{"id":57378,"date":"2024-10-11T17:00:00","date_gmt":"2024-10-11T17:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/"},"modified":"2024-10-11T17:00:00","modified_gmt":"2024-10-11T17:00:00","slug":"microsofts-guidance-to-help-mitigate-kerberoasting","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/","title":{"rendered":"Microsoft\u2019s guidance to help mitigate Kerberoasting \u00a0"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/Security_377988_Blog_241008-2.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>As cyberthreats continue to evolve, it\u2019s essential for security professionals to stay informed about the latest attack vectors and defense mechanisms. <a href=\"https:\/\/attack.mitre.org\/techniques\/T1558\/003\/#:~:text=FIN7%20has%20used%20Kerberoasting%20PowerShell%20commands%20such%20as,\" target=\"_blank\" rel=\"noreferrer noopener\">Kerberoasting<\/a> is a well-known Active Directory (AD) attack vector whose effectiveness is growing because of the use of&nbsp;GPUs to accelerate password cracking techniques.&nbsp;<\/p>\n<p>Because Kerberoasting enables cyberthreat actors to steal credentials and quickly navigate through devices and networks, it\u2019s essential for administrators to take steps to reduce potential cyberattack surfaces. This blog explains Kerberoasting risks and provides recommended actions administrators can take now to help prevent successful Kerberoasting cyberattacks.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"what-is-kerberoasting\">What is Kerberoasting?&nbsp;<\/h2>\n<p>Kerberoasting is a cyberattack that targets the Kerberos authentication protocol with the intent to steal AD credentials. The Kerberos protocol conveys user authentication state in a type of message called a service ticket which is encrypted using a key derived from an account password. Users with AD credentials can request tickets to any service account in AD.&nbsp;&nbsp;<\/p>\n<p>In a Kerberoasting cyberattack, a threat actor that has taken over an AD user account will request tickets to other accounts and then perform offline brute-force attacks to guess and steal account passwords. Once the cyberthreat actor has credentials to the service account, they potentially gain more privileges within the environment.&nbsp;<\/p>\n<p>AD only issues and encrypts service tickets for accounts that have Service Principal Names (SPNs) registered. An SPN signifies that an account is a service account, not a normal user account, and that it should be used to host or run services, such as SQL Server. Since Kerberoasting requires access to encrypted service tickets, it can only target accounts that have an SPN in AD.&nbsp;<\/p>\n<p>SPNs are not typically assigned to normal user accounts which means they are better protected against Kerberoasting. Services that run as AD machine accounts instead of as standalone service accounts are better protected against compromise using Kerberoasting. AD machine account credentials are long and randomly generated so they contain sufficient entropy to render brute-force cyberattacks impractical.&nbsp;&nbsp;<\/p>\n<p>The accounts most vulnerable to Kerberoasting are those with weak passwords and those that use weaker encryption algorithms, especially RC4. RC4 is more susceptible to the cyberattack because it uses no salt or iterated hash when converting a password to an encryption key, allowing the cyberthreat actor to guess more passwords quickly. However, other encryption algorithms are still vulnerable when weak passwords are used. While AD will not try to use RC4 by default, RC4 is currently enabled by default, meaning a cyberthreat actor can attempt to request tickets encrypted using RC4. RC4 will be deprecated, and we intend to disable it by default in a future update to Windows 11 24H2 and Windows Server 2025.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"what-are-the-risks-associated-with-kerberoasting\">What are the risks associated with Kerberoasting?&nbsp;<\/h2>\n<p>Kerberoasting is a low-tech, high-impact attack. There are many open-source tools which can be used to query potential target accounts, get service tickets to those accounts, and then use brute force cracking techniques to obtain the account password offline.&nbsp;<\/p>\n<p>This type of password theft helps threat actors pose as legitimate service accounts and continue to move vertically and laterally through the network and machines. Kerberoasting typically targets high privilege accounts which can be used for a variety of attacks such as rapidly distributing malicious payloads like ransomware to other end user devices and services within a network.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n<p>Accounts without SPNs, such as standard user or administrator accounts, are susceptible to similar brute-force password guessing attacks and the recommendations below can be applied to them as well to mitigate risks.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"how-to-detect-kerberoasting\">How to detect Kerberoasting?&nbsp;<\/h2>\n<p>Administrators can use the techniques described below to detect Kerberoasting cyberattacks in their network.&nbsp;<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Check for ticket requests with unusual Kerberos encryption types. <\/strong>Cyberthreat actors can downgrade Kerberos ticket encryption to RC4 since cracking it is significantly faster. Admins can check the events in the <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-xdr\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender XDR<\/a> and filter the results based on the ticket encryption type to check for weaker encryption type usage.&nbsp;&nbsp;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><strong>Check for repeated service ticket requests. <\/strong>Check if a single user is requesting multiple service tickets for Kerberoasting-vulnerable accounts in a short time period.&nbsp;&nbsp;<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"recommendations-to-help-prevent-kerberoasting-from-succeeding\">Recommendations to help prevent Kerberoasting from succeeding&nbsp;<\/h2>\n<p>Microsoft recommends that IT administrators take the following steps to help harden their environments against Kerberoasting:&nbsp;<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Use Group Managed Service Accounts (gMSA) or Delegated Managed Service Accounts (dMSA) wherever possible<\/strong>:&nbsp;&nbsp;\n<ul class=\"wp-block-list\">\n<li>These accounts are ideal for multi-server applications that require centralized credential management and enhanced security against credential-based attacks, such as IIS, SQL Server, or other Windows services running in a domain-joined environment.&nbsp;<\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/windows-server\/identity\/ad-ds\/manage\/group-managed-service-accounts\/group-managed-service-accounts\/group-managed-service-accounts-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Group Managed Service Account (gMSA)<\/a> is an Active Directory account type that allows multiple servers or services to use the same account with automatic password management and simplified SPN handling. Passwords for gMSAs are 120 characters long, complex, and randomly generated, making them highly resistant to brute-force cyberattacks using currently known methods. &nbsp;<\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/windows-server\/identity\/ad-ds\/manage\/delegated-managed-service-accounts\/delegated-managed-service-accounts-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Delegated Managed Service Accounts (dMSA)<\/a> are the newest iteration of managed service accounts available on Windows Server 2025. Like gMSAs, they restrict which machines can make use of the accounts and they provide the same password mitigations against Keberoasting. However, unlike gMSAs, dMSAs have the added benefit of supporting seamless migration of standalone service accounts with passwords to the dMSA account type. They can also be optionally integrated with Credential Guard so that even if the server using dMSA is compromised, the service account credentials remain protected.&nbsp;&nbsp;<\/li>\n<\/ul>\n<\/li>\n<li><strong>If customers cannot use gMSA or dMSA, then manually set randomly generated, long passwords for service accounts: <\/strong>&nbsp;\n<ul class=\"wp-block-list\">\n<li>Service account administrators should maintain at least a 14-character minimum password. If possible, we recommend setting even longer passwords and randomly generating them for service accounts which will provide better protection against Kerberoasting. This recommendation also applies to normal user accounts. &nbsp;<\/li>\n<li>Ban commonly used passwords and audit the passwords for service accounts so that there is an inventory of accounts with weak passwords and can be remediated.&nbsp;&nbsp;<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><strong>Make sure all service accounts are configured to use AES (128 and 256 bit) for Kerberos service ticket encryption<\/strong>:&nbsp; <\/li>\n<li><strong>Audit the user accounts with SPNs:&nbsp;<\/strong>&nbsp;\n<ul class=\"wp-block-list\">\n<li>User accounts with SPNs should be audited. SPNs should be removed from accounts where they are not needed to reduce the cyberattack surface.&nbsp;<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"conclusion\">Conclusion&nbsp;<\/h2>\n<p>Kerberoasting is a threat to Active Directory environments due to its ability to exploit weak passwords and gain unauthorized access to service accounts. By understanding how Kerberoasting works and implementing the recommended guidance shared in this blog, organizations can significantly reduce their exposure to Kerberoasting.&nbsp;&nbsp;<\/p>\n<p>We truly believe that security is a team effort. By partnering with Original Equipment Manufacturers (OEMs), app developers, and others in the ecosystem, along with helping people to be better at protecting themselves, we are delivering a Windows experience that is more secure by design and secure by default. The <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RWMyFE\" target=\"_blank\" rel=\"noreferrer noopener\">Windows Security Book<\/a> is available to help you learn more about what makes it easy for users to stay secure with Windows.<\/p>\n<h2 class=\"wp-block-heading\" id=\"next-steps-with-microsoft-security\">Next steps with Microsoft Security<\/h2>\n<p>To learn more about Microsoft Security solutions, visit our\u202f<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>\u202fBookmark the\u202f<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u202fto keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)\u202ffor the latest news and updates on cybersecurity.&nbsp;<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n<h3 class=\"wp-block-heading\" id=\"references\">References &nbsp;<\/h3>\n<p><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/core-infrastructure-and-security\/active-directory-hardening-series-part-4-enforcing-aes-for\/ba-p\/4114965\" target=\"_blank\" rel=\"noreferrer noopener\">Directory Hardening Series \u2013 Part 4 \u2013 Enforcing AES for Kerberos \u2013 Microsoft Community Hub<\/a>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/27\/stopping-active-directory-attacks-and-other-post-exploitation-behavior-with-amsi-and-machine-learning\/\" target=\"_blank\" rel=\"noreferrer noopener\">Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning | Microsoft Security Blog<\/a>&nbsp;<\/p>\n<p>&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-10\/security\/threat-protection\/security-policy-settings\/network-security-configure-encryption-types-allowed-for-kerberos\" target=\"_blank\" rel=\"noreferrer noopener\">Network security Configure encryption types allowed for Kerberos \u2013 Windows 10 | Microsoft Learn,<\/a>&nbsp;&nbsp;<\/p>\n<p><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/core-infrastructure-and-security\/decrypting-the-selection-of-supported-kerberos-encryption-types\/ba-p\/1628797\" target=\"_blank\" rel=\"noreferrer noopener\">Decrypting the Selection of Supported Kerberos Encryption Types \u2013 Microsoft Community Hub<\/a>&nbsp;<\/p>\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/manage\/delegated-managed-service-accounts\/delegated-managed-service-accounts-faq\" target=\"_blank\" rel=\"noreferrer noopener\">Delegated Managed Service Accounts FAQ | Microsoft Learn<\/a>&nbsp;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/10\/11\/microsofts-guidance-to-help-mitigate-kerberoasting\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kerberoasting, a well-known Active Directory (AD) attack vector, enables threat actors to steal credentials and navigate through devices and networks. Microsoft is sharing recommended actions administrators can take now to help prevent successful Kerberoasting cyberattacks.<br \/>\nThe post Microsoft&#8217;s guidance to help mitigate Kerberoasting \u00a0 appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57379,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[357],"class_list":["post-57378","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft\u2019s guidance to help mitigate Kerberoasting \u00a0 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft\u2019s guidance to help mitigate Kerberoasting \u00a0 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-11T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/Security_377988_Blog_241008-2.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsofts-guidance-to-help-mitigate-kerberoasting\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsofts-guidance-to-help-mitigate-kerberoasting\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft\u2019s guidance to help mitigate Kerberoasting \u00a0\",\"datePublished\":\"2024-10-11T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsofts-guidance-to-help-mitigate-kerberoasting\\\/\"},\"wordCount\":1288,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsofts-guidance-to-help-mitigate-kerberoasting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/microsofts-guidance-to-help-mitigate-kerberoasting.png\",\"keywords\":[\"Windows\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsofts-guidance-to-help-mitigate-kerberoasting\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsofts-guidance-to-help-mitigate-kerberoasting\\\/\",\"name\":\"Microsoft\u2019s guidance to help mitigate Kerberoasting \u00a0 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsofts-guidance-to-help-mitigate-kerberoasting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsofts-guidance-to-help-mitigate-kerberoasting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/microsofts-guidance-to-help-mitigate-kerberoasting.png\",\"datePublished\":\"2024-10-11T17:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsofts-guidance-to-help-mitigate-kerberoasting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsofts-guidance-to-help-mitigate-kerberoasting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsofts-guidance-to-help-mitigate-kerberoasting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/microsofts-guidance-to-help-mitigate-kerberoasting.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/microsofts-guidance-to-help-mitigate-kerberoasting.png\",\"width\":1500,\"height\":841},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsofts-guidance-to-help-mitigate-kerberoasting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/windows\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft\u2019s guidance to help mitigate Kerberoasting \u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft\u2019s guidance to help mitigate Kerberoasting \u00a0 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft\u2019s guidance to help mitigate Kerberoasting \u00a0 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-10-11T17:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/Security_377988_Blog_241008-2.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft\u2019s guidance to help mitigate Kerberoasting \u00a0","datePublished":"2024-10-11T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/"},"wordCount":1288,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/microsofts-guidance-to-help-mitigate-kerberoasting.png","keywords":["Windows"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/","url":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/","name":"Microsoft\u2019s guidance to help mitigate Kerberoasting \u00a0 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/microsofts-guidance-to-help-mitigate-kerberoasting.png","datePublished":"2024-10-11T17:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/microsofts-guidance-to-help-mitigate-kerberoasting.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/microsofts-guidance-to-help-mitigate-kerberoasting.png","width":1500,"height":841},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsofts-guidance-to-help-mitigate-kerberoasting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Windows","item":"https:\/\/www.threatshub.org\/blog\/tag\/windows\/"},{"@type":"ListItem","position":3,"name":"Microsoft\u2019s guidance to help mitigate Kerberoasting \u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57378"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57378\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57379"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}