Forum Discussion

MarkusQ_oh22's avatar
MarkusQ_oh22
Copper Contributor
May 05, 2025

Secure Score - gMSA not recognized ("Change service account to avoid cached password in registry")

Hello,

 

we have several SQL Servers who were marked as "exposed devices" in the secure score recommendation "Change service account to avoid cached password in windows registry". The remediation option called for the use of "group Managed Service Accounts" ("gMSA").

 

We implemented those gMSAs. However, the servers are still marked as exposed. What did we do wrong? Is this a false-positive?

 

I already did some checks with the help of Microsoft Copilot - there are no cached credentials for the gMSAs present, the Accounts are correctly set up (they are working for SQL Server services), and we don't use Microsoft Defender for Identity (if that is needed).

 

 

Any advises?

 

Thank you very much!

2 Replies

  • MarkusQ_oh22's avatar
    MarkusQ_oh22
    Copper Contributor

    Hi,

    Thank your for the reply.

     

    Regarding the "make sure" section:

    -> yes

    -> yes

    -> yes

     

    And we have the remediation in place for well over 2 weeks now. Time should not be the problem here.

     

    Any other ideas?

  • Konstant_oh22's avatar
    Konstant_oh22
    Copper Contributor

    Hello MarkusQ_oh22,

    I asked ChatGPT and got this:

    Your situation is not uncommon—many admins run into this false-positive or delay issue after correctly implementing gMSA for SQL Server but still seeing Secure Score report it as an "exposed device." Here’s a breakdown of why this might happen and what steps you can take to validate or resolve it:

    What’s Likely Happening
    Delayed Secure Score Refresh:
    Secure Score assessments are not real-time. It may take 24-72 hours for the backend to re-assess the environment.
    Even longer delays can occur if certain telemetry is missing or if signals aren’t being picked up correctly.
    Telemetry Source Limitations:
    Secure Score's recommendation for cached service account passwords depends on Defender for Endpoint (MDE), not Defender for Identity.
    If you don’t have MDE deployed on those SQL Servers, Secure Score cannot verify the remediation (even if it's done correctly).
    gMSA Usage Misinterpreted:
    Some older versions of telemetry might misidentify the service account as a regular user account, especially if:
    The gMSA wasn't correctly set as Log On As for the service.
    SQL Server or OS logs show historical use of old credentials.
    The gMSA was not registered properly in AD, or the machine account is not allowed to retrieve the gMSA password.

    # Confirm the SQL Server service is using a gMSA
    Get-WmiObject Win32_Service | Where-Object { $_.Name -like "*SQL*" } | Select-Object Name, StartName

    # Check for cached credentials
    cmdkey /list

    Make sure:

    The StartName is in the format DOMAIN\gMSAName$
    No cached credentials appear for that gMSA
    The gMSA was added with the correct PrincipalsAllowedToRetrieveManagedPassword

Resources