Skip to content

Commit e95f715

Browse files
Merge pull request #2887 from DeCohen/WI262139-update-sam-r-configuration-article
Wi262139 update sam r configuration article
2 parents b1ddf71 + 31dc61b commit e95f715

File tree

3 files changed

+7
-1
lines changed

3 files changed

+7
-1
lines changed

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,12 +34,16 @@ To ensure that Windows clients and servers allow your Defender for Identity Dire
3434
3535
**To configure required permissions**:
3636

37-
1. Locate the policy. In your **Computer configuration > Windows settings > Security settings > Local policies > Security options**, select the **Network access - Restrict clients allowed to make remote calls to SAM** policy. For example:
37+
1. Create a new group policy or use an existing one.
38+
1. In your **Computer configuration > Windows settings > Security settings > Local policies > Security options**, select the **Network access - Restrict clients allowed to make remote calls to SAM** policy. For example:
3839

3940
:::image type="content" source="../media/samr-policy-location.png" alt-text="Screenshot of the Network access policy selected." lightbox="../media/samr-policy-location.png":::
4041

4142
1. Add the DSA to the list of approved accounts able to perform this action, together with any other account that you've discovered during audit mode.
4243

44+
:::image type="content" source="../media/restrict-clients-allowed-to-make-remote-calls-to-sam.png" alt-text="Screenshot of the Network access policy settings." lightbox="../media/restrict-clients-allowed-to-make-remote-calls-to-sam.png":::
45+
46+
4347
For more information, see [Network access: Restrict clients allowed to make remote calls to SAM](/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls).
4448

4549
## Make sure the DSA is allowed to access computers from the network (optional)
@@ -60,6 +64,8 @@ To ensure that Windows clients and servers allow your Defender for Identity Dire
6064
>
6165
> The [Microsoft Security Compliance Toolkit](https://www.microsoft.com/download/details.aspx?id=55319) recommends replacing the default *Everyone* with *Authenticated Users* to prevent anonymous connections from performing network sign-ins. Review your local policy settings before managing the [Access this computer from the network](/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network) setting from a GPO, and consider including *Authenticated Users* in the GPO if needed.
6266
67+
:::image type="content" source="../media/define-security-policy-setting.png" alt-text="Screenshot of Security Policy Settings." lightbox="../media/define-security-policy-setting.png":::
68+
6369
## Configure a Device profile for Microsoft Entra hybrid joined devices only
6470

6571
This procedure describes how to use the [Microsoft Intune admin center](https://intune.microsoft.com/) to configure the policies in a Device profile if you're working with Microsoft Entra hybrid joined devices.
75.3 KB
Loading
68.3 KB
Loading

0 commit comments

Comments
 (0)