Skip to main content

Windows Agent | Mitigating a Compromised Liongard Domain Account

If you suspect that a Liongard domain account has been compromised, follow these steps immediately to secure your environment:

Updated over 3 weeks ago

Overview šŸ’„

If you suspect a Liongard domain account has been compromised — for example, due to leaked credentials, unintended access, or unauthorized use — it’s critical to act immediately to secure your environments.

Liongard no longer requires domain accounts for inspection workflows. Modern best practices rely on agents running as the Local System account, which significantly reduces the attack surface tied to credential misuse.

This article provides a step‑by‑step mitigation plan to secure your infrastructure and minimize risk.


Why This Matters šŸ¤”

Legacy Liongard domain accounts were used historically for:

  • Remote Windows Server inspections

  • Running inspect‑related commands across Active Directory

Since this approach was deprecated, domain accounts are no longer necessary. A compromised domain account can:

  • Provide unauthorized access to inspection systems

  • Enable lateral movement across domains

  • Increase exposure to malicious actors

By removing or remediating the account and ensuring agents run with minimum necessary permissions, you contain risk and align with modern security practices.


What’s Changed 🧐

Liongard’s current architecture uses:

  • Local System accounts for agent workloads

  • Cloud‑managed authentication for API and integration workflows

  • Domain accounts only remain relevant if they were manually created by partners in legacy environments

In most cases, domain accounts can be fully removed without impacting inspection operations.


Step‑by‑Step Mitigation Plan šŸ§‘ā€šŸ«

1ļøāƒ£ Remove the Liongard Domain Account

If a domain account was used for Liongard activities:

  1. Identify all Active Directory environments where the account exists

  2. Confirm the account’s permissions and last use

  3. Delete the domain account from each environment

ā— Only proceed after ensuring all inspection tasks have been transitioned to local agent or cloud‑managed identities.

2ļøāƒ£ Update Liongard Agent Service Accounts

Agents should run as Local System, not as a domain or service account:

  1. On each server with a Liongard Agent installed:

    • Open Services

    • Locate LiongardAgentSVC

    • Verify the service’s Log On As account is set to Local System

  2. If it is not:

    • Change the service logon to Local System

    • Restart the service

  3. Confirm the agent reconnects to the Liongard platform

🧠 Running as Local System limits the permission scope while ensuring agents function without elevated domain credentials.

3ļøāƒ£ Verify Agent Functionality After Change

Once Local System is set:

  • Check each agent’s heartbeat in Liongard

  • If heartbeats are missing or agents go offline:

  • Optionally streamline reinstallations using RMM tools and the script

āš ļø The agent must be mapped to the correct Liongard environment for inspection workflows to resume.


After Mitigation – Best Practices 🌟

Practice

Why It Matters

Remove unnecessary domain accounts

Reduces attack surface

Use Local System for agents

Limits credential misuse

Rotate API keys and integration secrets

Prevents unauthorized access

Enable MFA for all Liongard users

Improves authentication security

Audit recent inspection activity

Detect potential unauthorized actions

Liongard’s Cyber Risk Dashboard can surface authentication and user risks (e.g., missing MFA) if inspectors are operational.


FAQs šŸ™‹ā€ā™‚ļø

Q: Will removing the domain account break inspections?

A: Not if you have migrated inspections to agents running as SYSTEM. Domain accounts are not required for modern workflows.

Q: What if an agent fails after changing the service account?

A: Reinstall the agent with the Liongard Agent Install Script and ensure it’s assigned to the correct Liongard environment.

Q: Should I rotate all keys and secrets after a compromise?

A: Yes — any API key, access key, token, or integration secret exposed during a compromise should be rotated.

Q: Does Liongard monitor compromised accounts automatically?

A: Liongard has risk indicators (e.g., in the Cyber Risk Dashboard) but does not automatically remediate compromised accounts on your behalf. Monitoring and response are a joint responsibility.


When to Contact Support 🦁

If you experience issues during or after mitigation:Use the Support Chat in your Liongard instance

Please include:

  • Summary of why the domain account was removed

  • Servers/Environments affected

  • Agent service configuration before/after changes

  • Screenshots of agent statuses or inspection failures

  • Logs showing heartbeat or connection errors

šŸ“„ Detailed information helps Support diagnose and advise faster.


Summary 🤩

  • Domain accounts are no longer required for Liongard inspections and pose a security risk when compromised.

  • Removing them and converting agents to Local System improves security posture.

  • Validate agent operation after changes and rotate any exposed keys.

  • Contact Support with relevant details if you encounter issues.

Did this answer your question?