From ffd0a9aa01321aee3ea710935de65a8694853f82 Mon Sep 17 00:00:00 2001 From: JanKeller1 Date: Tue, 31 May 2016 15:33:33 -0700 Subject: [PATCH] Tweaked a link --- windows/keep-secure/event-4624.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/event-4624.md b/windows/keep-secure/event-4624.md index 3354ff8c2e..292033d608 100644 --- a/windows/keep-secure/event-4624.md +++ b/windows/keep-secure/event-4624.md @@ -251,7 +251,7 @@ This event generates when a logon session is created (on destination machine). I - **Transited Services** \[Type = UnicodeString\] \[Kerberos-only\]**:** the list of transmitted services. Transmitted services are populated if the logon was a result of a S4U (Service For User) logon process. S4U is a Microsoft extension to the Kerberos Protocol to allow an application service to obtain a Kerberos service ticket on behalf of a user – most commonly done by a front-end website to access an internal resource on behalf of a user. For more information about S4U, see -- **Package Name (NTLM only)** \[Type = UnicodeString\]**:** The name of the LAN Manager sub-package ([**NTLM-family**](https://msdn.microsoft.com/en-us/library/cc236627.aspx) protocol name) that was used during logon. Possible values are: +- **Package Name (NTLM only)** \[Type = UnicodeString\]**:** The name of the LAN Manager sub-package ([NTLM-family](https://msdn.microsoft.com/en-us/library/cc236627.aspx) protocol name) that was used during logon. Possible values are: - “NTLM V1”