Skip to content

Latest commit

 

History

History
 
 

RestrictRemoteSAM_Registry_Functions

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

Restrict Remote SAM Registry Functions

A new feature in Windows Server 2016 (and available in earlier version by installing an update) adds the policy:

Network access: Restrict clients allowed to make remote calls to SAM

These functions check all DCs for the current state of this policy and allows deleting the key from the registry of all DCs in the domain if needed.

You may read about this feature on MS Docs here.

The function is desinged to run from any computer in the domain given that the AD PowerShell module is available and the account has sufficient privilages on the DCs

To use it just copy the function into a PowerShell session then use any of the example below.

Get-DomainRestrictRemoteSAM

Lists the registry value for the property on all DCs in the domain.

Example

Get-DomainRestrictRemoteSAM | Format-Table

Remove-DomainRestrictRemoteSAM

Deletes the property on all DCs in the domain.

Example

Remove-DomainRestrictRemoteSAM | Format-Table