Abuse Info
A common way for attackers to abuse unconstrained delegation is for the attacker to coerce a DC using the printspooler. The attack will fail if the target is a member of Protected Users or marked as sensitive, as the TGT of those principals will not be sent to the principal with unconstrained delegation. You can find all the protected principals with this Cypher query:Opsec Considerations
There is no opsec information for this edge.Edge Schema
Source: User, ComputerDestination: Domain
Traversable: Yes