diff --git a/Group Policies Objects/Default Domain Policy/Security Options.md b/Group Policies Objects/Default Domain Policy/Security Options.md index a0608c1..18a7acc 100644 --- a/Group Policies Objects/Default Domain Policy/Security Options.md +++ b/Group Policies Objects/Default Domain Policy/Security Options.md @@ -4,7 +4,9 @@ Documentation: https://learn.microsoft.com/en-us/windows/security/application-se `Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options` +- Domain controller: LDAP server signing requirements: Require signing (**Follow this guide to setup LDAPS if you do not have key server: https://www.dvolve.net/blog/2019/12/using-lets-encrypt-for-active-directory-domain-controller-certificates/**) +- Domain controller: LDAP server channel binding token requirements: Always +- Network security: LDAP client signing requirements: Require signing - User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode -> Prompt for credentials - User Account Control: Only elevate executables that are signed and validated -> Enabled -- User Account Control: Switch to the secure desktop when prompting for elevation -> Enabled (Docs says it is enabled by default, but it is off on my Parallels VM somehow) -- Network security: LDAP client signing requirements: Require signing (**Follow this guide to setup LDAPS if you do not have key server: https://www.dvolve.net/blog/2019/12/using-lets-encrypt-for-active-directory-domain-controller-certificates/**) \ No newline at end of file +- User Account Control: Switch to the secure desktop when prompting for elevation -> Enabled (Docs says it is enabled by default, but it is off on my Parallels VM somehow) \ No newline at end of file