[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:18407
Internet Protocol security (IPsec) supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection.

oval:org.secpod.oval:def:18335
The entry appears as MSS: (DisableIPSourceRouting) IPv6 source routing protection level (protects against packet spoofing) in the SCE.

oval:org.secpod.oval:def:18422
This setting allows other users on the network to connect to the computer.

oval:org.secpod.oval:def:18383
This policy setting allows users to shut down Windows Vista-based computers from remote locations on the network.

oval:org.secpod.oval:def:18203
Provides four management services: Catalog Database Service, Protected Root Service, Automatic Root Certificate Update Service, and Key Service.

oval:org.secpod.oval:def:18208
This policy setting determines which users can change the auditing options for files and directories and clear the Security log.

oval:org.secpod.oval:def:18255
Allows UPnP devices to be hosted on this computer.

oval:org.secpod.oval:def:18489
This security setting determines which users and groups have the authority to synchronize all directory service data.

oval:org.secpod.oval:def:18354
When enabled, this policy setting restricts anonymous access to only those shares and pipes that are named in the Network access: Named pipes that can be accessed anonymously and Network access: Shares that can be accessed anonymously settings.

oval:org.secpod.oval:def:18189
Manages objects in the Network and Dial-Up Connections folder, in which you can view both local area network and remote connections.

oval:org.secpod.oval:def:18468
Manages and implements Volume Shadow Copies used for backup and other purposes.

oval:org.secpod.oval:def:18226
Control Event Log behavior when the log file reaches its maximum size for Application (KB)

oval:org.secpod.oval:def:18463
Select this option to have Windows Firewall with Advanced Security display notifications to the user when a program is blocked from receiving inbound connections.

oval:org.secpod.oval:def:18417
This policy setting allows users to change the amount of processor time that a process uses.

oval:org.secpod.oval:def:18461
The 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)' setting should be configured correctly.

oval:org.secpod.oval:def:18231
Manages access to smart cards read by this computer.

oval:org.secpod.oval:def:18254
This policy setting determines which users can use tools to monitor the performance of non-system processes. if System Monitor is configured to collect data using Windows Management Instrumentation (WMI) this setting is required.

oval:org.secpod.oval:def:18457
This setting controls which groups has the right to install printer drivers.

oval:org.secpod.oval:def:18182
This policy setting determines how network logons that use local accounts are authenticated.

oval:org.secpod.oval:def:18405
do not process the run once list

oval:org.secpod.oval:def:18432
Provides network address translation, addressing, name resolution and/or intrusion prevention services for a home or small office network.

oval:org.secpod.oval:def:18209
The entry appears as MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) in the SCE.

oval:org.secpod.oval:def:18257
This policy setting determines whether users can create global objects that are available to all sessions. Users can still create objects that are specific to their own session if they do not have this user right.

oval:org.secpod.oval:def:18202
Enables the detection, download, and installation of updates for Windows and other programs.

oval:org.secpod.oval:def:18250
The IIS Admin Service allows administration of IIS components such as FTP, application pools, Web sites, Web service extensions, and both Network News Transfer Protocol (NNTP) and Simple Mail Transfer Protocol (SMTP) virtual servers.

oval:org.secpod.oval:def:18380
The startup of this service signals other services that the Security Accounts Manager (SAM) is ready to accept requests.

oval:org.secpod.oval:def:18351
This policy setting allows the user of a portable computer to click Eject PC on the Start menu to undock the computer.

oval:org.secpod.oval:def:18298
This policy setting determines which user accounts can increase or decrease the size of a process's working set. The working set of a process is the set of memory pages currently visible to the process in physical random access memory (RAM).

oval:org.secpod.oval:def:18300
This policy setting determines which users and groups can change the time and date on the internal clock of the computers in your environment.

oval:org.secpod.oval:def:18188
Processes installation, removal, and enumeration requests for software deployed through Group Policy.

oval:org.secpod.oval:def:18483
This option determines if this computer can receive unicast responses to multicast or broadcast messages that it initiates. Unsolicited unicast responses are blocked regardless of this setting.

oval:org.secpod.oval:def:18356
Control Event Log behavior when the log file reaches its maximum size for Security (KB)

oval:org.secpod.oval:def:18234
Require a Password when a Computer Wakes (Plugged in)

oval:org.secpod.oval:def:18271
This policy setting allows a process to create an access token, which may provide elevated rights to access sensitive data.

oval:org.secpod.oval:def:18274
Receives trap messages generated by local or remote Simple Network Management Protocol (SNMP) agents and forwards the messages to SNMP management programs running on this computer.

oval:org.secpod.oval:def:18395
This setting controls whether local administrators are allowed to create local firewall rules that apply with other firewall rules enforced by Group Policy.

oval:org.secpod.oval:def:18477
This policy setting determines whether members of the Server Operators group are allowed to submit jobs by means of the AT schedule facility.

oval:org.secpod.oval:def:18305
This policy setting controls whether application write failures are redirected to defined registry and file system locations.

oval:org.secpod.oval:def:18227
This policy setting determines which user accounts will have the right to attach a debugger to any process or to the kernel, which provides complete access to sensitive and critical operating system components.

oval:org.secpod.oval:def:18369
This policy setting specifies the type of challenge/response authentication for network logons. LAN Manager (LM) authentication is the least secure method; it allows encrypted passwords to be cracked because they can be easily intercepted on the network.

oval:org.secpod.oval:def:18295
This policy setting determines whether to disconnect users who are connected to the local computer outside their user account's valid logon hours. It affects the SMB component.

oval:org.secpod.oval:def:18429
The entry appears as MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) in the SCE.

oval:org.secpod.oval:def:18261
Autoplay starts to read from a drive as soon as you insert media in the drive, which causes the setup file for programs or audio media to start immediately.

oval:org.secpod.oval:def:18270
This policy setting determines whether the Transport Layer Security/Secure Sockets Layer (TLS/SSL) Security Provider supports only the TLS_RSA_WITH_3DES_EDE_CBC_SHA cipher suite.

oval:org.secpod.oval:def:18365
This setting determines which users can change the time zone of the computer.

oval:org.secpod.oval:def:18304
Enables client computers to print to the Line Printer Daemon (LPD) service on this server using TCP/IP and the Line Printer Remote (LPR) protocol.

oval:org.secpod.oval:def:18373
This privilege determines which user accounts can modify the integrity label of objects, such as files, registry keys, or processes owned by other users.

oval:org.secpod.oval:def:18424
Adds, modifies, and removes applications provided as a Windows Installer (*.msi) package.

oval:org.secpod.oval:def:18296
Restrict Unauthenticated RPC clients

oval:org.secpod.oval:def:18447
This policy setting allows a user to adjust the maximum amount of memory that is available to a process.

oval:org.secpod.oval:def:18289
The Extensible Authentication Protocol (EAP) service provides network authentication in such scenarios as 802.1x wired and wireless, VPN, and Network Access Protection (NAP).

oval:org.secpod.oval:def:18197
This policy setting specifies which users can add computer workstations to a specific domain.

oval:org.secpod.oval:def:18204
This policy setting allows accounts to log on using the task scheduler service.

oval:org.secpod.oval:def:18394
This setting determines the behavior for inbound connections that do not match an inbound firewall rule.

oval:org.secpod.oval:def:18482
This service manages events and event logs.

oval:org.secpod.oval:def:18267
Setting displays notifications to the user when a program is blocked from receiving inbound connections.

oval:org.secpod.oval:def:18492
The 'MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)' setting should be configured correctly.

oval:org.secpod.oval:def:18472
This policy setting allows users who do not have the special "Traverse Folder" access permission to "pass through" folders when they browse an object path in the NTFS file system or the registry.

oval:org.secpod.oval:def:18341
This policy setting allows the administrator account to automatically log on to the recovery console when it is invoked during startup.

oval:org.secpod.oval:def:18420
The registry value entry AutoAdminLogon was added to the template file in the HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ registry key

oval:org.secpod.oval:def:18244
Control Event Log behavior when the log file reaches its maximum size for System (KB)

oval:org.secpod.oval:def:18219
This policy setting determines whether the LDAP server requires a signature before it will negotiate with LDAP clients.

oval:org.secpod.oval:def:18497
Default behavior for AutoRun

oval:org.secpod.oval:def:18410
Provides Telephony API (TAPI) support for programs that control telephony devices on the local computer and, through the LAN, on servers that are also running the service.

oval:org.secpod.oval:def:18462
Maintains date and time synchronization on all clients and servers in the network.

oval:org.secpod.oval:def:18199
This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user.

oval:org.secpod.oval:def:18436
This policy setting allows a process to assume the identity of any user and thus gain access to the resources that the user is authorized to access.

oval:org.secpod.oval:def:18446
Controls whether computer receives unicast responses to its outgoing multicast or broadcast messages.

oval:org.secpod.oval:def:18329
This policy setting determines whether a domain member should attempt to negotiate encryption for all secure channel traffic that it initiates.

oval:org.secpod.oval:def:18192
This policy setting determines whether services can be launched in the context of the specified account.

oval:org.secpod.oval:def:18293
This policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account.

oval:org.secpod.oval:def:18276
This policy setting allows users to change the size of the pagefile.

oval:org.secpod.oval:def:18400
This setting determines the behavior for inbound connections that do not match an inbound firewall rule. The default behavior is to block connections unless there are firewall rules to allow the connection.

oval:org.secpod.oval:def:18297
This policy setting determines what happens when the smart card for a logged on user is removed from the smart card reader.

oval:org.secpod.oval:def:18421
This setting determines the behavior for outbound connections that do not match an outbound firewall rule.

oval:org.secpod.oval:def:18183
This setting controls whether local administrators are allowed to create connection security rules that apply with other connection security rules enforced by Group Policy.

oval:org.secpod.oval:def:18371
This setting controls whether local administrators are allowed to create local firewall rules that apply together with firewall rules configured by Group Policy.

oval:org.secpod.oval:def:18230
This policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop.

oval:org.secpod.oval:def:18228
This is the setting that turns on or off UAC. Disabling this setting effectively disables UAC.

oval:org.secpod.oval:def:18302
This policy setting prohibits users from connecting to a computer from across the network, which would allow users to access and potentially modify data remotely.

oval:org.secpod.oval:def:18364
This is an advanced security setting for the Windows Firewall that you can use to allow unicast responses on computers running Windows Vista or later.

oval:org.secpod.oval:def:18445
The entry appears as MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning in the SCE.

oval:org.secpod.oval:def:18236
This policy setting determines if the server side SMB service is required to perform SMB packet signing.

oval:org.secpod.oval:def:18366
This policy setting determines the strength of the default discretionary access control list (DACL) for objects.

oval:org.secpod.oval:def:18221
Manages the RPC name service database.

oval:org.secpod.oval:def:18470
Serves as the endpoint mapper and COM Service Control Manager.

oval:org.secpod.oval:def:18278
This policy setting determines whether the system shuts down if it is unable to log Security events.

oval:org.secpod.oval:def:18342
The policy setting allows programs that run on behalf of a user to impersonate that user (or another specified account) so that they can act on behalf of the user.

oval:org.secpod.oval:def:18214
This setting determines the behavior for inbound connections that do not match an inbound firewall rule. The default behavior is to block connections unless there are firewall rules to allow the connection.

oval:org.secpod.oval:def:18499
Enables starting processes under alternate credentials. If this service is stopped, this type of logon access will be unavailable.

oval:org.secpod.oval:def:18279
Registers and updates IP addresses and DNS records for this computer.

oval:org.secpod.oval:def:18262
This setting enables the prevention of the execution of unsigned or invalidated applications. Before enabling this setting, it is essential that administrators are certain that all required applications are signed and valid.

oval:org.secpod.oval:def:18384
This setting controls whether local administrators are allowed to create connection security rules that apply together with connection security rules configured by Group Policy.

oval:org.secpod.oval:def:18281
The "Require a Password When a Computer Wakes (On Battery)" machine setting should be configured correctly.

oval:org.secpod.oval:def:18215
This policy setting determines which users who are logged on locally can use the Shut Down command to shut down the operating system.

oval:org.secpod.oval:def:18252
Manages software-based volume shadow copies taken by the Volume Shadow Copy service.

oval:org.secpod.oval:def:18327
This policy setting determines which users or groups have the right to log on as a Terminal Services client.

oval:org.secpod.oval:def:18440
The DNS Client service (dnscache) caches Domain Name System (DNS) names and registers the full computer name for this computer.

oval:org.secpod.oval:def:18196
Provides support for the NetBIOS over TCP/IP (NetBT) service and NetBIOS name resolution for clients on the network, therefore enabling users to share files, print, and log on to the network.

oval:org.secpod.oval:def:18474
Provides support for 3rd party protocol plug-ins for Internet Connection Sharing

oval:org.secpod.oval:def:18220
Enables remote users to modify registry settings on this computer.

oval:org.secpod.oval:def:18205
Provides user experience theme management.

oval:org.secpod.oval:def:18264
This setting determines the behavior for outbound connections that do not match an outbound firewall rule. If Outbound connections are set to Block and deploy the firewall policy by using a GPO, cannot receive subsequent Group Policy updates.

oval:org.secpod.oval:def:18249
Allows users to connect interactively to a remote computer.

oval:org.secpod.oval:def:18346
This policy setting controls the behavior of application installation detection for the computer.

oval:org.secpod.oval:def:18311
Specify the maximum log file size for Application (KB)

oval:org.secpod.oval:def:18186
Supports file, print, and named-pipe sharing over the network for this computer.

oval:org.secpod.oval:def:18355
Specify the maximum log file size for Security (KB)

oval:org.secpod.oval:def:18496
This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system.

oval:org.secpod.oval:def:18282
Coordinates transactions that span multiple resource managers, such as databases, message queues, and file systems.

oval:org.secpod.oval:def:18350
This policy setting determines which users can create symbolic links.

oval:org.secpod.oval:def:18344
Creates a connection to a remote network whenever a program references a remote DNS or NetBIOS name or address.

oval:org.secpod.oval:def:18437
Maintains a secure channel between this computer and the domain controller for authenticating users and services.

oval:org.secpod.oval:def:18448
This policy setting determines whether the virtual memory pagefile is cleared when the system is shut down.

oval:org.secpod.oval:def:18377
Monitors system events and notifies subscribers to COM+ Event System of these events.

oval:org.secpod.oval:def:18464
This policy setting determines which accounts will not be able to log on to the computer as a batch job.

oval:org.secpod.oval:def:18473
This policy setting makes the Recovery Console SET command available.

oval:org.secpod.oval:def:18328
Specify the maximum log file size for System (KB)

oval:org.secpod.oval:def:18367
This setting controls whether local administrators are allowed to create local firewall rules that apply together with firewall rules configured by Group Policy.

oval:org.secpod.oval:def:18423
This policy setting determines whether digital certificates are processed when software restriction policies are enabled and a user or process attempts to run software with an .exe file name extension.

oval:org.secpod.oval:def:18415
Select this option to have Windows Firewall with Advanced Security display notifications to the user when a program is blocked from receiving inbound connections.

oval:org.secpod.oval:def:18467
This policy setting determines which users can interactively log on to computers in your environment.

oval:org.secpod.oval:def:18247
Manages audio for Windows-based programs.

oval:org.secpod.oval:def:18444
This policy setting determines whether a computer can be shut down when a user is not logged on.

oval:org.secpod.oval:def:18413
Maintains links between NTFS files within a computer or across computers in a network.

oval:org.secpod.oval:def:18290
This policy setting determines which users or processes can generate audit records in the Security log.

oval:org.secpod.oval:def:18310
This policy setting determines whether a user can log on to a Windows domain using cached account information.

oval:org.secpod.oval:def:18338
This security setting determines which users are prevented from logging on at the computer.

oval:org.secpod.oval:def:18260
This policy setting controls the behavior of the elevation prompt for administrators on computers running Windows 7, Windows Server 2008 R2, and later versions of Windows.

oval:org.secpod.oval:def:18237
This policy setting allows users to create directory objects in the object manager.

oval:org.secpod.oval:def:18253
This policy setting allows a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk.

oval:org.secpod.oval:def:18485
This policy setting allows users to circumvent file and directory permissions to back up the system.

oval:org.secpod.oval:def:18348
This policy setting controls the behavior of the elevation prompt for standard users on computers running Windows 7, Windows Server 2008 R2, and later versions of Windows.

oval:org.secpod.oval:def:18391
This policy setting allows users to dynamically load a new device driver on a system.

oval:org.secpod.oval:def:18352
This policy setting allows one process or service to start another service or process with a different security access token, which can be used to modify the security access token of that sub-process and result in the escalation of privileges.

oval:org.secpod.oval:def:18439
This policy setting allows users to manage the system's volume or disk configuration, which could allow a user to delete a volume and cause data loss as well as a denial-of-service condition.

oval:org.secpod.oval:def:18471
This policy setting allows users to change the Trusted for Delegation setting on a computer object in Active Directory.

oval:org.secpod.oval:def:18465
This policy setting determines who is allowed to format and eject removable media.

oval:org.secpod.oval:def:18268
Always install with elevated privileges

oval:org.secpod.oval:def:18340
This policy setting determines whether all secure channel traffic that is initiated by the domain member must be signed or encrypted.

oval:org.secpod.oval:def:18396
This policy setting determines whether a domain member should attempt to negotiate whether all secure channel traffic that it initiates must be digitally signed.

oval:org.secpod.oval:def:5645
Verify that all users are assigned a unique ID for access to system components or cardholder data and also verify that users are authenticated using unique ID and additional authentication (for example, a password) for access to the cardholder data environment.

oval:org.secpod.oval:def:5646
Verify that inactive accounts over 90 days old are either removed or disabled.

oval:org.secpod.oval:def:5017
Malicious software, commonly referred to as malware including viruses, worms, and Trojans enters the network during many business-approved activities including employee e-mail and use of the Internet, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Ant ...

oval:org.secpod.oval:def:5019
Malicious software, commonly referred to as malware including viruses, worms, and Trojans enters the network during many business-approved activities including employee e-mail and use of the Internet, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Ant ...

oval:org.secpod.oval:def:5025
If virtualization technologies are used, verify that only one primary function is implemented per virtual system component or device.

oval:org.secpod.oval:def:5024
Implement only one primary function per server to prevent functions that require different security levels from co-existing on the same server. (For example, web servers, database servers, and DNS should be implemented on separate servers.)

oval:org.secpod.oval:def:5021
Malicious software, commonly referred to as malware including viruses, worms, and Trojans enters the network during many business-approved activities including employee e-mail and use of the Internet, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Ant ...

oval:org.secpod.oval:def:18385
This policy setting determines whether the SMB client will attempt to negotiate SMB packet signing.

oval:org.secpod.oval:def:18321
This policy setting determines if the server side SMB service is able to sign SMB packets if it is requested to do so by a client that attempts to establish a connection.

oval:org.secpod.oval:def:18248
This policy setting determines what additional permissions are assigned for anonymous connections to the computer

oval:org.secpod.oval:def:18409
Determines whether case insensitivity is enforced for all subsystems. Example is case insensitivity for other subsystems, such as the Portable Operating System Interface for UNIX (POSIX) which are normally case sensitive.

oval:org.secpod.oval:def:18495
The 'Network access: Named Pipes that can be accessed anonymously' setting should be configured correctly.

oval:org.secpod.oval:def:18481
Select On to allow Windows Firewall to filter network traffic. Select Off to prevent Windows Firewall from using any firewall rules or connection security rules for this profile.

oval:org.secpod.oval:def:18191
This policy setting controls the ability of anonymous users to enumerate the accounts in the Security Accounts Manager (SAM).

oval:org.secpod.oval:def:18469
This policy setting determines the level of data signing that is requested on behalf of clients that issue LDAP BIND requests.

oval:org.secpod.oval:def:18430
This policy setting determines whether packet signing is required by the SMB client component.

oval:org.secpod.oval:def:18223
Windows Firewall with Advanced Security uses the settings for this profile to filter network traffic.

oval:org.secpod.oval:def:18388
This policy setting determines whether the account name of the last user to log on to the client computers in your organization will be displayed in each computer's respective Windows logon screen.

oval:org.secpod.oval:def:18509
This policy setting allows users to take ownership of files, folders, registry keys, processes, or threads. This user right bypasses any permissions that are in place to protect objects and give ownership to the specified user.

oval:org.secpod.oval:def:18501
This policy setting determines which users can bypass file, directory, registry, and other persistent object permissions when restoring backed up files and directories.

oval:org.secpod.oval:def:18505
This policy setting allows users to configure the system-wide environment variables that affect hardware configuration. This information is typically stored in the Last Known Good Configuration.

oval:org.secpod.oval:def:18307
This policy setting allows administrators to enable the more precise auditing capabilities present in Windows Vista. Uses subcategory setting to override audit policy categories.

oval:org.secpod.oval:def:18390
This policy setting controls the ability of anonymous users to enumerate SAM accounts as well as shares.

oval:org.secpod.oval:def:10925
The entry appears as MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended) in the SCE.

oval:org.secpod.oval:def:10926
This policy setting determines whether the LAN Manager (LM) hash value for the new password is stored when the password is changed.

oval:org.secpod.oval:def:10927
Network security: Minimum session security for NTLM SSP based (including secure RPC) client applications.

oval:org.secpod.oval:def:10928
Network security: Minimum session security for NTLM SSP based (including secure RPC) server applications.

oval:org.secpod.oval:def:10921
Disable this policy setting to prevent the SMB redirector from sending plaintext passwords during authentication to third-party SMB servers that do not support password encryption.

oval:org.secpod.oval:def:10922
This policy setting allows you to specify the amount of continuous idle time that must pass in an SMB session before the session is suspended because of inactivity.

oval:org.secpod.oval:def:18512
This setting determines the behavior for outbound connections that do not match an outbound firewall rule. If Outbound connections are set to Block and deploy the firewall policy by using a GPO, cannot receive subsequent Group Policy updates.

oval:org.secpod.oval:def:18515
When this policy setting is enabled, a domain controller must authenticate the domain account used to unlock the computer.

oval:org.secpod.oval:def:18526
When this setting is configured to Enabled, users are not required to use the CTRL+ALT+DEL key combination to log on to the network.

oval:org.secpod.oval:def:18525
Provides a common interface and object model to access management information about operating system, devices, applications and services.

oval:org.secpod.oval:def:10915
The "Domain member: Disable machine account password changes" setting should be configured correctly.

oval:org.secpod.oval:def:10917
The "Domain member: Require strong (Windows 2000 or later) session key" setting should be configured correctly.

oval:org.secpod.oval:def:10919
The "Interactive logon: Prompt user to change password before expiration" setting should be configured correctly

oval:org.secpod.oval:def:10913
The "Accounts: Limit local account use of blank passwords to console logon only" setting should be configured correctly.

oval:org.secpod.oval:def:18500
This policy setting allows Local System services that use Negotiate to use the computer identity when reverting to NTLM authentication.

oval:org.secpod.oval:def:18506
This setting controls whether local administrators are allowed to create connection security rules that apply with other connection security rules enforced by Group Policy.

oval:org.secpod.oval:def:18504
Allow NTLM to fall back to NULL session when used with LocalSystem.

CPE    1
cpe:/o:microsoft:windows_server_2012:-
CCE    174
CCE-24863-3
CCE-24639-7
CCE-23587-9
CCE-24134-9
...
*XCCDF
xccdf_org.secpod_benchmark_PCI_Windows_2012

© SecPod Technologies