<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>UDS Enterprise</provider_name><provider_url>https://udsenterprise.com/en/</provider_url><author_name>UDS Enterprise Team</author_name><author_url>https://udsenterprise.com/en/author/uds-enterprise-team/</author_url><title>Windows Server 2012 R2 authentication policies</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="c6EPxuHwPR"&gt;&lt;a href="https://udsenterprise.com/en/windows-server-2012-r2-authentication-policies/"&gt;Windows Server 2012 R2 authentication policies&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://udsenterprise.com/en/windows-server-2012-r2-authentication-policies/embed/#?secret=c6EPxuHwPR" width="600" height="338" title="&#x201C;Windows Server 2012 R2 authentication policies&#x201D; &#x2014; UDS Enterprise" data-secret="c6EPxuHwPR" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://udsenterprise.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://udsenterprise.com/wp-content/uploads/2022/11/img-linea-blanca.gif</thumbnail_url><thumbnail_width>67</thumbnail_width><thumbnail_height>4</thumbnail_height><description>The growth and improper use of domain administrator accounts is one of the major security threats to systems in Windows Active Directory (AD) domains.In order to avoid potential issues arising from these troubles, here's an article about restricting the use of domain admin accounts to domain controllers in Windows Server 2012 R2 domains by enabling support for additional Kerberos features.The author also explains how to create a new authentication policy and silo. You can have a look at the tutorial here</description></oembed>
