On this page, information is gathered about how to authenticate with remote computers. This security setting determines which challenge/response authentication protocol is used for network logons. This choice affects the level of authentication protocol used by clients, the level of session security negotiated, and the level of authentication accepted by servers.

You can choose to authenticate with a combination of the following:

  • Domain accounts

    When you make this selection, you enter information about the domain controllers in the domain and trusted domains of the selected server.

  • Local accounts on the remote computers

    When you make this selection, you enter information about the computers used by the selected server to authenticate to other computers.