Skip to content

Commit 63506b9

Browse files
authored
Update service-accounts-govern-on-premises.md
1 parent 627e795 commit 63506b9

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/active-directory/fundamentals/service-accounts-govern-on-premises.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -52,10 +52,10 @@ When you create service accounts, consider the information in the following tabl
5252

5353
For user accounts used as service accounts, apply the following settings:
5454

55-
* Account expiration - set the service account to automatically expire, after its review period, unless the account can continue
56-
* LogonWorkstations - restrict service account sign-in permissions
55+
* **Account expiration** - set the service account to automatically expire, after its review period, unless the account can continue
56+
* **LogonWorkstations** - restrict service account sign-in permissions
5757
* If it runs locally and accesses resources on the machine, restrict it from signing in elsewhere
58-
* Can't change password - set the parameter to **true** to prevent the service account from changing its own password
58+
* **Can't change password** - set the parameter to **true** to prevent the service account from changing its own password
5959

6060
## Lifecycle management process
6161

@@ -171,7 +171,7 @@ To deprovision:
171171
5. Create a business policy that determines the amount of time that accounts are disabled.
172172
6. Delete the service account.
173173

174-
* **MSAs** - see, [Uninstall-ADServiceAccount](/powershell/module/activedirectory/uninstall-adserviceaccount?view=winserver2012-ps&preserve-view=true).
174+
* **MSAs** - see, [Uninstall-ADServiceAccount](/powershell/module/activedirectory/uninstall-adserviceaccount?view=winserver2012-ps&preserve-view=true)
175175
* Use PowerShell, or delete it manually from the managed service account container
176176
* **Computer or user accounts** - manually delete the account from Active Directory
177177

0 commit comments

Comments
 (0)