
* For user accounts used as service accounts, define a realistic end date
136136
* Use the **Account Expires** flag to set the date
137137
* Learn more: [Set-ADAccountExpiration](/powershell/module/activedirectory/set-adaccountexpiration)
138-
* Sign in to the [LogonWorkstation](/powershell/module/activedirectory/set-aduser)
139-
* [Password policy](../../active-directory-domain-services/password-policy.md) requirements
140-
* Create accounts in an [organizational unit location](/windows-server/identity/ad-ds/plan/delegating-administration-of-account-ous-and-resource-ous) that ensures only some users will manage it
141-
* Set up and collect auditing that detects [service account changes](/windows/security/threat-protection/auditing/audit-directory-service-changes), and [service account usage](https://www.manageengine.com/products/active-directory-audit/how-to/audit-kerberos-authentication-events.html)
138+
* See, [Set-ADUser (Active Directory)](/powershell/module/activedirectory/set-aduser)
139+
* Password policy requirements
140+
* See, [Password and account lockout policies on Azure AD Domain Services managed domains](../../active-directory-domain-services/password-policy.md)
141+
* Create accounts in an organizational unit location that ensures only some users will manage it
142+
* See, [Delegating Administration of Account OUs and Resource OUs](/windows-server/identity/ad-ds/plan/delegating-administration-of-account-ous-and-resource-ous)
143+
* Set up and collect auditing that detects service account changes:
144+
* See, [Audit Directory Service Changes](/windows/security/threat-protection/auditing/audit-directory-service-changes), and
145+
* Go to manageengine.com for [How to audit Kerberos authentication events in AD](https://www.manageengine.com/products/active-directory-audit/how-to/audit-kerberos-authentication-events.html)
142146
* Grant account access more securely before it goes into production
143147

144148
### Service account reviews
@@ -167,8 +171,9 @@ To deprovision:
167171
5. Create a business policy that determines the amount of time that accounts are disabled.
168172
6. Delete the service account.
169173

170-
* MSAs - see, [Uninstall the account](/powershell/module/activedirectory/uninstall-adserviceaccount?view=winserver2012-ps&preserve-view=true). Use PowerShell, or delete it manually from the managed service account container.
171-
* Computer or user accounts - manually delete the account from Active Directory
174+
* **MSAs** - see, [Uninstall-ADServiceAccount](/powershell/module/activedirectory/uninstall-adserviceaccount?view=winserver2012-ps&preserve-view=true)
175+
* Use PowerShell, or delete it manually from the managed service account container
176+
* **Computer or user accounts** - manually delete the account from Active Directory
172177

173178
## Next steps
174179

0 commit comments

Comments
 (0)