Computer Kerberos Configuration Reports

3 Reports
About Computer Kerberos Configuration Reports

Computer Kerberos Configuration Reports audit Kerberos delegation settings on computer accounts. These reports identify computers configured for constrained delegation, protocol transition (S4U2Self), and resource-based constrained delegation — critical for multi-tier application security and attack surface management.

Delegation Review

Audit constrained delegation

Protocol Transition

S4U2Self configuration

RBCD Detection

Resource-based delegation

Example: Computer Kerberos Configuration Reports in AD Reports

AD Reports Computer Kerberos Configuration Reports

Available Reports

Constrained Delegation

Computers with constrained delegation configured (msDS-AllowedToDelegateTo). These computers can impersonate users to specific services listed in their delegation configuration.

Use Cases
  • Identify computers impersonating users for backend services (IIS, SQL, Exchange)
  • Verify delegation scope is appropriately restricted
  • Audit multi-tier application server configurations
Key Information
  • Computer name and Distinguished Name
  • Allowed delegation targets (msDS-AllowedToDelegateTo)
  • Operating System and OU path
Protocol Transition

Computers with Kerberos protocol transition enabled (S4U2Self). These computers can request service tickets on behalf of users even when the initial authentication did not use Kerberos.

Use Cases
  • Find computers with S4U2Self enabled (TrustedToAuthForDelegation)
  • Audit computers that can generate service tickets without a Kerberos TGT
  • Highest-risk delegation category for computers
Key Information
  • Computer name and Distinguished Name
  • TrustedToAuthForDelegation attribute (true/false)
  • Delegation targets if constrained
  • OU path and Operating System
Security Note: Protocol transition allows impersonation without Kerberos authentication. Ensure this is only enabled on computers that genuinely require it for multi-protocol scenarios.
Resource-Based Constrained Delegation

Computers with Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity). RBCD allows the target computer to specify which accounts can delegate to it, without requiring Domain Admin privileges to configure.

Use Cases
  • Audit computers that allow specific accounts to delegate to them via RBCD
  • Identify non-standard RBCD configurations indicating possible compromise
  • Post-incident investigation support
Key Information
  • Computer name and Distinguished Name
  • Accounts allowed to act on its behalf
  • Whether entries are expected service accounts or anomalous
Security Note: RBCD on computer objects is most commonly exploited via the Resource-Based Constrained Delegation attack path. Any unexpected entries in this report warrant immediate investigation.
See These Reports in Action

Try AD Reports free for 14 days — run any of these reports on your own Active Directory.

Download Free Trial View All Features