[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194074 Download | Alert*

Enables a computer to recognize and adapt to hardware changes with little or no user input. Stopping or disabling this service will result in system instability. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\System Services!Plug and Play (2) REG: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PlugPlay!Start

Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident, or identify those responsible for one. DoD has defined the list of events for which the operating system will provide an audit record generation capability as the following: (i) Successful and unsuccessful attempts to access, modify, or delete privile ...

The kernel extension for Wi-Fi network devices such as Airport must be removed to ensure that users will not be able to reactivate wireless networking at a later time. System updates will sometimes replace deleted kernel extensions. Administrator users may need to periodically check to ensure that the file remains deleted. Alternately, the wireless card hardware may be removed from the system.

This policy setting allows user logon scripts to run when the logon cross-forest, DNS suffixes are not configured and NetBIOS or WINS is disabled. This policy setting affects all user accounts interactively logging on to the computer. If you enable this policy setting, user logon scripts will run if NetBIOS or WINS is disabled during cross-forest logons without the DNS suffixes being configured. ...

The changing of file permissions and attributes should be audited.

Administrator users must never log in directly as root. To assure individual accountability and prevent unauthorized access, logging in as root over a remote connection must be disabled. Administrators should only run commands as root after first authenticating with their individual user names and passwords.

The audit service should shut down the computer if it is unable to audit system events. Once audit failure occurs, user and system activity is no longer recorded and malicious activity could go undetected. Audit processing failures include: software/hardware errors; failures in the audit capturing mechanisms; and audit storage capacity being reached or exceeded. Responses to audit failure depend u ...

Auditing of 'DS Access: Directory Service Changes' events on failure should be enabled or disabled as appropriate.

MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)

Check if SplitHosts line in logwatch.conf is set appropriately.


Pages:      Start    11695    11696    11697    11698    11699    11700    11701    11702    11703    11704    11705    11706    11707    11708    ..   19407

© SecPod Technologies