Skip to content

Commit 0c14a80

Browse files
authored
Merge pull request #222758 from Justinha/adds-secure
added new LDAP policies
2 parents 52cfb6a + 9f8157a commit 0c14a80

File tree

2 files changed

+10
-7
lines changed

2 files changed

+10
-7
lines changed
-50.6 KB
Loading

articles/active-directory-domain-services/secure-your-domain.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 08/17/2022
13+
ms.date: 01/04/2023
1414
ms.author: justinha
1515
ms.custom: devx-track-azurepowershell
1616

@@ -25,6 +25,8 @@ This article shows you how to harden a managed domain by using setting setting s
2525
- Disable NTLM password hash synchronization
2626
- Disable the ability to change passwords with RC4 encryption
2727
- Enable Kerberos armoring
28+
- LDAP signing
29+
- LDAP channel binding
2830

2931
## Prerequisites
3032

@@ -44,12 +46,13 @@ To complete this article, you need the following resources:
4446
1. Choose your managed domain, such as *aaddscontoso.com*.
4547
1. On the left-hand side, select **Security settings**.
4648
1. Click **Enable** or **Disable** for the following settings:
47-
- **TLS 1.2 only mode**
48-
- **NTLM authentication**
49-
- **Password synchronization from on-premises**
50-
- **NTLM password synchronization from on-premises**
51-
- **RC4 encryption**
52-
- **Kerberos armoring**
49+
- **TLS 1.2 Only Mode**
50+
- **NTLM v1 Authentication**
51+
- **NTLM Password Synchronization**
52+
- **Kerberos RC4 Encryption**
53+
- **Kerberos Armoring**
54+
- **LDAP Signing**
55+
- **LDAP Channel Binding**
5356

5457
![Screenshot of Security settings to disable weak ciphers and NTLM password hash sync](media/secure-your-domain/security-settings.png)
5558

0 commit comments

Comments
 (0)