[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 30475 Download | Alert*

Lsass.exe audit mode You can configure this setting to enable the auditing of Lsass.exe so that you can evaluate feasibility of enabling LSA protection. You can use the audit mode to identify LSA plug-ins and drivers that will fail to load in LSA Protection mode. While in the audit mode, the system will generate event logs, identifying all of the plug-ins and drivers that will fail to load under ...

Always send compound authentication first This policy setting controls whether a device always sends a compound authentication request when the resource domain requests compound identity. Note: For a domain controller to request compound authentication, the policies 'KDC support for claims, compound authentication, and Kerberos armoring' and 'Request compound authentication' must be configured ...

Prevent OneDrive files from syncing over metered connections This policy setting allows configuration of OneDrive file sync behavior on metered connections. If you enable this setting, OneDrive will not sync files over metered connections If you disable or do not configure this setting, OneDrive will sync files over metered connections

Turn on protocol recognition This policy setting allows you to configure protocol recognition for network protection against exploits of known vulnerabilities. If you enable or do not configure this setting, protocol recognition will be enabled. If you disable this setting, protocol recognition will be disabled.

The "Disable the Advanced Page" setting should be configured correctly.

Configure Watson events This policy setting allows you to configure whether or not Watson events are sent. If you enable or do not configure this setting, Watson events will be sent. If you disable this setting, Watson events will not be sent.

Turn on heuristics This policy setting allows you to configure heuristics. Suspicious detections will be suppressed right before reporting to the engine client. Turning off heuristics will reduce the capability to flag new threats. It is recommended that you do not turn off heuristics. If you enable or do not configure this setting, heuristics will be enabled. If you disable this setting, h ...

The "Logon" setting should be configured correctly for the Restricted Sites Zone.

Turn on removal of items from scan history folder This policy setting defines the number of days items should be kept in the scan history folder before being permanently removed. The value represents the number of days to keep items in the folder. If set to zero, items will be kept forever and will not be automatically removed. By default, the value is set to 30 days. If you enable this settin ...

The required permissions for the directory %SystemDrive%\Documents and Settings\Default User should be assigned.


Pages:      Start    2485    2486    2487    2488    2489    2490    2491    2492    2493    2494    2495    2496    2497    2498    ..   3047

© SecPod Technologies