|Paid content will be excluded from the download.
| Matches : 23631
|Ensure No Auditing for 'Audit Policy: Object Access: Other Object Access Events'
This subcategory reports other object access-related events such as Task Scheduler jobs and COM+ objects. Events for this subcategory include:
- 4671: An application attempted to access a blocked ordinal through the TBS.
- 4691: Indirect access to an object was requested.
- 4698: A scheduled task was cr ...
Disable: 'MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)' for TcpMaxDataRetransmissions
MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)
Configure the MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 ...
Disable: 'Domain member: Digitally encrypt or sign secure channel data (always)' for requiresignorseal
This policy setting determines whether all secure channel traffic that is initiated by the domain member must be signed or encrypted. If a system is set to always encrypt or sign secure channel data, it cannot establish a secure channel with a domain controller that is not capable of signing or ...
Disable: 'System cryptography: Force strong key protection for user keys stored on the computer' for ForceKeyProtection
This policy setting determines whether users' private keys (such as their S-MIME keys) require a password to be used. If you configure this policy setting so that users must provide a password-distinct from their domain password-every time that they use a key, then it will be mo ...
Increase scheduling priority
This policy setting determines whether users can increase the base priority class of a process. (It is not a privileged operation to increase relative priority within a priority class.) This user right is not required by administrative tools that are supplied with the operating system but might be required by software development tools.
When configuring a user right ...
Disable: 'Allow users to connect remotely by using Remote Desktop Services'
This policy setting allows you to configure remote access to computers by using Remote Desktop Services.
If you enable this policy setting, users who are members of the Remote Desktop Users group on the target computer can connect remotely to the target computer by using Remote Desktop Services.
If you disable thi ...
Disable: 'Domain member: Digitally sign secure channel data (when possible)' for signsecurechannel
This policy setting determines whether a domain member should attempt to negotiate whether all secure channel traffic that it initiates must be digitally signed. Digital signatures protect the traffic from being modified by anyone who captures the data as it traverses the network.
Microsoft reco ...
Disable: 'Allow Standby States (S1-S3) When Sleeping (On Battery)'
Dictates whether or not Windows is allowed to use standby states when sleeping the computer.
When this policy is enabled, Windows may use standby states to sleep the computer. If this policy is disabled, the only sleep state a computer may enter is hibernate.
During hibernation, system power st ...
'Choose default folder for recovery password (DefaultRecoveryFolderPath)'
This policy setting allows you to specify the default path that is displayed when the BitLocker Drive Encryption setup wizard prompts the user to enter the location of a folder in which to save the recovery password. This policy setting is applied when you turn on BitLocker.
If you enable this policy setting, you can sp ...
Ensure No Auditing for 'Audit Policy: Logon-Logoff: Logon'
This subcategory reports when a user attempts to log on to the system. These events occur on the accessed computer. For interactive logons, the generation of these events occurs on the computer that is logged on to. If a network logon takes place to access a share, these events generate on the computer that hosts the accessed resource. If ...
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2363
© 2016 SecPod Technologies