Question : LDAP Interface issue in Active Directory Domain Service

How does one address to this warning:

Log Name:      Directory Service
Source:        Microsoft-Windows-ActiveDirectory_DomainService
Date:          7/10/2009 3:16:08 PM
Event ID:      2886
Task Category: LDAP Interface
Level:         Warning
Keywords:      Classic
User:          ANONYMOUS LOGON
Computer:      SERVER.domain.local
Description:
The security of this directory server can be significantly enhanced by configuring the server to reject SASL (Negotiate,  Kerberos, NTLM, or Digest) LDAP binds that do not request signing (integrity verification) and LDAP simple binds that  are performed on a cleartext (non-SSL/TLS-encrypted) connection.  Even if no clients are using such binds, configuring the server to reject them will improve the security of this server.
 
Some clients may currently be relying on unsigned SASL binds or LDAP simple binds over a non-SSL/TLS connection, and will stop working if this configuration change is made.  To assist in identifying these clients, if such binds occur this  directory server will log a summary event once every 24 hours indicating how many such binds  occurred.  You are encouraged to configure those clients to not use such binds.  Once no such events are observed  for an extended period, it is recommended that you configure the server to reject such binds

Answer : LDAP Interface issue in Active Directory Domain Service

Change the following policy policy settings

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options
 Domain Controller: LDAP Server signing requirements = require
 Network Security: LDAP Client signing requirements = negiotiate

If the server side is set to require, all clients nead to respond with atleast negotiate
Random Solutions  
 
programming4us programming4us