IT CHRONICLE
Home Home Chi sono About Certificazioni Certifications Servizi Services Chiave PGP PGP Key EN
[ FRANCESCO_RUSSO ]

CONSULENTE ICTICT CONSULTANT

Specializzato in Specialized in

IT Security Manager
& ICT Consultant
IT Security Manager
& ICT Consultant

> Bridging Technology, Risk Management & Business

Il Profilo
Con oltre 25 anni di esperienza in reti, sistemi e IT risk management, mi occupo di amministrazione On-Premise e Cloud. Aiuto organizzazioni e imprese a garantire la conformità normativa (GDPR, ISO 27001, NIS 1 e 2) e offro servizi avanzati di Digital Forensics. Il mio obiettivo attuale è consolidare il mio ruolo di esperto in Cybersecurity e Intelligenza Artificiale Generativa, operando a livello internazionale in modalità remote-first.

Esperienza sul Campo
Dal 2005 sono IT Security e Privacy Manager per il Consorzio per la Bonifica della Capitanata, ruolo a cui affianco una continua attività di consulenza per realtà sanitarie e studi legali (Gruppo Salatto, Studio Torlontano, ecc.). Gestisco operativamente attività di DFIR (Digital Forensics and Incident Response), Business Continuity, Disaster Recovery e mitigazione dell'impatto dei rischi IT. In passato, ho coordinato team internazionali come IT Project Manager tra Amsterdam e Tallinn.

Visione Strategica e Competenze
Comprendere l'infrastruttura richiede anche una solida visione aziendale. Per questo ho integrato il mio background tecnico (Windows/Linux Server, reti TCP/IP, Firewall) con una Laurea Magistrale in Scienze Economiche conseguita con lode. Unisco l'approccio ingegneristico alle metodologie manageriali e Agile (ITIL v.3, Scrum, Six Sigma). Attualmente sto espandendo le mie competenze attraverso i percorsi ufficiali Google come Cybersecurity Expert e Generative AI Leader.

Oltre il codice
Lavoro correntemente in inglese (certificazione C2 Cambridge) e conosco altre tre lingue. Quando non sono alle prese con server o incident response, ricarico le energie a contatto con la natura, pilotando droni (UAS Open A1/A3), dedicandomi alla fotografia o sperimentando nuove tecniche ai fornelli.

The Profile
With over 25 years of experience in networks, systems, and IT risk management, I specialize in On-Premise and Cloud administration. I help organizations ensure regulatory compliance (GDPR, ISO 27001, NIS 1 and 2) and provide advanced Digital Forensics services. My current goal is to consolidate my expertise in Cybersecurity and Generative AI, collaborating internationally in a remote-first work environment.

Field Experience
Since 2005, I have served as the IT Security and Privacy Manager for the Consorzio per la Bonifica della Capitanata, alongside continuous consulting work for healthcare facilities and law firms. I operationally manage DFIR (Digital Forensics and Incident Response), Business Continuity, Disaster Recovery, and IT risk mitigation. Previously, I coordinated international teams as an IT Project Manager between Amsterdam and Tallinn.

Strategic Vision & Skills
Understanding IT infrastructure also requires a solid business vision. That is why I integrated my technical background (Windows/Linux Servers, TCP/IP networks, Firewalls) with a Master's Degree in Economics (Summa Cum Laude). I combine an engineering approach with managerial and Agile methodologies (ITIL v.3, Scrum, Six Sigma). I am currently expanding my skill set through the official Google Cybersecurity Expert and Generative AI Leader paths.

Beyond the code
I am fluent in English (Cambridge C2 certification) and have knowledge of three other languages. When I am not dealing with servers or incident response, I recharge my energy by immersing myself in nature, flying drones (UAS Open A1/A3), practicing photography, or experimenting with new cooking techniques.

> author identified
Foto Francesco Russo

Removing Duplicate SPNs in Active Directory


While monitoring system logs, a critical error was identified related to the Key Distribution Center (KDC). The logs flagged the presence of duplicate Service Principal Names (SPNs), an issue that can trigger non-secure authentication downgrades from Kerberos to NTLM or cause total connection failures to database instances.

Error Log:
"The KDC encountered duplicate names while processing a Kerberos authentication request. The duplicate name is MSSQLSvc/ZXCSY.local:1433"

Root Cause Analysis

In an Active Directory environment, an SPN must be unique and mapped to a single account (either user or computer). If the same SPN is registered across multiple objects, the Kerberos protocol cannot determine which cryptographic key to use for the service ticket, thus compromising the security of the transaction.

Technical Resolution Procedure

Step 1: Identifying Duplicates

Using the setspn command-line tool with the -F (forest-wide search) and -Q (query) flags, I located the conflicting accounts: setspn -F -Q MSSQLSvc/ZXCSY.local:1433


The output confirmed that the SPN was registered to both the ZXCSY computer account and a dedicated domain service account.

Step 2: Selecting the Correct Account

By checking the SQL Server service configuration via services.msc on the target server, I verified that the instance was running under a Domain User Account. Therefore, the SPN registered to the computer account was redundant and the primary cause of the conflict.

Step 3: Removing the Duplicate SPN

I proceeded to delete the incorrect entry from the computer account using the -D (Delete) parameter: setspn -D MSSQLSvc/ZXCSY.local:1433 ZXCSY

Conclusion and Verification

A follow-up query confirmed that the SPN is now exclusively associated with the service account. This resolution restored proper Kerberos authentication, eliminating insecure NTLM fallbacks and stabilizing infrastructure access for the SQL instance.