[Forgot Password]
Login  Register Subscribe

24547

 
 

132176

 
 

122448

 
 

909

 
 

100878

 
 

148

 
 
Paid content will be excluded from the download.

Filter
Matches : 24547 Download | Alert*

"Restore files and directories" This policy setting determines which users can bypass file, directory, registry, and other persistent object permissions when restoring backed up files and directories on computers that run Windows Vista in your environment. This user right also determines which users can set valid security principals as object owners; it is similar to the Back up files and directo ...

"Take ownership of files or other objects" This policy setting allows users to take ownership of files, folders, registry keys, processes, or threads. This user right bypasses any permissions that are in place to protect objects to give ownership to the specified user. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Ac ...

"Windows Firewall: Private: Firewall state" Select On (recommended) to have Windows Firewall with Advanced Security use the settings for this profile to filter network traffic. If you select Off, Windows Firewall with Advanced Security will not use any of the firewall rules or connection security rules for this profile. Vulnerability: If the firewall is turned off all traffic will be able t ...

"Microsoft network server: Digitally sign communications (if client agrees)" This policy setting determines if the server side SMB service is able to sign SMB packets if it is requested to do so by a client that attempts to establish a connection. If no signing request comes from the client, a connection will be allowed without a signature if the Microsoft network server: Digitally sign communica ...

"Microsoft network client: Digitally sign communications (if server agrees)" This policy setting determines whether the SMB client will attempt to negotiate SMB packet signing. The implementation of digital signing in Windows -based networks helps to prevent sessions from being hijacked. If you enable this policy setting, the Microsoft network client will use signing only if the server with which ...

"Network security: Allow Local System to use computer identity for NTLM" When enabled, this policy setting causes Local System services that use Negotiate to use the computer identity when NTLM authentication is selected by the negotiation. This policy is supported on at least Windows 7 or Windows Server 2008 R2. Vulnerability: When connecting to computers running versions of Windows earlie ...

"Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" This policy setting allows administrators to enable the more precise auditing capabilities present in Windows Vista. The Audit Policy settings available in Windows Server 2003 Active Directory do not yet contain settings for managing the new auditing subcategories. To properly app ...

"Network access: Let Everyone permissions apply to anonymous users" This policy setting determines what additional permissions are assigned for anonymous connections to the computer. If you enable this policy setting, anonymous Windows users are allowed to perform certain activities, such as enumerate the names of domain accounts and network shares. An unauthorized user could anonymously list acc ...

"Domain member: Digitally sign secure channel data (when possible)" This policy setting determines whether a domain member should attempt to negotiate whether all secure channel traffic that it initiates must be digitally signed. Digital signatures protect the traffic from being modified by anyone who captures the data as it traverses the network. Microsoft recommends to configure the Domain memb ...

"Windows Firewall: Domain: Outbound connections" This setting determines the behavior for outbound connections that do not match an outbound firewall rule. In Windows Vista, the default behavior is to allow connections unless there are firewall rules that block the connection. Vulnerability: Some people believe that it is prudent to block all outbound connections except those specifically a ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2454

© SecPod Technologies