Important:
This is retired content. This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This content may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.
A version of this page is also available for
4/8/2010

The following table shows the modifiable registry settings for the HKEY_LOCAL_MACHINE\Comm\Redirkey.

Value : type Description

AllowedAuthMethods: REG_DWORD

A DWORDvalue that is treated as a bitmask.

Bit 0: LanMan authentication method enabled or disabled.

Security Note:
When this authentication method is used, a password can be subjected to attacks by unauthorized users.

Bit 1: Authentication that uses a security subsystem that is negotiated with the server. The protocol used depends on the settings of the security subsystem and the server capabilities. The negotiated authentication method can be NTLM, NTLMv2 and/or Kerberos.

Security Note:
Disabling NTLM will cause authentication failure with down-level servers (such as Windows 95/98 or Windows NT) that do not support Kerberos. This will also cause failure for pass-through authentication, which is used by the Windows Mobile Web server and DCOM.

ClearTxtPwdAllowed: REG_DWORD

Default setting is zero (0). If this value is set to 0, the Redirector refuses connection to a server that negotiates cleartext passwords.

Specifies if a cleartext password is accepted.

Security Note:
Setting this value to accept cleartext passwords allows anyone listening on the network to view passwords.

DefaultDomain: REG_SZ

Default setting is NULL. If this value is set to NULL, operations that require a default domain will fail.

Specifies a default domain for a NTLM security service provider to use for authentication.

DefaultDomainPDC: REG_SZ

Optionally specifies a primary domain controller for the default domain.

FindCacheMaxSize: REG_DWORD

Default setting is 8192. A value of zero (0) disables caching.

Specifies the maximum memory to use for find caching.

RecvBufSize: REG_DWORD

Default setting is 4096.

Specifies the size of the receiving buffer.

RegisterFSRoot: REG_DWORD

Default setting is 0, which does not expose the \NETWORK directory for mapped resources.

Enables a run-time image to expose the \NETWORK directory.

ResourceExpiryInt: REG_DWORD

Default setting is 600.

Specifies the number of seconds before releasing unused resources.

Note:
Because processing is performed on a periodic cleanup thread, it can take up to 60 seconds in addition to the specified time between the time that the file is closed to the time that the memory is released.

ServerTimoutMs: REG_DWORD

Default setting is 10000. You can double this value for slow interfaces, such as dial-up.

Specifies the number of milliseconds to wait for SMB responses.

SmbSignatureMode: REG_DWORD

Default setting is 1.

A value of zero (0) means that signing will not be used when sending SMBs to the server. If the server requires it, messages will fail with Access Denied.

A value of 1 means that signing will be used when the server supports it or requires it. Any server settings should still work.

A value of 2 means that the client prefers SMB signing with the server. Any server settings should still work.

A value of 3 means that the client requires SMB signing with the server. Server must be enabled for success or disabled for failure.

This registry key specifies SMB signing when communicating with the server. With Windows 2003 Server, SMB signing is required by default if the server is a domain controller.

A session will be set up regardless of SMB signing. Subsequent messages will fail if signing is expected by either party.

Note:
If settings change, the device must be warm booted before they take effect. Exercise caution when changing default values — this can affect system performance or the Redirector operation.

See Also