Skip to content

Commit fc9c653

Browse files
authored
Merge pull request #3794 from LiorShapiraa/docs-editor/ensure-privileged-accounts-wit-1731429649
Update ensure-privileged-accounts-with-sensitive-flag.md
2 parents b007546 + 5629eda commit fc9c653

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

ATPDocs/ensure-privileged-accounts-with-sensitive-flag.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
# For more information, see https://review.learn.microsoft.com/en-us/help/platform/learn-editor-add-metadata?branch=main
44
# For valid values of ms.service, ms.prod, and ms.topic, see https://review.learn.microsoft.com/en-us/help/platform/metadata-taxonomies?branch=main
55

6-
title: 'Security Assessment: Ensure that all privileged accounts have the configuration flag "this account is sensitive and cannot be delegated"'
6+
title: 'Security Assessment: Ensure privileged accounts are not delegated'
77
description: This recommendation lists all privileged accounts that lack the "account is sensitive and cannot be delegated" flag.
88
author: LiorShapiraa # GitHub alias
99
ms.author: liorshapira
@@ -12,38 +12,38 @@ ms.topic: article
1212
ms.date: 10/05/2024
1313
---
1414

15-
# Security Assessment: Ensure that all privileged accounts have the configuration flag "this account is sensitive and cannot be delegated"
15+
# Security Assessment: Ensure privileged accounts are not delegated
1616

17-
This recommendation lists all privileged accounts that lack the "account is sensitive and cannot be delegated" flag. Privileged accounts are accounts that are being members of a privileged group such as Domain admins, Schema admins, Read only domain controllers and so on. 
17+
This recommendation lists all privileged accounts that don't have the "not delegated" setting enabled, highlighting those potentially exposed to delegation-related risks. Privileged accounts are accounts that are being members of a privileged group such as Domain admins, Schema admins, and so on. 
1818

1919
## Organization risk
2020

21-
If the sensitive flag is disabled, attackers could exploit Kerberos delegation to misuse privileged account credentials, leading to unauthorized access, lateral movement, and potential network-wide security breaches.   Setting the sensitive flag on privileged accounts will prevent users from gaining access to the account and manipulating system settings. 
21+
If the sensitive flag is disabled, attackers could exploit Kerberos delegation to misuse privileged account credentials, leading to unauthorized access, lateral movement, and potential network-wide security breaches. Setting the sensitive flag on privileged user accounts prevent users from gaining access to the account and manipulating system settings.
22+
For device accounts, setting them to "not delegated" is important to prevent it from being used in any delegation scenario, ensuring that credentials on this machine can't be forwarded to access other services.
2223

2324
## Remediation steps
2425

25-
1. Review the list of exposed entities to discover which of your privileged accounts don’t have the configuration flag "this account is sensitive and cannot be delegated". 
26+
1. Review the list of exposed entities to discover which of your privileged accounts don’t have the configuration flag "this account is sensitive and cannot be delegated."
2627

2728
1. Take appropriate action on those accounts:
2829

29-
- For user accounts: by setting the account's control flags to "this account is sensitive and cannot be delegated". Under the Account tab, select the check box to this flag in the Account Options section. This will prevent users from gaining access to the account and manipulating system settings.  
30+
- For user accounts: by setting the account's control flags to "this account is sensitive and cannot be delegated." Under the Account tab, select the check box to this flag in the Account Options section. This prevents users from gaining access to the account and manipulating system settings.  
3031
![Screenshot of user profile.](media/ensure-privileged-accounts-with-sensitive-flag/administrator-properties.png)
3132

3233
- For device accounts:
33-
The safest approach is to use a PowerShell script to configure the device to prevent it from being used in any delegation scenario, ensuring that credentials on this machine cannot be forwarded to access other services.
34+
The safest approach is to use a PowerShell script to configure the device to prevent it from being used in any delegation scenario, ensuring that credentials on this machine can't be forwarded to access other services.
3435

35-
```azurepowershell
36-
$name = "ComputerA"
36+
```
37+
$name = "ComputerA"
3738
Get-ADComputer -Identity $name |
3839
Set-ADAccountControl -AccountNotDelegated:$true
39-
```
40-
41-
Another option is to set the `UserAccountControl` attribute to `NOT_DELEGATED = 0x100000` under the Attribute Editor tab for the exposed device.
42-
For example:
40+
```
41+
Another option is to set the `UserAccountControl` attribute to `NOT_DELEGATED = 0x100000` under the Attribute Editor tab for the exposed device.
42+
43+
For example:
44+
4345
![Screenshot of device profile.](media/ensure-privileged-accounts-with-sensitive-flag/device-profile.png)
4446

45-
It’s important to verify that the exposed computer does not require any delegation capabilities before changing the configuration.
46-
4747
## Next steps
4848

4949
[Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)

0 commit comments

Comments
 (0)