From fa96b6ea13b0d6f6a06e741efb8c2ee316467c0f Mon Sep 17 00:00:00 2001 From: Michael Nady Date: Wed, 29 Jun 2022 10:02:28 +0200 Subject: [PATCH] Update windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- ...ty-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md index 725d0aaed2..0e0c392215 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md @@ -53,7 +53,7 @@ When you enable this audit policy, it functions in the same way as the **Network - **Enable all** - The domain controlleron which this policy is set will log all events for incoming NTLM traffic. + The domain controller on which this policy is set will log all events for incoming NTLM traffic. ### Best practices