|Paid content will be excluded from the download.
| Matches : 23631
|Audit Policy: Object Access: File System
This subcategory reports when file system objects are accessed. Only file system objects with SACLs cause audit events to be generated, and only when they are accessed in a manner matching their SACL. By itself, this policy setting will not cause auditing of any events. It determines whether to audit the event of a user who accesses a file system object th ...
Domain member: Maximum machine account password age
This policy setting determines the maximum allowable age for a computer account password. By default, domain members automatically change their domain passwords every 30 days. If you increase this interval significantly or set it to 0 so that the computers no longer change their passwords, an attacker would have more time to undertake a brute fo ...
Accounts: Guest account status
This policy setting determines whether the Guest account is enabled or disabled. The Guest account allows unauthenticated network users to gain access to the system. Note that this setting will have no impact when applied to the domain controller organizational unit via group policy because domain controllers have no local account database. It can be configured at t ...
Audit Policy: Logon-Logoff: IPsec Main Mode
This subcategory reports the results of Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations. Events for this subcategory include:
? 4646: IKE DoS-prevention mode started.
? 4650: An IPsec Main Mode security association was established. Extended Mode was not enabled. Certificate authentication w ...
Audit Policy: Object Access: Kernel Object
This subcategory reports when kernel objects such as processes and mutexes are accessed. Only kernel objects with SACLs cause audit events to be generated, and only when they are accessed in a manner matching their SACL. Typically kernel objects are only given SACLs if the AuditBaseObjects or AuditBaseDirectories auditing options are enabled.
Refer to th ...
Prevent Codec Download
This policy setting allows you to prevent Windows Media Player from downloading codecs.
If you enable this policy setting, the Player is prevented from automatically downloading codecs to your computer. In addition, the Download codecs automatically check box on the Player tab in the Player is not available.
If you disable this policy setting, codecs are automatically ...
Audit Policy: Object Access: Handle Manipulation
This subcategory reports when a handle to an object is opened or closed. Only objects with SACLs cause these events to be generated, and only if the attempted handle operation matches the SACL. Handle Manipulation events are only generated for object types where the corresponding Object Access subcategory is enabled, for example File System or Regi ...
Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
This policy setting determines which behaviors are allowed for applications using the NTLM Security Support Provider (SSP). The SSP Interface (SSPI) is used by applications that need authentication services. The setting does not modify how the authentication sequence works but instead require certain beha ...
Configure log access
This policy setting specifies to use the security descriptor for the log using the Security Descriptor Definition Language (SDDL) string.
If you enable this policy setting, only those users matching the security descriptor can access the log.
If you disable or do not configure this policy setting, all authenticated users and system services can write, read, or clear th ...
Require secure RPC communication
Specifies whether a Remote Desktop Session Host server requires secure RPC communication with all clients or allows unsecured communication.
You can use this setting to strengthen the security of RPC communication with clients by allowing only authenticated and encrypted requests.
If the status is set to Enabled, Remote Desktop Services accepts requests from RPC ...
Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   2363
© 2013 SecPod Technologies