|Paid content will be excluded from the download.
| Matches : 23631
|Audit Policy: Detailed Tracking: RPC Events
This subcategory reports remote procedure call (RPC) connection events. Events for this subcategory include:
? 5712: A Remote Procedure Call (RPC) was attempted.
Refer to the Microsoft Knowledgebase article ?Description of security events in Windows Vista and in Windows Server 2008? for the most recent information about this setting: http://support.mic ...
Network access: Let Everyone permissions apply to anonymous users
This policy setting determines what additional permissions are assigned for anonymous connections to the computer. If you enable this policy setting, anonymous Windows users are allowed to perform certain activities, such as enumerate the names of domain accounts and network shares. An unauthorized user could anonymously list accou ...
Control Event Log behavior when the log file reaches its maximum size
This policy setting controls Event Log behavior when the log file reaches its maximum size.
If you enable this policy setting and a log file reaches its maximum size, new events are not written to the log and are lost.
If you disable or do not configure this policy setting and a log file reaches its maximum size, new even ...
Network security: LAN Manager authentication level
LAN Manager (LM) is a family of early Microsoft client/server software that allows users to link personal computers together on a single network. Network capabilities include transparent file and print sharing, user security features, and network administration tools. In Active Directory domains, the Kerberos protocol is the default authenticatio ...
Interactive logon: Machine account lockout threshold
The machine lockout policy is enforced only on those machines that have Bitlocker enabled for protecting OS volumes. Please ensure that appropriate recovery password backup policies are enabled.
This security setting determines the number of failed logon attempts that causes the machine to be locked out. A locked out machine can only be recove ...
Audit Policy: Logon-Logoff: Special Logon
This subcategory reports when a special logon is used. A special logon is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level. Events for this subcategory include:
? 4964 : Special groups have been assigned to a new logon.
Refer to the Microsoft Knowledgebase article ?Description of security events i ...
Audit Policy: Privilege Use: Sensitive Privilege Use
This subcategory reports when a user account or service uses a sensitive privilege. A sensitive privilege includes the following user rights: Act as part of the operating system, Back up files and directories, Create a token object, Debug programs, Enable computer and user accounts to be trusted for delegation, Generate security audits, Impers ...
Network security: Force logoff when logon hours expire
This policy setting, which determines whether to disconnect users who are connected to the local computer outside their user account?s valid logon hours, affects the SMB component. If you enable this policy setting, client sessions with the SMB server will be disconnected when the client?s logon hours expire. If you disable this policy settin ...
Store passwords using reversible encryption
This policy setting determines whether the operating system stores passwords in a way that uses reversible encryption, which provides support for application protocols that require knowledge of the user's password for authentication purposes. Passwords that are stored with reversible encryption are essentially the same as plaintext versions of the passw ...
Network access: Do not allow anonymous enumeration of SAM accounts
This policy setting controls the ability of anonymous users to enumerate the accounts in the Security Accounts Manager (SAM). If you enable this policy setting, users with anonymous connections cannot enumerate domain account user names on the workstations in your environment. This policy setting also allows additional restriction ...
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2363
© 2013 SecPod Technologies