{"id":7007,"date":"2023-02-25T10:44:54","date_gmt":"2023-02-25T14:44:54","guid":{"rendered":"https:\/\/kevinjustin.com\/blog\/?p=7007"},"modified":"2023-03-07T13:51:36","modified_gmt":"2023-03-07T17:51:36","slug":"check-your-delegation-settings-to-avoid-security-vulnerabilities","status":"publish","type":"post","link":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/","title":{"rendered":"Check your delegation settings"},"content":{"rendered":"<p><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/combination-lock.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-7008 size-medium\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/combination-lock-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/combination-lock-300x300.png 300w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/combination-lock-150x150.png 150w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/combination-lock-100x100.png 100w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/combination-lock.png 512w\" sizes=\"auto, (max-width: 300px) 85vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h1 class=\"c-article-post__title\"><\/h1>\n<p>Sometimes as the monitoring admin, you may be responsible to secure your servers, being told from Security\/Cyber Teams about new vulnerabilities.\u00a0 The vulnerabilities may be from Tanium, ACAS, Tenable or other security tools.\u00a0 \u00a0This article is how to help you secure related SCOM web console, and SSRS reporting sites against Unconstrained Delegation vulnerabilities <a href=\"https:\/\/www.silverfort.com\/blog\/delegation-treats-cve-2020-17049\/\" target=\"_blank\" rel=\"noopener\">CVE-2020-17049<\/a>, also AD STIG <a href=\"https:\/\/www.stigviewer.com\/stig\/active_directory_domain\/2017-12-15\/finding\/V-36435\" target=\"_blank\" rel=\"noopener\">V-36435.<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>First we need to identify IF this is a true finding.<\/p>\n<p>Typically this comes from Server\/SystemsAdmin with domain admin access:<\/p>\n<p>From PowerShell run:<\/p>\n<p><span style=\"color: #3366ff;\">Get-ADComputer -LDAPFilter<\/span><br \/>\n<span style=\"color: #3366ff;\">&#8220;(userAccountControl:1.2.840.113556.1.4.803:=524288)&#8221;<\/span><\/p>\n<p>After identifying SCOM servers with unconstrained delegation (scope of blog post is focused on SCOM in a hybrid scenario (prem\/cloud), we need to resolve.<\/p>\n<p>With domain administrator rights, open the Active Directory Users and Computers MMC snap-in.<\/p>\n<p>In ADUC, change Find drop-down to Computers<br \/>\nIn the Computer name text box, enter &lt;SCOMServer&gt;\u00a0 and click search<\/p>\n<p>Right click the server in the results box &gt; Select Properties.<\/p>\n<p>Select the Delegation tab.<\/p>\n<figure id=\"attachment_7009\" aria-describedby=\"caption-attachment-7009\" style=\"width: 1045px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/ADUC_Delegation.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7009\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/ADUC_Delegation.png\" alt=\"\" width=\"1045\" height=\"529\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/ADUC_Delegation.png 1045w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/ADUC_Delegation-300x152.png 300w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/ADUC_Delegation-1024x518.png 1024w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/ADUC_Delegation-768x389.png 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/a><figcaption id=\"caption-attachment-7009\" class=\"wp-caption-text\">ADUC view of lab server delegation setting<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Select Trust this computer for delegation to specified services only &gt; Use any authentication protocol.<\/p>\n<p>Under Services to which this account can present delegated credentials, select Add.<\/p>\n<p>In the new dialog box, select Users or Computers.<\/p>\n<p>Enter &lt;SCOMServer&gt;, and then select OK.<\/p>\n<p>Click the Add button to add services<\/p>\n<p>Select the w3svc and www processes<\/p>\n<p>Select OK.<\/p>\n<figure id=\"attachment_7010\" aria-describedby=\"caption-attachment-7010\" style=\"width: 796px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/ADUC_AddServices.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7010\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/ADUC_AddServices.png\" alt=\"\" width=\"796\" height=\"552\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/ADUC_AddServices.png 796w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/ADUC_AddServices-300x208.png 300w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/ADUC_AddServices-768x533.png 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/a><figcaption id=\"caption-attachment-7010\" class=\"wp-caption-text\">ADUC GUI adding services for delegation on SCOM server<\/figcaption><\/figure>\n<p>Once set in AD, reboot server.\u00a0 Running &#8216;gpupdate \/force&#8217; may not apply AD changes to the server object.<\/p>\n<p>After reboot, reach out to SCOM Admins to test webconsole authentication<\/p>\n<p>From edge browser, go to SCOM web console, typically @ https:\/\/&lt;SCOMServer&gt;\/OperationsManager<\/p>\n<p>On the Monitoring tab, click on Active Directory dashboard on left<\/p>\n<p>Verify authentication works<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Documentation<\/strong><\/p>\n<p>Pentestlab &#8211; <a href=\"https:\/\/pentestlab.blog\/2022\/03\/21\/unconstrained-delegation\/\" target=\"_blank\" rel=\"noopener\">Detecting Unconstrained Delegation Exposures in AD Environment<\/a><\/p>\n<p><a href=\"https:\/\/petri.com\/find-and-block-unconstrained-delegation-in-active-directory\/\" target=\"_blank\" rel=\"noopener\">Petri.com find and block unconstrained delegation<\/a><\/p>\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-for-identity\/security-assessment-unconstrained-kerberos\" target=\"_blank\" rel=\"noopener\">Learn.Microsoft.com unconstrained kerberos article<\/a><\/p>\n<p>Explanatory documents on what\/why<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"ZLdOnN3O4j\"><p><a href=\"https:\/\/marklewis.blog\/2019\/12\/20\/remove-unconstrained-kerberos-delegation\/\">Remove Unconstrained Kerberos Delegation<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Remove Unconstrained Kerberos Delegation&#8221; &#8212; Mark Lewis Blog\" src=\"https:\/\/marklewis.blog\/2019\/12\/20\/remove-unconstrained-kerberos-delegation\/embed\/#?secret=aGtNSTk6C8#?secret=ZLdOnN3O4j\" data-secret=\"ZLdOnN3O4j\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Sometimes as the monitoring admin, you may be responsible to secure your servers, being told from Security\/Cyber Teams about new vulnerabilities.\u00a0 The vulnerabilities may be from Tanium, ACAS, Tenable or other security tools.\u00a0 \u00a0This article is how to help you secure related SCOM web console, and SSRS reporting sites against Unconstrained Delegation vulnerabilities CVE-2020-17049, &hellip; <a href=\"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Check your delegation settings&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,3,6,545,530,502],"tags":[20,21,26,51,600,599,310,601,602,598],"class_list":["post-7007","post","type-post","status-publish","format-standard","hentry","category-administration","category-azure","category-log-analytics","category-powershell","category-scom","category-security","tag-active-directory","tag-ad","tag-adds","tag-authentication","tag-kerberos","tag-ldap","tag-powershell","tag-scom-web-console","tag-ssrs","tag-unconstrained-delegation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Check your delegation settings - Kevin Justin&#039;s Blog<\/title>\n<meta name=\"description\" content=\"Check your delegation settings\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Check your delegation settings - Kevin Justin&#039;s Blog\" \/>\n<meta property=\"og:description\" content=\"Check your delegation settings\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Kevin Justin&#039;s Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-25T14:44:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-07T17:51:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/combination-lock-300x300.png\" \/>\n<meta name=\"author\" content=\"WordPress Administrator\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WordPress Administrator\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/02\\\/25\\\/check-your-delegation-settings-to-avoid-security-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/02\\\/25\\\/check-your-delegation-settings-to-avoid-security-vulnerabilities\\\/\"},\"author\":{\"name\":\"WordPress Administrator\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d7a90f4430bef43134eaa0a7e2cd508\"},\"headline\":\"Check your delegation settings\",\"datePublished\":\"2023-02-25T14:44:54+00:00\",\"dateModified\":\"2023-03-07T17:51:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/02\\\/25\\\/check-your-delegation-settings-to-avoid-security-vulnerabilities\\\/\"},\"wordCount\":348,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/02\\\/25\\\/check-your-delegation-settings-to-avoid-security-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/combination-lock-300x300.png\",\"keywords\":[\"Active Directory\",\"AD\",\"ADDS\",\"authentication\",\"kerberos\",\"LDAP\",\"powershell\",\"SCOM Web console\",\"SSRS\",\"Unconstrained Delegation\"],\"articleSection\":[\"Administration\",\"Azure\",\"Log Analytics\",\"PowerShell\",\"SCOM\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/02\\\/25\\\/check-your-delegation-settings-to-avoid-security-vulnerabilities\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/02\\\/25\\\/check-your-delegation-settings-to-avoid-security-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/02\\\/25\\\/check-your-delegation-settings-to-avoid-security-vulnerabilities\\\/\",\"name\":\"Check your delegation settings - Kevin Justin&#039;s Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/02\\\/25\\\/check-your-delegation-settings-to-avoid-security-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/02\\\/25\\\/check-your-delegation-settings-to-avoid-security-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/combination-lock-300x300.png\",\"datePublished\":\"2023-02-25T14:44:54+00:00\",\"dateModified\":\"2023-03-07T17:51:36+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d7a90f4430bef43134eaa0a7e2cd508\"},\"description\":\"Check your delegation settings\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/02\\\/25\\\/check-your-delegation-settings-to-avoid-security-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/02\\\/25\\\/check-your-delegation-settings-to-avoid-security-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/02\\\/25\\\/check-your-delegation-settings-to-avoid-security-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/combination-lock.png\",\"contentUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/combination-lock.png\",\"width\":512,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/02\\\/25\\\/check-your-delegation-settings-to-avoid-security-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Check your delegation settings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/\",\"name\":\"Kevin Justin&#039;s Blog\",\"description\":\"Operational monitoring tools including System Center, Azure Monitor\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d7a90f4430bef43134eaa0a7e2cd508\",\"name\":\"WordPress Administrator\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g\",\"caption\":\"WordPress Administrator\"},\"sameAs\":[\"https:\\\/\\\/kevinjustin.com\"],\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/author\\\/wordpress_admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Check your delegation settings - Kevin Justin&#039;s Blog","description":"Check your delegation settings","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Check your delegation settings - Kevin Justin&#039;s Blog","og_description":"Check your delegation settings","og_url":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/","og_site_name":"Kevin Justin&#039;s Blog","article_published_time":"2023-02-25T14:44:54+00:00","article_modified_time":"2023-03-07T17:51:36+00:00","og_image":[{"url":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/combination-lock-300x300.png","type":"","width":"","height":""}],"author":"WordPress Administrator","twitter_card":"summary_large_image","twitter_misc":{"Written by":"WordPress Administrator","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/"},"author":{"name":"WordPress Administrator","@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/3d7a90f4430bef43134eaa0a7e2cd508"},"headline":"Check your delegation settings","datePublished":"2023-02-25T14:44:54+00:00","dateModified":"2023-03-07T17:51:36+00:00","mainEntityOfPage":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/"},"wordCount":348,"commentCount":0,"image":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/combination-lock-300x300.png","keywords":["Active Directory","AD","ADDS","authentication","kerberos","LDAP","powershell","SCOM Web console","SSRS","Unconstrained Delegation"],"articleSection":["Administration","Azure","Log Analytics","PowerShell","SCOM","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/","url":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/","name":"Check your delegation settings - Kevin Justin&#039;s Blog","isPartOf":{"@id":"https:\/\/kevinjustin.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/combination-lock-300x300.png","datePublished":"2023-02-25T14:44:54+00:00","dateModified":"2023-03-07T17:51:36+00:00","author":{"@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/3d7a90f4430bef43134eaa0a7e2cd508"},"description":"Check your delegation settings","breadcrumb":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/#primaryimage","url":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/combination-lock.png","contentUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/02\/combination-lock.png","width":512,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/kevinjustin.com\/blog\/2023\/02\/25\/check-your-delegation-settings-to-avoid-security-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kevinjustin.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Check your delegation settings"}]},{"@type":"WebSite","@id":"https:\/\/kevinjustin.com\/blog\/#website","url":"https:\/\/kevinjustin.com\/blog\/","name":"Kevin Justin&#039;s Blog","description":"Operational monitoring tools including System Center, Azure Monitor","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kevinjustin.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/3d7a90f4430bef43134eaa0a7e2cd508","name":"WordPress Administrator","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g","caption":"WordPress Administrator"},"sameAs":["https:\/\/kevinjustin.com"],"url":"https:\/\/kevinjustin.com\/blog\/author\/wordpress_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/7007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/comments?post=7007"}],"version-history":[{"count":3,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/7007\/revisions"}],"predecessor-version":[{"id":7028,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/7007\/revisions\/7028"}],"wp:attachment":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/media?parent=7007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/categories?post=7007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/tags?post=7007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}