Network security: Minimum session security for NTLM SSP based (including secure RPC) clients This security setting allows a client to require the negotiation of 128-bit encryption and/or NTLMv2 session security. These values are dependent on the LAN Manager Authentication Level security setting value. The options are: Require NTLMv2 session security: The connection will fail if NTLMv2 protocol is not negotiated. Require 128-bit encryption: The connection will fail if strong encryption (128-bit) is not negotiated. Default: Windows XP, Windows Vista, Windows 2000 Server, Windows Server 2003, and Windows Server 2008: No requirements. Windows 7 and Windows Server 2008 R2: Require 128-bit encryption
Network security: Do not store LAN Manager hash value on next password change This security setting determines if, at the ...
Network security: Force logoff when logon hours expire This security setting determines whether to disconnect users who are ...
Network security: LAN Manager authentication level This security setting determines which challenge/response authentication ...
Network security: LDAP client signing requirements This security setting determines the level of data signing that is requested ...
Network security: Minimum session security for NTLM SSP based (including secure RPC) clients This security setting allows ...
Network security: Minimum session security for NTLM SSP based (including secure RPC) servers This security setting allows ...
Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication This policy setting allows you to create ...
Network security: Restrict NTLM: Add server exceptions in this domain This policy setting allows you to create an exception ...
Network security: Restrict NTLM: Audit Incoming NTLM Traffic This policy setting allows you to audit incoming NTLM traffic. ...