[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

This policy setting determines whether the operating system stores passwords in a way that uses reversible encryption, which provides support for application protocols that require knowledge of the user's password for authentication purposes. Passwords that are stored with reversible encryption are essentially the same as plaintext versions of the passwords. This policy setting determine ...

This subcategory reports when a file share is accessed. By itself, this policy setting will not cause auditing of any events. It determines whether to audit the event of a user who accesses a file share object that has a specified system access control list (SACL), effectively enabling auditing to take place. A SACL is comprised of access control entries (ACEs). Each ACE contains three pieces of ...

This subcategory reports other object access-related events such as Task Scheduler jobs and COM+ objects. Events for this subcategory include: ? 4671: An application attempted to access a blocked ordinal through the TBS. ? 4691: Indirect access to an object was requested. ? 4698: A scheduled task was created. ? 4699 : A scheduled task was deleted. ? 4700 : A scheduled task was enabled. ? 4701: A s ...

This subcategory reports changes in policy rules used by the Microsoft Protection Service (MPSSVC.exe). This service is used by Windows Firewall and by Microsoft OneCare. Events for this subcategory include: ? 4944: The following policy was active when the Windows Firewall started. ? 4945: A rule was listed when the Windows Firewall started. ? 4946: A change has been made to Windows Firewall excep ...

This subcategory reports when replication between two domain controllers begins and ends. Events for this subcategory include: ? 4932: Synchronization of a replica of an Active Directory naming context has begun. ? 4933: Synchronization of a replica of an Active Directory naming context has ended. Refer to the Microsoft Knowledgebase article ?Description of security events in Windows Vista and in ...

This subcategory reports the results of AuthIP during Extended Mode negotiations. Events for this subcategory include: ? 4978: During Extended Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation. ? 4979: IPsec Main Mode and Extended Mode security associations were established. ...

This subcategory reports changes in authorization policy including permissions (DACL) changes. Events for this subcategory include: ? 4704: A user right was assigned. ? 4705: A user right was removed. ? 4706: A new trust was created to a domain. ? 4707: A trust to a domain was removed. ? 4714: Encrypted data recovery policy was changed. Refer to the Microsoft Knowledgebase article ?Description of ...

This subcategory reports when SAM objects are accessed. Refer to the Microsoft Knowledgebase article ?Description of security events in Windows Vista and in Windows Server 2008? for the most recent information about this setting: http://support.microsoft.com/default.aspx/kb/947226. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit P ...

This subcategory reports when file system objects are accessed. Only file system objects with SACLs cause audit events to be generated, and only when they are accessed in a manner matching their SACL. By itself, this policy setting will not cause auditing of any events. It determines whether to audit the event of a user who accesses a file system object that has a specified system access control l ...

This subcategory reports the events that occur in response to credentials submitted for a user account logon request that do not relate to credential validation or Kerberos tickets. These events occur on the computer that is authoritative for the credentials. For domain accounts, the domain controller is authoritative, whereas for local accounts, the local computer is authoritative. In domain envi ...


Pages:      Start    19378    19379    19380    19381    19382    19383    19384    19385    19386    19387    19388    19389    19390    19391    ..   19779

© SecPod Technologies