Scan QR code or get instant email to install app
Question:
A typical approach is to disallow service accounts from having access to interactive logins for GUI or shell. If a service account is used for interactive logins or an attempt is made to log in as one, it should be promptly identified and reported as a sign of a potential breach (IoC).
Comments