Skip to content

Commit 0ea55a8

Browse files
authored
Merge pull request #15 from LiorShapiraa/docs-editor/ensure-privileged-accounts-wit-1731430567
Update ensure-privileged-accounts-with-sensitive-flag.md
2 parents 4f6c7cc + ec8c98f commit 0ea55a8

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

ATPDocs/ensure-privileged-accounts-with-sensitive-flag.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -33,18 +33,17 @@ For device accounts, setting them to "not delegated" is important to prevent it
3333
- For device accounts:
3434
The safest approach is to use a PowerShell script to configure the device to prevent it from being used in any delegation scenario, ensuring that credentials on this machine cannot be forwarded to access other services.
3535

36-
```azurepowershell
37-
$name = "ComputerA"
36+
```
37+
$name = "ComputerA"
3838
Get-ADComputer -Identity $name |
3939
Set-ADAccountControl -AccountNotDelegated:$true
40-
```
41-
42-
Another option is to set the `UserAccountControl` attribute to `NOT_DELEGATED = 0x100000` under the Attribute Editor tab for the exposed device.
43-
For example:
40+
```
41+
Another option is to set the `UserAccountControl` attribute to `NOT_DELEGATED = 0x100000` under the Attribute Editor tab for the exposed device.
42+
43+
For example:
44+
4445
![Screenshot of device profile.](media/ensure-privileged-accounts-with-sensitive-flag/device-profile.png)
4546

46-
It’s important to verify that the exposed computer does not require any delegation capabilities before changing the configuration.
47-
4847
## Next steps
4948

5049
[Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)

0 commit comments

Comments
 (0)