You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/ensure-privileged-accounts-with-sensitive-flag.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,13 +12,14 @@ ms.topic: article
12
12
ms.date: 10/05/2024
13
13
---
14
14
15
-
# Security Assessment: Ensure that all privileged accounts have the configuration flag "this account is sensitive and cannot be delegated"
15
+
# Security Assessment: Ensure privileged accounts are not delegated
16
16
17
-
This recommendation lists all privileged accounts that lack the "account is sensitive and cannot be delegated" flag. Privileged accounts are accounts that are being members of a privileged group such as Domain admins, Schema admins, Read only domain controllers and so on.
17
+
This recommendation lists all privileged accounts that do not have the "not delegated" setting enabled, highlighting those potentially exposed to delegation-related risks. Privileged accounts are accounts that are being members of a privileged group such as Domain admins, Schema admins, and so on.
18
18
19
19
## Organization risk
20
20
21
-
If the sensitive flag is disabled, attackers could exploit Kerberos delegation to misuse privileged account credentials, leading to unauthorized access, lateral movement, and potential network-wide security breaches. Setting the sensitive flag on privileged accounts will prevent users from gaining access to the account and manipulating system settings.
21
+
If the sensitive flag is disabled, attackers could exploit Kerberos delegation to misuse privileged account credentials, leading to unauthorized access, lateral movement, and potential network-wide security breaches. Setting the sensitive flag on privileged user accounts will prevent users from gaining access to the account and manipulating system settings.
22
+
For device accounts, setting them to "not delegated" is important to prevent it from being used in any delegation scenario, ensuring that credentials on this machine cannot be forwarded to access other services.
22
23
23
24
## Remediation steps
24
25
@@ -32,14 +33,14 @@ If the sensitive flag is disabled, attackers could exploit Kerberos delegation t
32
33
- For device accounts:
33
34
The safest approach is to use a PowerShell script to configure the device to prevent it from being used in any delegation scenario, ensuring that credentials on this machine cannot be forwarded to access other services.
34
35
35
-
```azurepowershell
36
+
```azurepowershell
36
37
$name = "ComputerA"
37
38
Get-ADComputer -Identity $name |
38
39
Set-ADAccountControl -AccountNotDelegated:$true
39
40
```
40
41
41
-
Another option is to set the `UserAccountControl` attribute to `NOT_DELEGATED = 0x100000` under the Attribute Editor tab for the exposed device.
42
-
For example:
42
+
Another option is to set the `UserAccountControl` attribute to `NOT_DELEGATED = 0x100000` under the Attribute Editor tab for the exposed device.
43
+
For example:
43
44

44
45
45
46
It’s important to verify that the exposed computer does not require any delegation capabilities before changing the configuration.
0 commit comments