|
1 | 1 | --- |
2 | 2 | title: Configure a gMSA directory service account for Defender for Identity |
3 | | -description: Create and configure a group managed service account (gMSA) for use as the Directory Service account in Microsoft Defender for Identity. |
| 3 | +description: Create and configure a group managed service account (gMSA) for use as the Directory service account in Microsoft Defender for Identity. |
4 | 4 | ms.date: 10/12/2025 |
5 | 5 | ms.topic: how-to |
6 | 6 | ms.reviewer: rlitinsky |
@@ -35,17 +35,15 @@ This article describes how to create a [group managed service account (gMSA)](/w |
35 | 35 |
|
36 | 36 | ## Create the gMSA account |
37 | 37 |
|
38 | | - |
39 | 38 | 1. If you've never used a gMSA account before, you might need to generate a new root key for the Microsoft Group Key Distribution Service (KdsSvc) within Active Directory. This step is required only once per forest. |
40 | 39 | To generate a new root key for immediate use, run the following command: |
41 | 40 |
|
42 | 41 | ```powershell |
43 | 42 | Add-KdsRootKey -EffectiveImmediately |
44 | 43 | ``` |
45 | 44 |
|
46 | | -1. Update the following code with variable values for your environment. |
47 | | -1. Give each gMSA a unique name for each forest or domain. |
48 | | -1. Run the PowerShell commands as an administrator. This script creates a gMSA account, a group that can retrieve the account password, and adds the specified computer accounts to that group. |
| 45 | +1. Update the following code with variable values for your environment. Make sure to give each gMSA a unique name for each forest or domain. |
| 46 | +1. Run the PowerShell commands as an administrator. This script creates a gMSA account, and a group that can retrieve the account password. The script then adds the specified computer accounts to that group. |
49 | 47 |
|
50 | 48 | ```powershell |
51 | 49 | # Variables: |
@@ -120,9 +118,9 @@ If you see this alert, check to see if the *Log on as a service policy* is confi |
120 | 118 | > [!NOTE] |
121 | 119 | > If you use the Group Policy Management Editor to configure the **Log on as a service** setting, make sure to add both **NT Service\All Services** and the gMSA account you created. |
122 | 120 |
|
123 | | -## Configure a Directory Service account in Microsoft Defender XDR |
| 121 | +## Configure a Directory service account in Microsoft Defender XDR |
124 | 122 |
|
125 | | -To connect your sensors with your Active Directory domains, configure Directory Service accounts in Microsoft Defender XDR. |
| 123 | +To connect your sensors with your Active Directory domains, configure Directory service accounts in Microsoft Defender XDR. |
126 | 124 |
|
127 | 125 | 1. In [Microsoft Defender XDR](https://security.microsoft.com/), go to **Settings > Identities**. |
128 | 126 |
|
|
0 commit comments