Unsecure Kerberos delegation still visible after mitigation

Occasional Contributor


Azure ATP noticed some accounts with unsecure Kerberos delegation. We deleted the affected accounts in active directory. Actually the warning should disapere after that but is still visible. I dont unterstand.

7 Replies


Azure ATP needs to detect that these accounts are actually deleted, have you seen the "Deleted" tag added to these user account pages in AATP?

@Or Tsemah 

The accounts are still marked as "active" in AATP even though they are deleted in active directory.

best response confirmed by NinjaKitty (Occasional Contributor)

Make sure the AD account configured in the console has read access to AD's deleted items container.

That was it. Thank you very much.

Sorry for late reply. I had trouble logging into techcommunity with my federated account.
I've the same problem (deleted account in AD still marked in AATP as active) but AD didn't have recycle bin active due to the functional level I cannot raise.
May you suggest something to solve this problem?
thank you
We have plans to discover deleted objects without the deleted items folder, by checking activity times, I think it's active for some preview customers, not sure about the status of it.
Can you email AatpFeedback at microsoft com and describe your issue you are facing in this email?
yes, I can, for sure!!
thank you