Skip to content

Commit 641ddec

Browse files
authored
Update recover-from-golden-gmsa-attack.md
1 parent 2cefd2a commit 641ddec

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

support/windows-server/windows-security/recover-from-golden-gmsa-attack.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ The approach is to create a new KDS Root Key object that's unknown to the attack
8888
> - You don't have to manually repair gMSAs that were created after the Active Directory Domain Services (AD DS) database exposure ended. The attacker doesn't know the details of these accounts, and the passwords for these accounts will regenerate based on the new KDS Root Key object.
8989
> - You should consider the gMSA object in "maintenance mode" until the procedure is completed, and ignore possible errors that are reported with the accounts in the System, Security, Directory Services, and Security-Netlogon event log.
9090
> - The guide assumes that the gMSAs are child objects of the **Managed Service Accounts** container. If you have moved the accounts to custom parent containers, you need to run the steps related to the **Managed Service Accounts** container on the gMSA in these containers.
91-
> - An authoritative restore rolls back all attributes to their values at the time of the backup, including the accounts that are allowed to retrieve the gMSA credentials (`PrincipalsAllowedToRetrieveManagedPassword`).
91+
> - An authoritative restore rolls back all attributes to the state they were in at the time of the backup, including the accounts that are allowed to retrieve the gMSA credentials (`PrincipalsAllowedToRetrieveManagedPassword`).
9292
9393
In the domain holding the gMSAs that you want to repair, follow these steps:
9494

0 commit comments

Comments
 (0)