[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 193535 Download | Alert*

SSH's cryptographic host-based authentication is more secure than .rhosts authentication. However, it is not recommended that hosts unilaterally trust one another, even within an organization.

If inbound SSH access is not needed, the firewall should disallow or reject access to the SSH port (22).

SSH's cryptographic host-based authentication is more secure than .rhosts authentication. However, it is not recommended that hosts unilaterally trust one another, even within an organization.

This policy setting prohibits users from connecting to a computer from across the network, which would allow users to access and potentially modify data remotely. In high security environments, there should be no need for remote users to access data on a computer. Instead, file sharing should be accomplished through the use of network servers. When configuring a user right in the SCM enter a comm ...

Ensure Insecure File Locking is Not Allowed (/etc/exports) should be configured appropriately.

The WcsPlugInService service hosts third-party Windows Color System color device module and gamut map model plug-in modules. These plug-in modules are vendor-specific extensions to the Windows Color System baseline color device and gamut map modules. Stopping or disabling the WcsPlugInService service will disable this extensibility feature, and the Windows Color System will use its baseline model ...

The Public Profile is the default profile for a computer connected to a public network but not connected to a domain controller. This should be the most restricted profile. Default: Allow Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Public Profile\Windows Firewa ...

The /usr/sbin/traceroute file should not have an extended ACL. Use the chmod command to apply or remove the extended ACL permissions as appropriate.

The audit service must be configured to require that records are kept for 7 days or longer before deletion when there is no central audit record storage facility. When expire-after is set to 7d, the audit service will not delete audit logs until the log data is at least 7 days old.

Enables applications and services to prevent the system from sleeping. If you enable this policy setting, an application or service may prevent the system from sleeping (Hybrid Sleep, Stand By, or Hibernate). If you disable this policy setting or do not configure it, users can see and change this setting. Fix: (1) GPO: Computer Configuration\Administrative Templates\System\Power Management\Sle ...


Pages:      Start    11380    11381    11382    11383    11384    11385    11386    11387    11388    11389    11390    11391    11392    11393    ..   19353

© SecPod Technologies