Forum Discussion

bryanb's avatar
bryanb
Brass Contributor
Apr 28, 2020

Azure ATP Group Managed Service Account (gMSA)

Hello, 
We are switching our service account for ATP to a gMSA.   

We are following the  gMSA guidance in this article: https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-prerequisites

 

Do you have any guidance for the following gMSA properties, or any other gMSA properties:

-ServicePrincipalNames <string[]>

-KerberosEncryptionType AES128,AES256

-ManagedPasswordIntervalInDays xx

 

 

I assume the PrincipalsAllowedToRetrieveManagedPassword will be set to the built-in Group “Domain Controllers”, correct?

 

 

Thank you

  • bryanb The main requirement for the creation of the gMSA is indeed the PrincipalsAllowedToRetrieveManagedPassword attribute which points to a group that contains the computer accounts with the sensor installed (you can use the Domain Controller group or a dedicated group for that).

  • bryanb What is the recommended approach with a gMSA account when you have multiple domains in the forest. Can we use single gMSA created in forest root domain to use on all the child domains, or would you need a gMSA for each domain in the forest?

    • ShawnMay's avatar
      ShawnMay
      Copper Contributor

      JohanHeyneke OMG - that stinks no one answered your question.

       

      You can absolutely use a single GMSA for your entire forest.

Resources