Use this section to configure protocols used to communicate with other computers. When configured to communicate with computers ...

Use this section to configure protocols used to communicate with other computers. When configured to communicate with computers running earlier versions of Windows, these protocols are vulnerable to exploits such as password cracking and man-in-the-middle attacks.