@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.subservice : domain-services
11
11
ms.workload : identity
12
12
ms.topic : how-to
13
- ms.date : 08/17/2022
13
+ ms.date : 01/04/2023
14
14
ms.author : justinha
15
15
ms.custom : devx-track-azurepowershell
16
16
@@ -25,6 +25,8 @@ This article shows you how to harden a managed domain by using setting setting s
25
25
- Disable NTLM password hash synchronization
26
26
- Disable the ability to change passwords with RC4 encryption
27
27
- Enable Kerberos armoring
28
+ - LDAP signing
29
+ - LDAP channel binding
28
30
29
31
## Prerequisites
30
32
@@ -44,12 +46,13 @@ To complete this article, you need the following resources:
44
46
1 . Choose your managed domain, such as * aaddscontoso.com* .
45
47
1 . On the left-hand side, select ** Security settings** .
46
48
1 . Click ** Enable** or ** Disable** for the following settings:
47
- - ** TLS 1.2 only mode**
48
- - ** NTLM authentication**
49
- - ** Password synchronization from on-premises**
50
- - ** NTLM password synchronization from on-premises**
51
- - ** RC4 encryption**
52
- - ** Kerberos armoring**
49
+ - ** TLS 1.2 Only Mode**
50
+ - ** NTLM v1 Authentication**
51
+ - ** NTLM Password Synchronization**
52
+ - ** Kerberos RC4 Encryption**
53
+ - ** Kerberos Armoring**
54
+ - ** LDAP Signing**
55
+ - ** LDAP Channel Binding**
53
56
54
57
![ Screenshot of Security settings to disable weak ciphers and NTLM password hash sync] ( media/secure-your-domain/security-settings.png )
55
58
0 commit comments