From 21a4d4c7b36be53bbdb0c3bd386d56bc23ee3efb Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 17 Sep 2018 16:44:56 -0700 Subject: [PATCH] added reg path --- ...ccess-restrict-clients-allowed-to-make-remote-sam-calls.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md b/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md index 6b9f166e9f..1ad7ec6aeb 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium ms.localizationpriority: medium author: justinha -ms.date: 07/27/2017 +ms.date: 09/17/2018 --- # Network access: Restrict clients allowed to make remote calls to SAM @@ -130,7 +130,7 @@ Compare the security context attempting to remotely enumerate accounts with the ### Event Throttling A busy server can flood event logs with events related to the remote enumeration access check. To prevent this, access-denied events are logged once every 15 minutes by default. The length of this period is controlled by the following registry value. -|Registry Path|System\CurrentControlSet\Control\Lsa\ +|Registry Path|HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\ | |---|---| Setting |RestrictRemoteSamEventThrottlingWindow| Data Type |DWORD|