Skip to main content

gMSAs with VBR – Part 3 Security Considerations

  • September 30, 2025
  • 5 comments
  • 203 views

Michael Melter
Forum|alt.badge.img+12

Introduction

 

In the first two parts of this series, we explored the why and how of using Group Managed Service Accounts (gMSAs) with Veeam Backup & Replication (VBR). If you missed them, check out:

This third and final installment dives into security implications, introduces Dedicated Managed Service Accounts (dMSAs), explains the threat of Kerberoasting, and previews what's new with gMSA in Windows Server 2025.

 
 

1. Security Considerations: gMSAs in the Real World

 

a) Overprivileged Accounts

Avoid assigning excessive permissions like Domain Admin to gMSAs.

Best Practices:

  • Apply least privilege
  • Use role-specific gMSAs (e.g. Exchange, SQL, File-Servers, but NOT DCs! - see below)
  • Audit regularly

b) Password Retrieval Abuse

Only authorized systems can retrieve gMSA passwords. Compromised systems pose a risk.

Mitigation:

  • Harden GIP and other retrieval systems
    • no other services on the GIP
    • restrict network access (e.g. switch-ACLs in segmented networks or Windows firewall)
    • don’t use domain admins here
    • patch GIP regularly (or even better: automatically)
  • Monitor retrieval events
    • enable event logging for security events
    • use SIEM if available
  • Isolate and protect endpoints

c) Kerberoasting Risk

Kerberoasting is a technique where attackers request service tickets for accounts with SPNs and crack them offline.

Why It Matters:

  • gMSAs/dMSAs with SPNs are targets.
  • Common in SQL/IIS setups.

Mitigation:

  • Avoid unnecessary SPNs.
  • Use strong passwords (gMSAs do this automatically).
  • Monitor Kerberos activity.

Creating gMSA without an SPN:

When you create a gMSA using PowerShell, you do not need to specify an SPN unless the account is going to be used for a service that requires Kerberos authentication (e.g., IIS, SQL Server, etc.).
Example: Creating a gMSA without an SPN

New-ADServiceAccount -Name VBRgMSA -DNSHostName vbr.domain.local -PrincipalsAllowedToRetrieveManagedPassword "VBRServer$"

This command:

  • Creates a gMSA named VBRgMSA
  • Assigns it to the computer VBRServer
  • Does not register an SPN, which means it’s not exposed to Kerberoasting attacks via service tickets

Learn more about Kerberoasting: In-depth analysis by Sean Metcalf

d) Recovery Limitations

Veeam Explorers don’t support gMSAs for recovery tasks.

Workaround:

  • Use a separate recovery account with limited permissions just for your restore operations
  • Run Veeam Explorers on dedicated workstations or jump hosts to isolate their operation
  • Document fallback procedures
     

 

2. What About dMSAs?

 

Windows Server 2025 introduces a new type of managed service account called the Delegated Managed Service Account (dMSA), which builds on the concepts of gMSAs but adds tighter control and machine-bound authentication. These are currently not supported by Veeam, so this is just meant as an addendum to the gMSA store.

Key Features

  • Machine-Bound Authentication - dMSAs are tied to specific machine identities in Active Directory. Only authorized computers can use the account, reducing the risk of credential theft.
  • Credential Guard Integration - dMSAs can leverage Credential Guard (CG) to bind authentication to the device and protect secrets in memory
  • Passwordless Migration - When migrating from a legacy service account to a dMSA, the original password is disabled. Authentication is redirected to the Local Security Authority (LSA), which uses the dMSA's randomized secret stored on the Domain Controller
  • Randomized Secrets - dMSAs use a cryptographic secret derived from the machine account credential. This secret is periodically rotated and cannot be retrieved from the machine — only the Domain Controller holds it
  • Delegated Management - Admins can delegate dMSA creation and management to specific Organizational Units (OUs), enabling least privilege and decentralization of service account control

https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/delegated-managed-service-accounts/delegated-managed-service-accounts-overview

 

⚠️ Security Concerns

Despite its promise, dMSA in Windows Server 2025 has been impacted by critical vulnerabilities:

Golden dMSA Attack

  • Exploits flaws in the ManagedPasswordId structure, which has only 1,024 predictable combinations.
  • Allows attackers with elevated privileges to brute-force dMSA passwords and gain persistent access across the AD forest. 
  • Bypasses protections like Credential Guard and creates a long-term backdoor.

https://www.semperis.com/press-release/research-uncovers-critical-flaw-windows-server-2025-exposing-managed-service-accounts-golden-dmsa-attack/
https://threatlabsnews.xcitium.com/blog/golden-dmsa-attack-one-flaw-in-windows-server-2025-threatens-entire-active-directory-forests/

BadSuccessor Vulnerability

  • Allows attackers to manipulate dMSA attributes (msDS-DelegatedMSAState, msDS-ManagedAccountPrecededByLink) to inherit privileges from high-value accounts.
  • Can be executed by users with CreateChild or WriteDACL permissions on an OU.

https://www.covertswarm.com/post/bad-successor-technical-deep-dive

 
 

3. What else is new in Windows Server 2025?

 

a) Improved gMSA Management

  • GUI lifecycle tools
  • Password retrieval visibility
  • Azure AD integration

b) Cross-Domain gMSA Support

Simplifies service account management across domains.

 

 

4. Final Thoughts

gMSAs offer strong security and automation, but understanding their limitations is key to building a resilient Veeam environment.

Kerberoasting is a real threat. Whether using gMSAs or dMSAs, proper configuration and monitoring are essential.

5 comments

Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 9583 comments
  • September 30, 2025

Great article Michael as I really want to look in to gMSA accounts as we are not using them currently.  Thanks for the share. 👍🏼


coolsport00
Forum|alt.badge.img+21
  • Veeam Legend
  • 4903 comments
  • October 1, 2025

And here it is!...part 3! And probably the most intricate & important aspects of gMSA → security. Really liking your gMSA series Michael. Appreciate all the posts!

Best.


Michael Melter
Forum|alt.badge.img+12
  • Author
  • Veeam Legend
  • 174 comments
  • October 1, 2025

And here it is!...part 3! And probably the most intricate & important aspects of gMSA → security. Really liking your gMSA series Michael. Appreciate all the posts!

Best.

Thanks, ​@coolsport00. The final one was overdue… ;)


coolsport00
Forum|alt.badge.img+21
  • Veeam Legend
  • 4903 comments
  • October 1, 2025

Maybe, but we all have “real jobs” which come first. Nice post here Michael 😊


  • New Here
  • 2 comments
  • November 5, 2025

Hello,

Thanks for the articles, regarding backing up DCs. 

As far as I know, the account you use for application processing, needs to be local admin on the server, and on DCs the local admin doesnt exist, so it needs to be domain admin, right?

The thing I dont understand is, why Veeam is saying we should avoid making GMSAs domain admins, but we need a domain admin account to backup DCs, and gmsas seems to be a much better choice than a old 'dumb' service account with maybe a static password?