Forums on Intune, SCCM, and Windows 11

Welcome to the forums. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your topics and posts, as well as connect with other members through your own private inbox!

NEW Changing AD Account

  • Thread starter Thread starter SouthernIT
  • Start date Start date
  • Replies Replies 3
  • Views Views 2K

SouthernIT

New Member
Messages
3
Reaction score
0
Points
1
When our SCCM install was first configured, it was set to use the default administrator AD account. I'm wanting to divorce ourselves from this obvious security issue. I've gone through and changed the network access account and client push accounts, but I'm still seeing the administrator user pop up in my Defender for Endpoint activity logs on our Windows endpoints. I'm hoping you guys can point me in the direction of what I've missed - thanks!

Code:
Resource access: device SCCMSERVER, property Spns cifs/SCCMSERVER.domain.local
Resource access: property Spns krbtgt/DOMAIN.LOCAL, user krbtgt

Both of these entries are being reported by our Windows endpoints on a regular basis.
 
When our SCCM install was first configured, the default "administrator" account was used for practically the entire SCCM setup (NAA, etc). Ultimately, we're trying to disable that account for security purposes. We've gone through and changed all of the accounts that SCCM uses to the best of our knowledge, but we're still seeing those above entries in our defender logs attached to that administrator user, so we'd like to figure out what we missed before we disable it.
 
Exactly what accounts or services have you changed? ConfigMgr, use the local system account for just about everything. so..
 
Back
Top