mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge pull request #782 from Justinha/VSTS12109066
added recommendation to set this on uplevel
This commit is contained in:
commit
f217f98836
@ -65,7 +65,8 @@ This policy setting controls a string that will contain the SDDL of the security
|
||||
|
||||
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\RestrictRemoteSam
|
||||
|
||||
On computers that run earlier versions of Windows, you need to edit the registry setting directly or use Group Policy Preferences.
|
||||
On computers that run earlier versions of Windows, you need to edit the registry setting directly or use Group Policy Preferences.
|
||||
To avoid setting it manually in this case, you can configure the GPO itself on a computer that runs Windows Server 2016 or Windows 10, version 1607 or later and have it apply to all computers within the scope of the GPO because the same registry key exists on every computer after the corresponding KB is installed.
|
||||
|
||||
> [!NOTE]
|
||||
This policy is implemented similarly to other Network access policies in that there is a single policy element at the registry path listed. There is no notion of a local policy versus an enterprise policy; there is just one policy setting and whichever writes last wins. For example, suppose a local administrator configures this setting as part of a local policy using the Local Security Policy snap-in (Secpol.msc), which edits that same registry path. If an enterprise administrator configures this setting as part of an enterprise GPO, that enterprise GPO will overwrite the same registry path.
|
||||
|
Loading…
x
Reference in New Issue
Block a user