Skip to content

Commit b636346

Browse files
committed
Acrolinx check
1 parent e9f539d commit b636346

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

support/windows-server/windows-security/confidential-attributes-unexpected-behavior-using-windows-server-2025-dc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -129,10 +129,10 @@ To work around this issue, use one of the following methods:
129129

130130
- Use Windows Server 2025 or Windows 11 24H2, or a newer version, as an LDAP client. These operating systems encrypt LDAP sessions by default. For more information about this feature, see [What's new in Windows Server 2025](/windows-server/get-started/whats-new-windows-server-2025#active-directory-domain-services).
131131

132-
- If you can't use either of the previous methods, you can temporarily disable the encrypted session requirements. For more information about how to do this, see [How dsHeuristics affects the encrypted session requirements and related events](#how-dsheuristics-affects-the-encrypted-session-requirements-and-related-events) later in this article.
132+
- If you can't use either of the previous methods, you can temporarily disable the encrypted session requirements. For more information, see [How dsHeuristics affects the encrypted session requirements and related events](#how-dsheuristics-affects-the-encrypted-session-requirements-and-related-events) later in this article.
133133

134134
> [!IMPORTANT]
135-
> This method is not secure. Use it only as a temporary step.
135+
> This method isn't secure. Use it only as a temporary step.
136136
137137
## More information
138138

0 commit comments

Comments
 (0)