“P-RODCNeverReveal" (“Check if the protection against revealing privileged group is active“) reports “AzureADKerberos” but it is just an RODC object without a RODC Server.
The Attribute “msDS-KrbTgtLink“ has the DN of a “krbtgt_AzureAD“ object. That is a unique name and would help to filter out these objects. I’m not aware of any better detections.
Hi there Andreas,
Whilst the account is indeed not a real server, I believe the finding is still valid.
The Cloud Kerberos Trust documentation also states that the RODC restrictions should not be lifted due to Entra ID → On Prem attack paths as well as those restriction controlling who it can issue TGTs for. You can see this on the two notes in this specific section.
I hope this helps understand this better and why I believe this should remain as is.
So the following is what i did not know in detail, but was well described in MS documentation as linked by you:
The default Password Replication Policy configured on the AzureADKerberos computer object doesn’t allow to sign high privilege accounts on to on-premises resources with cloud Kerberos trust or FIDO2 security keys.
Due to possible attack vectors from Microsoft Entra ID to Active Directory, it’s not recommended to unblock these accounts by relaxing the Password Replication Policy of the computer object CN=AzureADKerberos,OU=Domain Controllers,<domain-DN>.
But I still was wondering why in multiple environments I found the “Denied RODC…” group is missing by default in the “AzureADKerberos” object in the “msDS-NeverRevealGroup“ list. So I searched and found this good additional information from Jorge (aka “zjorz” aka “Jorge de Almeida Pinto”) I would like to share here:
Configure the default “Denied RODC Password Replication Group” (objectSID = domainSID-572) in the DENY part of the Password Replication Policy
Configure all accounts and groups, configured on the domain NC, with explicit permissions for “Replicating Directory Changes” and “Replicating Directory Changes All” control access right (CAR), or “Full Control”, or “Write DACL” or “Write Owner”, as members of that default “Denied RODC Password Replication Group”