Skip to content

Commit 58e3aff

Browse files
authored
Update ensure-privileged-accounts-with-sensitive-flag.md
1 parent 0ea55a8 commit 58e3aff

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

ATPDocs/ensure-privileged-accounts-with-sensitive-flag.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.date: 10/05/2024
1414

1515
# Security Assessment: Ensure privileged accounts are not delegated
1616

17-
This recommendation lists all privileged accounts that do not have the "not delegated" setting enabled, highlighting those potentially exposed to delegation-related risks. Privileged accounts are accounts that are being members of a privileged group such as Domain admins, Schema admins, and so on. 
17+
This recommendation lists all privileged accounts that don't have the "not delegated" setting enabled, highlighting those potentially exposed to delegation-related risks. Privileged accounts are accounts that are being members of a privileged group such as Domain admins, Schema admins, and so on. 
1818

1919
## Organization risk
2020

@@ -23,11 +23,11 @@ For device accounts, setting them to "not delegated" is important to prevent it
2323

2424
## Remediation steps
2525

26-
1. Review the list of exposed entities to discover which of your privileged accounts don’t have the configuration flag "this account is sensitive and cannot be delegated". 
26+
1. Review the list of exposed entities to discover which of your privileged accounts don’t have the configuration flag "this account is sensitive and cannot be delegated."
2727

2828
1. Take appropriate action on those accounts:
2929

30-
- For user accounts: by setting the account's control flags to "this account is sensitive and cannot be delegated". Under the Account tab, select the check box to this flag in the Account Options section. This will prevent users from gaining access to the account and manipulating system settings.  
30+
- For user accounts: by setting the account's control flags to "this account is sensitive and cannot be delegated." Under the Account tab, select the check box to this flag in the Account Options section. This will prevent users from gaining access to the account and manipulating system settings.  
3131
![Screenshot of user profile.](media/ensure-privileged-accounts-with-sensitive-flag/administrator-properties.png)
3232

3333
- For device accounts:

0 commit comments

Comments
 (0)