Maximum lifetime for user ticket

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Object Access » Maximum lifetime for user ticket

A brief look at configuring Maximum lifetime for user ticket policy setting

The Maximum lifetime for user ticket policy setting determines the maximum amount of time expressed in hours, that a user’s ticket-granting ticket is valid. On expiry a new ticket-granting-ticket must be requested from the Key Distribution Center.

The values for this policy setting can be defined by the user from 0 through 99,999 (expressed in hours). The value can also be left undefined.

Security concerns

If a high value is set for this policy, users might be able to access network resources outside of their logon hours. Additionally, disabled user accounts might still be able to access network services by using service tickets issued before the account was disabled. If the value is set to 0, service tickets never expire.

The Microsoft recommended setting for this policy is 10 hours. A range between 4 hours and 10 hours works best for this policy and can suit your organizational needs.

The downside to setting a value in this range is that there will be frequent requests to the KDC for new ticket-granting-tickets.

Group Policy:

Client devices receive a fresh configuration when the next scheduled and successful Group Policy refresh occurs. To enforce these new settings, you'll need to run the following command in a prompt: gpupdate.exe /force. On the local device, the Security Configuration Engine will refresh this setting in about five minutes.

Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update:

  • Local policy settings
  • Site policy settings
  • Domain policy settings
  • OU policy settings

About ADAudit Plus:

ADAudit Plus is a real time change auditing software that helps keep your Active Directory, Azure AD, Windows file servers, NetApp filers, EMC file systems, Synology file systems, Windows member servers, and workstations secure and compliant. With ADAudit Plus, you can get visibility into:

  • Authorized and unauthorized AD management changes
  • User logons, logoffs, and account lockouts
  • GPO changes
  • Group attribute and membership changes
  • OU changes
  • Privileged access and permission changes
  • Azure AD logons, and changes to roles, groups, and applications
  • PowerShell scripts and modules

among other things.

There are more than 200 event-specific reports, and you can configure instant email alerts. You can also export the reports to XLS, HTML, PDF and CSV formats to assist in interpretation and forensics. For more information on ADAudit Plus, visit: https://www.manageengine.com/active-directory-audit/.