diff --git a/windows/security/identity-protection/remote-credential-guard.md b/windows/security/identity-protection/remote-credential-guard.md index c7e23f0bfa..dbb84c8dcb 100644 --- a/windows/security/identity-protection/remote-credential-guard.md +++ b/windows/security/identity-protection/remote-credential-guard.md @@ -118,7 +118,7 @@ To configure devices using the registry, use the following settings: | Setting | |-| -| Key path: `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa` | +| **- Key path:** `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa`
**- Key name:** `DisableRestrictedAdmin`
**- Type:** `REG_DWORD`
**- Value:** `0`| You can add this by running the following command from an elevated command prompt: @@ -163,6 +163,10 @@ To configure your clients, you can use: |--|--|--| | **Administrative Templates > System > Credentials Delegation** | Restrict delegation of credentials to remote servers | Select **Enabled** and in the dropdown, select one of the options: | +| Setting | +|--| +| **- Category:** Administrative Templates > System > Credentials Delegation
**- Setting name:** Restrict delegation of credentials to remote servers
**- Value:** Select **Enabled** and in the dropdown, select one of the options:
**Restrict Credential Delegation**
**Require Remote Credential Guard**| + [!INCLUDE [intune-settings-catalog-2](../../../includes/configure/intune-settings-catalog-2.md)] Alternatively, you can configure devices using a [custom policy][INT-3] with the [Policy CSP][CSP-2]. @@ -190,6 +194,8 @@ Possible values for `RestrictedRemoteAdministrationDrop` are: #### [:::image type="icon" source="../images/icons/windows-os.svg" border="false"::: **Registry**](#tab/reg) +Not documented. + --- ## Use Remote Credential Guard