[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 30477 Download | Alert*

Force specific screen saver This policy setting allows you to manage whether or not screen savers run. If the Screen Saver setting is disabled screen savers do not run and the screen saver section of the Screen Saver tab in Display in Control Panel is disabled. If this setting is enabled a screen saver will run if the following two conditions are met: first, that a valid screen saver is specified ...

The dynamic DNS feature of the DHCP server should be enabled or disabled as appropriate

Disable: 'Use Microsoft Passport' for Work Microsoft Passport for Work is an alternative method for signing into Windows using your Active Directory or Azure Active Directory account that can replace passwords, Smart Cards, and Virtual Smart Cards. If you enable or do not configure this policy setting, the device provisions Microsoft Passport for Work for all users. If you disable this po ...

The /var/named/chroot/etc/named.conf file should be owned by the appropriate user.

Disable: 'MSS: (SynAttackProtect) Syn attack protection level (protects against DoS)' MSS: (SynAttackProtect) Syn attack protection level (protects against DoS) Counter Measure: Enable and configure this setting. Potential Impact: TCP/IP traffic could be inaccurately detected as a Denial of Service (DoS) attack.

The "Enable Native XMLHttp Support" setting should be configured correctly.

Syslog logs should be sent to a remote loghost or not as appropriate

The "Disable Removing Channels" setting should be configured correctly.

The "Prevent IIS Installation" setting should be configured correctly.

Deny access to this computer from the network This policy setting prohibits users from connecting to a computer from across the network, which would allow users to access and potentially modify data remotely. In high security environments, there should be no need for remote users to access data on a computer. Instead, file sharing should be accomplished through the use of network servers. When c ...


Pages:      Start    2613    2614    2615    2616    2617    2618    2619    2620    2621    2622    2623    2624    2625    2626    ..   3047

© SecPod Technologies