Skip to content

Commit 2b35d5a

Browse files
authored
Merge pull request #5076 from DeCohen/WI476530-uuf-security-assessment-change-password-krbtg-fix-link
Update the script links for Microsoft KRBTGT Reset script
2 parents 63b2466 + 7587a72 commit 2b35d5a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

defender-for-identity/change-password-krbtgt-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ If the KRBTGT account's password is compromised, an attacker can use its hash to
2929
1. Take appropriate action on those accounts by resetting their password **twice** to invalidate the Golden Ticket attack. 
3030

3131
> [!NOTE]
32-
> The krbtgt Kerberos account in all Active Directory domains supports key storage in all Kerberos Key Distribution Centers (KDC). To renew the Kerberos keys for TGT encryption, periodically change the krbtgt account password. It is recommended to use the [Microsoft-provided script.](https://github.com/microsoft/New-KrbtgtKeys.ps1)
32+
> The krbtgt Kerberos account in all Active Directory domains supports key storage in all Kerberos Key Distribution Centers (KDC). To renew the Kerberos keys for TGT encryption, periodically change the krbtgt account password. We recommend using the [Microsoft KRBTGT Reset Script](https://gist.github.com/mubix/fd0c89ec021f70023695) and the [Public AD Scripts](https://github.com/zjorz/Public-AD-Scripts/blob/5666e5fcafd933c3288a47944cd6fb289dde54a1/Reset-KrbTgt-Password-For-RWDCs-And-RODCs.ps1) to change the password twice. These scripts automate the process of changing the password and ensure that the change is replicated across all domain controllers.
3333
> When resetting the password twice, wait at least 10 hours between resets to avoid Kerberos authentication issues. This wait time is enforced by the script and aligns with best practices.
3434
3535
### Next steps

0 commit comments

Comments
 (0)