Skip to content

Commit 1901a0b

Browse files
authored
Fix remaining localization errors
1 parent d8d47e3 commit 1901a0b

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

support/windows-server/active-directory/sts-recommendations-for-windows-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Disabling (or enabling) STS requires administrators to modify settings either in
9999

100100
| Group Policy Setting | Local Setting |
101101
|----------------------|---------------|
102-
| Path: Computer Configuration\Administrative Templates\System\Windows Time Service<br><br>Group Policy: Global Configuration Settings<br>Setting: UtilizeSslTimeData<br>Value:<br>0 = STS disabled<br>1 = STS enabled<br>(Reboot required)<br>[https://learn.microsoft.com/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings?tabs=config#using-local-group-policy-editor](https://learn.microsoft.com/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings?tabs=config#using-local-group-policy-editor) | Please back up existing settings before making any registry changes.<br><br>Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config<br>Value Name: UtilizeSslTimeData<br>Value Type: REG_DWORD<br>Value:<br>0 = STS disabled<br>1 = STS enabled<br>(Reboot required)<br>[https://learn.microsoft.com/en-us/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings?tabs=config#windows-time-registry-reference](https://learn.microsoft.com/en-us/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings?tabs=config#windows-time-registry-reference)<br><br>Command to disable STS Local setting in registry:<br>reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config" /v "UtilizeSslTimeData" /t REG_DWORD /d 0 /f |
102+
| Path: Computer Configuration\Administrative Templates\System\Windows Time Service<br><br>Group Policy: Global Configuration Settings<br>Setting: UtilizeSslTimeData<br>Value:<br>0 = STS disabled<br>1 = STS enabled<br>(Reboot required)<br>[https://learn.microsoft.com/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings?tabs=config#using-local-group-policy-editor](https://learn.microsoft.com/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings?tabs=config#using-local-group-policy-editor) | Please back up existing settings before making any registry changes.<br><br>Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config<br>Value Name: UtilizeSslTimeData<br>Value Type: REG_DWORD<br>Value:<br>0 = STS disabled<br>1 = STS enabled<br>(Reboot required)<br>[https://learn.microsoft.com/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings?tabs=config#windows-time-registry-reference](https://learn.microsoft.com/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings?tabs=config#windows-time-registry-reference)<br><br>Command to disable STS Local setting in registry:<br>reg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config" /v "UtilizeSslTimeData" /t REG_DWORD /d 0 /f |
103103

104104
Determine STS setting used by W32time service:
105105
- Using Services Events (_not available on all editions and releases_):
@@ -154,7 +154,7 @@ Timekeeping and time synchronization are complex topics that are subjects of sev
154154
- Some Windows OS SKUs by default write the System event logs into this file: _%SystemRoot%\System32\Winevt\Logs\System.evtx_, and these logs can be typically viewed in the EventViewer application.
155155
- Several aspects of event logging are configurable by the Administrator.
156156
- Windows OS SKUs without the default event logging component can capture this event log using event listeners.
157-
- This article and linked video explain various aspects of Windows Event logging: [https://techcommunity.microsoft.com/t5/itops-talk-blog/understanding-the-windows-event-log-and-event-log-policies/ba-p/4065107](https://techcommunity.microsoft.com/t5/itops-talk-blog/understanding-the-windows-event-log-and-event-log-policies/ba-p/4065107). Further details are available in this Windows training module: [https://learn.microsoft.com/training/modules/manage-monitor-event-logs/](https://learn.microsoft.com/en-us/training/modules/manage-monitor-event-logs/).
157+
- This article and linked video explain various aspects of Windows Event logging: [https://techcommunity.microsoft.com/t5/itops-talk-blog/understanding-the-windows-event-log-and-event-log-policies/ba-p/4065107](https://techcommunity.microsoft.com/t5/itops-talk-blog/understanding-the-windows-event-log-and-event-log-policies/ba-p/4065107). Further details are available in this Windows training module: [https://learn.microsoft.com/training/modules/manage-monitor-event-logs/](https://learn.microsoft.com/training/modules/manage-monitor-event-logs/).
158158
- Several monitoring solutions available in the market (created by 3rd parties, as well as Microsoft) capture event logs as part of their functionality. This document does not recommend any specific solution.
159159
- Time-sensitive workloads are applications and services that require a machine’s time to be accurate within a certain margin of error. Hosting time-sensitive workloads in a deployment is an important factor in deciding on further customization of time synchronization and distribution topology described below.
160160
- Managing timekeeping on any deployment makes it necessary to monitor the time on each device in that deployment and have an action plan when the monitoring indicates errors.

0 commit comments

Comments
 (0)