Hi Seema,
HAve a look through these references...
https://learn.microsoft.com/en-us/defender-for-identity/change-password-krbtgt-account
https://blog.quest.com/what-is-krbtgt-and-why-should-you-change-the-password/
Regards,
Geoff
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Dear Community
Kindly note that we have a single domain and single tree. We have four sites and each site has its own domain controller. They are all getting synced. I have local active directory getting synced with Azure AD for office 365 accounts. After we had a third party do VAPT in our environment, they said that the Stale krbtgt Password is having Increased Risk of Golden Ticket Attack. I wanted to know What is the recommended standard practice? and If its recommended to change what will be its impact in my environment as explained previously?
I have selected tag as ADFS but I have active directory domain services.
Hi Seema,
HAve a look through these references...
https://learn.microsoft.com/en-us/defender-for-identity/change-password-krbtgt-account
https://blog.quest.com/what-is-krbtgt-and-why-should-you-change-the-password/
Regards,
Geoff
Hello,
It depends when your krbtgt account password was changed.. or not changed at all
Best practice is to change password twice with 10h(default ticket lifetime) in between resets. So basically 2 password resets for krbtgt account to erase remembered password.
Now it is possible to do it without powershell script from ADUC GUI.
Here is a good article - https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/faqs-from-the-field-on-krbtgt-reset/2367838