I ran into a new Kerberos Scenario that I hadn’t hit before when I was working on the cases related to this blog post . It’s rare that I actually see a case related to the Named Pipes protocol.  When I do, it is usually a customer trying to get it ...read more