|Paid content will be excluded from the download.
| Matches : 23631
|Audit Policy: Policy Change: Authorization Policy Change
This subcategory reports changes in authorization policy including permissions (DACL) changes. Events for this subcategory include:
? 4704: A user right was assigned.
? 4705: A user right was removed.
? 4706: A new trust was created to a domain.
? 4707: A trust to a domain was removed.
? 4714: Encrypted data recovery policy was changed.
Audit Policy: Logon-Logoff: Other Logon/Logoff Events
This subcategory reports other logon/logoff-related events, such as Terminal Services session disconnects and reconnects, using RunAs to run processes under a different account, and locking and unlocking a workstation. Events for this subcategory include:
? 4649: A replay attack was detected.
? 4778: A session was reconnected to a Window Stati ...
Microsoft network client: Digitally sign communications (always)
This policy setting determines whether packet signing is required by the SMB client component. If you enable this policy setting, the Microsoft network client computer cannot communicate with a Microsoft network server unless that server agrees to sign SMB packets. In mixed environments with legacy client computers, set this option ...
Network security: Do not store LAN Manager hash value on next password change
This policy setting determines whether the LAN Manager (LM) hash value for the new password is stored when the password is changed. The LM hash is relatively weak and prone to attack compared to the cryptographically stronger Microsoft Windows NT? hash.
Note Older operating systems and some third-party applications ma ...
System cryptography: Force strong key protection for user keys stored on the computer
This policy setting determines whether users' private keys (such as their S-MIME keys) require a password to be used. If you configure this policy setting so that users must provide a password?distinct from their domain password?every time that they use a key, then it will be more difficult for an attacker to ac ...
Allow users to connect remotely by using Remote Desktop Services
This policy setting allows you to configure remote access to computers by using Remote Desktop Services.
If you enable this policy setting, users who are members of the Remote Desktop Users group on the target computer can connect remotely to the target computer by using Remote Desktop Services.
If you disable this policy sett ...
Network access: Remotely accessible registry paths and sub-paths
This policy setting determines which registry paths and sub-paths will be accessible when an application or process references the WinReg key to determine access permissions.
Note: In Windows XP this setting is called 'Network access: Remotely accessible registry paths,' the setting with that same name in Windows Vista, Windows Serv ...
Turn off Data Execution Prevention for HTML Help Executible
This policy setting allows you to exclude HTML Help Executable from being monitored by software-enforced DEP.
DEP is designed to block malicious code that takes advantage of exception-handling mechanisms in Windows. If you enable this policy setting, DEP for HTML Help Executable will be turned off. This will allow certain leg ...
Require use of fast startup
This policy setting controls the use of fast startup.
If you enable this policy setting, the system requires hibernate to be enabled.
If you disable or do not configure this policy setting, the local setting is used.
User Account Control: Detect application installations and prompt for elevation
This policy setting controls the behavior of application installation detection for the computer.
The options are:
- Enabled: (Default for home) When an application installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the us ...
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2363
© 2013 SecPod Technologies