A brief look at configuring Maximum lifetime for service ticket policy setting
The Maximum lifetime for service ticket policy setting determines the time (expressed in minutes) that a session ticket granted by Key Distribution Center (KDC), can be used to access a service on the domain. The value should be 10 minutes and above and it must be less than or equal to the value of the Maximum lifetime for service ticket policy setting.
This policy setting values for this Group Policy setting are:
- can be defined by the user from 10 through 99,999, or 0 (in which case service tickets do not expire).
- can be left undefined.
If an expired session ticket is presented by a client when requesting a connection to a server, the server returns an error message. The client must acquire a new session ticket from the Kerberos V5 KDC. Session tickets are used only to authenticate new connections with servers. So once, authentication is done, the validity of the session ticket does not matter. If the session ticket that authenticated the connection expires during the connection, operations in progress do not get interrupted.
Security Concerns
If a high value is set for this policy, users might be able to access network resources outside of their logon hours. Additionally, disabled user accounts might still be able to access network services by using service tickets issued before the account was disabled. If the value is set to 0, service tickets never expire.
The Microsoft recommended value for this policy is 600 minutes.
Group Policy:
Client devices receive a fresh configuration when the next scheduled and successful Group Policy refresh occurs. To enforce these new settings, you'll need to run the command in a prompt ; gpupdate.exe /force. On the local device, the Security Configuration Engine will refresh this setting in about five minutes.
Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update:
- Local policy settings
- Site policy settings
- Domain policy settings
- OU policy settings
About ADAudit Plus:
ADAudit Plus is a real time change auditing software that helps keep your Active Directory, Azure AD, Windows file servers, NetApp filers, EMC file systems, Synology file systems, Windows member servers, and workstations secure and compliant. With ADAudit Plus, you can get visibility into:
- Authorized and unauthorized AD management changes
- User logons, logoffs, and account lockouts
- GPO changes
- Group attribute and membership changes
- OU changes
- Privileged access and permission changes
- Azure AD logons, and changes to roles, groups, and applications
- PowerShell scripts and modules
among other things.
There are more than 200 event-specific reports, and you can configure instant email alerts. You can also export the reports to XLS, HTML, PDF and CSV formats to assist in interpretation and forensics. For more information on ADAudit Plus, visit: https://www.manageengine.com/active-directory-audit/.
Explore Active Directory auditing and reporting with ADAudit Plus.
- Related Products
- ADManager Plus Active Directory Management & Reporting
- ADAudit Plus Real-time Active Directory Auditing and UBA
- EventLog Analyzer Real-time Log Analysis & Reporting
- ADSelfService Plus Self-Service Password Management
- AD360 Integrated Identity & Access Management
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- AD Free Tools Active Directory FREE Tools
