Download
| Alert*
oval:org.secpod.oval:def:18407
Internet Protocol security (IPsec) supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection. oval:org.secpod.oval:def:18335 The entry appears as MSS: (DisableIPSourceRouting) IPv6 source routing protection level (protects against packet spoofing) in the SCE. oval:org.secpod.oval:def:18422 This setting allows other users on the network to connect to the computer. oval:org.secpod.oval:def:18383 This policy setting allows users to shut down Windows Vista-based computers from remote locations on the network. oval:org.secpod.oval:def:18203 Provides four management services: Catalog Database Service, Protected Root Service, Automatic Root Certificate Update Service, and Key Service. oval:org.secpod.oval:def:18208 This policy setting determines which users can change the auditing options for files and directories and clear the Security log. oval:org.secpod.oval:def:18255 Allows UPnP devices to be hosted on this computer. oval:org.secpod.oval:def:18489 This security setting determines which users and groups have the authority to synchronize all directory service data. oval:org.secpod.oval:def:18354 When enabled, this policy setting restricts anonymous access to only those shares and pipes that are named in the Network access: Named pipes that can be accessed anonymously and Network access: Shares that can be accessed anonymously settings. oval:org.secpod.oval:def:18189 Manages objects in the Network and Dial-Up Connections folder, in which you can view both local area network and remote connections. oval:org.secpod.oval:def:18468 Manages and implements Volume Shadow Copies used for backup and other purposes. oval:org.secpod.oval:def:18226 Control Event Log behavior when the log file reaches its maximum size for Application (KB) oval:org.secpod.oval:def:18463 Select this option to have Windows Firewall with Advanced Security display notifications to the user when a program is blocked from receiving inbound connections. oval:org.secpod.oval:def:18417 This policy setting allows users to change the amount of processor time that a process uses. oval:org.secpod.oval:def:18461 The 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)' setting should be configured correctly. oval:org.secpod.oval:def:18231 Manages access to smart cards read by this computer. oval:org.secpod.oval:def:18254 This policy setting determines which users can use tools to monitor the performance of non-system processes. if System Monitor is configured to collect data using Windows Management Instrumentation (WMI) this setting is required. oval:org.secpod.oval:def:18457 This setting controls which groups has the right to install printer drivers. oval:org.secpod.oval:def:18182 This policy setting determines how network logons that use local accounts are authenticated. oval:org.secpod.oval:def:18405 do not process the run once list oval:org.secpod.oval:def:18432 Provides network address translation, addressing, name resolution and/or intrusion prevention services for a home or small office network. oval:org.secpod.oval:def:18209 The entry appears as MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) in the SCE. oval:org.secpod.oval:def:18257 This policy setting determines whether users can create global objects that are available to all sessions. Users can still create objects that are specific to their own session if they do not have this user right. oval:org.secpod.oval:def:18202 Enables the detection, download, and installation of updates for Windows and other programs. oval:org.secpod.oval:def:18250 The IIS Admin Service allows administration of IIS components such as FTP, application pools, Web sites, Web service extensions, and both Network News Transfer Protocol (NNTP) and Simple Mail Transfer Protocol (SMTP) virtual servers. oval:org.secpod.oval:def:18380 The startup of this service signals other services that the Security Accounts Manager (SAM) is ready to accept requests. oval:org.secpod.oval:def:18351 This policy setting allows the user of a portable computer to click Eject PC on the Start menu to undock the computer. oval:org.secpod.oval:def:18298 This policy setting determines which user accounts can increase or decrease the size of a process's working set. The working set of a process is the set of memory pages currently visible to the process in physical random access memory (RAM). oval:org.secpod.oval:def:18300 This policy setting determines which users and groups can change the time and date on the internal clock of the computers in your environment. oval:org.secpod.oval:def:18188 Processes installation, removal, and enumeration requests for software deployed through Group Policy. oval:org.secpod.oval:def:18483 This option determines if this computer can receive unicast responses to multicast or broadcast messages that it initiates. Unsolicited unicast responses are blocked regardless of this setting. oval:org.secpod.oval:def:18356 Control Event Log behavior when the log file reaches its maximum size for Security (KB) oval:org.secpod.oval:def:18234 Require a Password when a Computer Wakes (Plugged in) oval:org.secpod.oval:def:18271 This policy setting allows a process to create an access token, which may provide elevated rights to access sensitive data. oval:org.secpod.oval:def:18274 Receives trap messages generated by local or remote Simple Network Management Protocol (SNMP) agents and forwards the messages to SNMP management programs running on this computer. oval:org.secpod.oval:def:18395 This setting controls whether local administrators are allowed to create local firewall rules that apply with other firewall rules enforced by Group Policy. oval:org.secpod.oval:def:18477 This policy setting determines whether members of the Server Operators group are allowed to submit jobs by means of the AT schedule facility. oval:org.secpod.oval:def:18305 This policy setting controls whether application write failures are redirected to defined registry and file system locations. oval:org.secpod.oval:def:18227 This policy setting determines which user accounts will have the right to attach a debugger to any process or to the kernel, which provides complete access to sensitive and critical operating system components. oval:org.secpod.oval:def:18369 This policy setting specifies the type of challenge/response authentication for network logons. LAN Manager (LM) authentication is the least secure method; it allows encrypted passwords to be cracked because they can be easily intercepted on the network. oval:org.secpod.oval:def:18295 This policy setting determines whether to disconnect users who are connected to the local computer outside their user account's valid logon hours. It affects the SMB component. oval:org.secpod.oval:def:18429 The entry appears as MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) in the SCE. oval:org.secpod.oval:def:18261 Autoplay starts to read from a drive as soon as you insert media in the drive, which causes the setup file for programs or audio media to start immediately. oval:org.secpod.oval:def:18270 This policy setting determines whether the Transport Layer Security/Secure Sockets Layer (TLS/SSL) Security Provider supports only the TLS_RSA_WITH_3DES_EDE_CBC_SHA cipher suite. oval:org.secpod.oval:def:18365 This setting determines which users can change the time zone of the computer. oval:org.secpod.oval:def:18304 Enables client computers to print to the Line Printer Daemon (LPD) service on this server using TCP/IP and the Line Printer Remote (LPR) protocol. oval:org.secpod.oval:def:18373 This privilege determines which user accounts can modify the integrity label of objects, such as files, registry keys, or processes owned by other users. oval:org.secpod.oval:def:18424 Adds, modifies, and removes applications provided as a Windows Installer (*.msi) package. oval:org.secpod.oval:def:18296 Restrict Unauthenticated RPC clients oval:org.secpod.oval:def:18447 This policy setting allows a user to adjust the maximum amount of memory that is available to a process. oval:org.secpod.oval:def:18289 The Extensible Authentication Protocol (EAP) service provides network authentication in such scenarios as 802.1x wired and wireless, VPN, and Network Access Protection (NAP). oval:org.secpod.oval:def:18197 This policy setting specifies which users can add computer workstations to a specific domain. oval:org.secpod.oval:def:18204 This policy setting allows accounts to log on using the task scheduler service. oval:org.secpod.oval:def:18394 This setting determines the behavior for inbound connections that do not match an inbound firewall rule. oval:org.secpod.oval:def:18482 This service manages events and event logs. oval:org.secpod.oval:def:18267 Setting displays notifications to the user when a program is blocked from receiving inbound connections. oval:org.secpod.oval:def:18492 The 'MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)' setting should be configured correctly. oval:org.secpod.oval:def:18472 This policy setting allows users who do not have the special "Traverse Folder" access permission to "pass through" folders when they browse an object path in the NTFS file system or the registry. oval:org.secpod.oval:def:18341 This policy setting allows the administrator account to automatically log on to the recovery console when it is invoked during startup. oval:org.secpod.oval:def:18420 The registry value entry AutoAdminLogon was added to the template file in the HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ registry key oval:org.secpod.oval:def:18244 Control Event Log behavior when the log file reaches its maximum size for System (KB) oval:org.secpod.oval:def:18219 This policy setting determines whether the LDAP server requires a signature before it will negotiate with LDAP clients. oval:org.secpod.oval:def:18497 Default behavior for AutoRun oval:org.secpod.oval:def:18410 Provides Telephony API (TAPI) support for programs that control telephony devices on the local computer and, through the LAN, on servers that are also running the service. oval:org.secpod.oval:def:18462 Maintains date and time synchronization on all clients and servers in the network. oval:org.secpod.oval:def:18199 This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. oval:org.secpod.oval:def:18436 This policy setting allows a process to assume the identity of any user and thus gain access to the resources that the user is authorized to access. oval:org.secpod.oval:def:18446 Controls whether computer receives unicast responses to its outgoing multicast or broadcast messages. oval:org.secpod.oval:def:18329 This policy setting determines whether a domain member should attempt to negotiate encryption for all secure channel traffic that it initiates. oval:org.secpod.oval:def:18192 This policy setting determines whether services can be launched in the context of the specified account. oval:org.secpod.oval:def:18293 This policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account. oval:org.secpod.oval:def:18276 This policy setting allows users to change the size of the pagefile. oval:org.secpod.oval:def:18400 This setting determines the behavior for inbound connections that do not match an inbound firewall rule. The default behavior is to block connections unless there are firewall rules to allow the connection. oval:org.secpod.oval:def:18297 This policy setting determines what happens when the smart card for a logged on user is removed from the smart card reader. oval:org.secpod.oval:def:18421 This setting determines the behavior for outbound connections that do not match an outbound firewall rule. oval:org.secpod.oval:def:18183 This setting controls whether local administrators are allowed to create connection security rules that apply with other connection security rules enforced by Group Policy. oval:org.secpod.oval:def:18371 This setting controls whether local administrators are allowed to create local firewall rules that apply together with firewall rules configured by Group Policy. oval:org.secpod.oval:def:18230 This policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop. oval:org.secpod.oval:def:18228 This is the setting that turns on or off UAC. Disabling this setting effectively disables UAC. oval:org.secpod.oval:def:18302 This policy setting prohibits users from connecting to a computer from across the network, which would allow users to access and potentially modify data remotely. oval:org.secpod.oval:def:18364 This is an advanced security setting for the Windows Firewall that you can use to allow unicast responses on computers running Windows Vista or later. oval:org.secpod.oval:def:18445 The entry appears as MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning in the SCE. oval:org.secpod.oval:def:18236 This policy setting determines if the server side SMB service is required to perform SMB packet signing. oval:org.secpod.oval:def:18366 This policy setting determines the strength of the default discretionary access control list (DACL) for objects. oval:org.secpod.oval:def:18221 Manages the RPC name service database. oval:org.secpod.oval:def:18470 Serves as the endpoint mapper and COM Service Control Manager. oval:org.secpod.oval:def:18278 This policy setting determines whether the system shuts down if it is unable to log Security events. oval:org.secpod.oval:def:18342 The policy setting allows programs that run on behalf of a user to impersonate that user (or another specified account) so that they can act on behalf of the user. oval:org.secpod.oval:def:18214 This setting determines the behavior for inbound connections that do not match an inbound firewall rule. The default behavior is to block connections unless there are firewall rules to allow the connection. oval:org.secpod.oval:def:18499 Enables starting processes under alternate credentials. If this service is stopped, this type of logon access will be unavailable. oval:org.secpod.oval:def:18279 Registers and updates IP addresses and DNS records for this computer. oval:org.secpod.oval:def:18262 This setting enables the prevention of the execution of unsigned or invalidated applications. Before enabling this setting, it is essential that administrators are certain that all required applications are signed and valid. oval:org.secpod.oval:def:18384 This setting controls whether local administrators are allowed to create connection security rules that apply together with connection security rules configured by Group Policy. oval:org.secpod.oval:def:18281 The "Require a Password When a Computer Wakes (On Battery)" machine setting should be configured correctly. oval:org.secpod.oval:def:18215 This policy setting determines which users who are logged on locally can use the Shut Down command to shut down the operating system. oval:org.secpod.oval:def:18252 Manages software-based volume shadow copies taken by the Volume Shadow Copy service. oval:org.secpod.oval:def:18327 This policy setting determines which users or groups have the right to log on as a Terminal Services client. oval:org.secpod.oval:def:18440 The DNS Client service (dnscache) caches Domain Name System (DNS) names and registers the full computer name for this computer. oval:org.secpod.oval:def:18196 Provides support for the NetBIOS over TCP/IP (NetBT) service and NetBIOS name resolution for clients on the network, therefore enabling users to share files, print, and log on to the network. oval:org.secpod.oval:def:18474 Provides support for 3rd party protocol plug-ins for Internet Connection Sharing oval:org.secpod.oval:def:18220 Enables remote users to modify registry settings on this computer. oval:org.secpod.oval:def:18205 Provides user experience theme management. oval:org.secpod.oval:def:18264 This setting determines the behavior for outbound connections that do not match an outbound firewall rule. If Outbound connections are set to Block and deploy the firewall policy by using a GPO, cannot receive subsequent Group Policy updates. oval:org.secpod.oval:def:18249 Allows users to connect interactively to a remote computer. oval:org.secpod.oval:def:18346 This policy setting controls the behavior of application installation detection for the computer. oval:org.secpod.oval:def:18311 Specify the maximum log file size for Application (KB) oval:org.secpod.oval:def:18186 Supports file, print, and named-pipe sharing over the network for this computer. oval:org.secpod.oval:def:18355 Specify the maximum log file size for Security (KB) oval:org.secpod.oval:def:18496 This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. oval:org.secpod.oval:def:18282 Coordinates transactions that span multiple resource managers, such as databases, message queues, and file systems. oval:org.secpod.oval:def:18350 This policy setting determines which users can create symbolic links. oval:org.secpod.oval:def:18344 Creates a connection to a remote network whenever a program references a remote DNS or NetBIOS name or address. oval:org.secpod.oval:def:18437 Maintains a secure channel between this computer and the domain controller for authenticating users and services. oval:org.secpod.oval:def:18448 This policy setting determines whether the virtual memory pagefile is cleared when the system is shut down. oval:org.secpod.oval:def:18377 Monitors system events and notifies subscribers to COM+ Event System of these events. oval:org.secpod.oval:def:18464 This policy setting determines which accounts will not be able to log on to the computer as a batch job. oval:org.secpod.oval:def:18473 This policy setting makes the Recovery Console SET command available. oval:org.secpod.oval:def:18328 Specify the maximum log file size for System (KB) oval:org.secpod.oval:def:18367 This setting controls whether local administrators are allowed to create local firewall rules that apply together with firewall rules configured by Group Policy. oval:org.secpod.oval:def:18423 This policy setting determines whether digital certificates are processed when software restriction policies are enabled and a user or process attempts to run software with an .exe file name extension. oval:org.secpod.oval:def:18415 Select this option to have Windows Firewall with Advanced Security display notifications to the user when a program is blocked from receiving inbound connections. oval:org.secpod.oval:def:18467 This policy setting determines which users can interactively log on to computers in your environment. oval:org.secpod.oval:def:18247 Manages audio for Windows-based programs. oval:org.secpod.oval:def:18444 This policy setting determines whether a computer can be shut down when a user is not logged on. oval:org.secpod.oval:def:18413 Maintains links between NTFS files within a computer or across computers in a network. oval:org.secpod.oval:def:18290 This policy setting determines which users or processes can generate audit records in the Security log. oval:org.secpod.oval:def:18310 This policy setting determines whether a user can log on to a Windows domain using cached account information. oval:org.secpod.oval:def:18338 This security setting determines which users are prevented from logging on at the computer. oval:org.secpod.oval:def:18260 This policy setting controls the behavior of the elevation prompt for administrators on computers running Windows 7, Windows Server 2008 R2, and later versions of Windows. oval:org.secpod.oval:def:18237 This policy setting allows users to create directory objects in the object manager. oval:org.secpod.oval:def:18253 This policy setting allows a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. oval:org.secpod.oval:def:18485 This policy setting allows users to circumvent file and directory permissions to back up the system. oval:org.secpod.oval:def:18348 This policy setting controls the behavior of the elevation prompt for standard users on computers running Windows 7, Windows Server 2008 R2, and later versions of Windows. oval:org.secpod.oval:def:18391 This policy setting allows users to dynamically load a new device driver on a system. oval:org.secpod.oval:def:18352 This policy setting allows one process or service to start another service or process with a different security access token, which can be used to modify the security access token of that sub-process and result in the escalation of privileges. oval:org.secpod.oval:def:18439 This policy setting allows users to manage the system's volume or disk configuration, which could allow a user to delete a volume and cause data loss as well as a denial-of-service condition. oval:org.secpod.oval:def:18471 This policy setting allows users to change the Trusted for Delegation setting on a computer object in Active Directory. oval:org.secpod.oval:def:18465 This policy setting determines who is allowed to format and eject removable media. oval:org.secpod.oval:def:18268 Always install with elevated privileges oval:org.secpod.oval:def:18340 This policy setting determines whether all secure channel traffic that is initiated by the domain member must be signed or encrypted. oval:org.secpod.oval:def:18396 This policy setting determines whether a domain member should attempt to negotiate whether all secure channel traffic that it initiates must be digitally signed. oval:org.secpod.oval:def:5645 Verify that all users are assigned a unique ID for access to system components or cardholder data and also verify that users are authenticated using unique ID and additional authentication (for example, a password) for access to the cardholder data environment. oval:org.secpod.oval:def:5646 Verify that inactive accounts over 90 days old are either removed or disabled. oval:org.secpod.oval:def:5017 Malicious software, commonly referred to as malware including viruses, worms, and Trojans enters the network during many business-approved activities including employee e-mail and use of the Internet, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Ant ... oval:org.secpod.oval:def:5019 Malicious software, commonly referred to as malware including viruses, worms, and Trojans enters the network during many business-approved activities including employee e-mail and use of the Internet, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Ant ... oval:org.secpod.oval:def:5025 If virtualization technologies are used, verify that only one primary function is implemented per virtual system component or device. oval:org.secpod.oval:def:5024 Implement only one primary function per server to prevent functions that require different security levels from co-existing on the same server. (For example, web servers, database servers, and DNS should be implemented on separate servers.) oval:org.secpod.oval:def:5021 Malicious software, commonly referred to as malware including viruses, worms, and Trojans enters the network during many business-approved activities including employee e-mail and use of the Internet, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Ant ... oval:org.secpod.oval:def:18385 This policy setting determines whether the SMB client will attempt to negotiate SMB packet signing. oval:org.secpod.oval:def:18321 This policy setting determines if the server side SMB service is able to sign SMB packets if it is requested to do so by a client that attempts to establish a connection. oval:org.secpod.oval:def:18248 This policy setting determines what additional permissions are assigned for anonymous connections to the computer oval:org.secpod.oval:def:18409 Determines whether case insensitivity is enforced for all subsystems. Example is case insensitivity for other subsystems, such as the Portable Operating System Interface for UNIX (POSIX) which are normally case sensitive. oval:org.secpod.oval:def:18495 The 'Network access: Named Pipes that can be accessed anonymously' setting should be configured correctly. oval:org.secpod.oval:def:18481 Select On to allow Windows Firewall to filter network traffic. Select Off to prevent Windows Firewall from using any firewall rules or connection security rules for this profile. oval:org.secpod.oval:def:18191 This policy setting controls the ability of anonymous users to enumerate the accounts in the Security Accounts Manager (SAM). oval:org.secpod.oval:def:18469 This policy setting determines the level of data signing that is requested on behalf of clients that issue LDAP BIND requests. oval:org.secpod.oval:def:18430 This policy setting determines whether packet signing is required by the SMB client component. oval:org.secpod.oval:def:18223 Windows Firewall with Advanced Security uses the settings for this profile to filter network traffic. oval:org.secpod.oval:def:18388 This policy setting determines whether the account name of the last user to log on to the client computers in your organization will be displayed in each computer's respective Windows logon screen. oval:org.secpod.oval:def:18509 This policy setting allows users to take ownership of files, folders, registry keys, processes, or threads. This user right bypasses any permissions that are in place to protect objects and give ownership to the specified user. oval:org.secpod.oval:def:18501 This policy setting determines which users can bypass file, directory, registry, and other persistent object permissions when restoring backed up files and directories. oval:org.secpod.oval:def:18505 This policy setting allows users to configure the system-wide environment variables that affect hardware configuration. This information is typically stored in the Last Known Good Configuration. oval:org.secpod.oval:def:18307 This policy setting allows administrators to enable the more precise auditing capabilities present in Windows Vista. Uses subcategory setting to override audit policy categories. oval:org.secpod.oval:def:18390 This policy setting controls the ability of anonymous users to enumerate SAM accounts as well as shares. oval:org.secpod.oval:def:10925 The entry appears as MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended) in the SCE. oval:org.secpod.oval:def:10926 This policy setting determines whether the LAN Manager (LM) hash value for the new password is stored when the password is changed. oval:org.secpod.oval:def:10927 Network security: Minimum session security for NTLM SSP based (including secure RPC) client applications. oval:org.secpod.oval:def:10928 Network security: Minimum session security for NTLM SSP based (including secure RPC) server applications. oval:org.secpod.oval:def:10921 Disable this policy setting to prevent the SMB redirector from sending plaintext passwords during authentication to third-party SMB servers that do not support password encryption. oval:org.secpod.oval:def:10922 This policy setting allows you to specify the amount of continuous idle time that must pass in an SMB session before the session is suspended because of inactivity. oval:org.secpod.oval:def:18512 This setting determines the behavior for outbound connections that do not match an outbound firewall rule. If Outbound connections are set to Block and deploy the firewall policy by using a GPO, cannot receive subsequent Group Policy updates. oval:org.secpod.oval:def:18515 When this policy setting is enabled, a domain controller must authenticate the domain account used to unlock the computer. oval:org.secpod.oval:def:18526 When this setting is configured to Enabled, users are not required to use the CTRL+ALT+DEL key combination to log on to the network. oval:org.secpod.oval:def:18525 Provides a common interface and object model to access management information about operating system, devices, applications and services. oval:org.secpod.oval:def:10915 The "Domain member: Disable machine account password changes" setting should be configured correctly. oval:org.secpod.oval:def:10917 The "Domain member: Require strong (Windows 2000 or later) session key" setting should be configured correctly. oval:org.secpod.oval:def:10919 The "Interactive logon: Prompt user to change password before expiration" setting should be configured correctly oval:org.secpod.oval:def:10913 The "Accounts: Limit local account use of blank passwords to console logon only" setting should be configured correctly. oval:org.secpod.oval:def:18500 This policy setting allows Local System services that use Negotiate to use the computer identity when reverting to NTLM authentication. oval:org.secpod.oval:def:18506 This setting controls whether local administrators are allowed to create connection security rules that apply with other connection security rules enforced by Group Policy. oval:org.secpod.oval:def:18504 Allow NTLM to fall back to NULL session when used with LocalSystem. |