[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 193578 Download | Alert*

The Limit the maximum number of BITS jobs for each user machine setting should be configured correctly. This policy setting limits the number of BITS jobs that can be created by a user. By default, BITS limits the total number of jobs that can be created by a user to 60 jobs. You can use this setting to raise or lower the maximum number of BITS jobs a user can create. If you enable this setting, ...

Receives activation requests over the net.tcp protocol and passes them to WPAS. .net framework 3.0 & Windows Process Activation Service. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\System Services!Net.Tcp Listener Adapter (2) REG: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\nettcpactivator!Start

Mail Transfer Agents (MTA), such as sendmail and Postfix, are used to listen for incoming mail and transfer the messages to the appropriate user or mail server. If the system is not intended to be a mail server, it is recommended that the MTA be configured to only process local mail.

admin_space_left_action setting in /etc/audit/auditd.conf is set to a certain action

admin_space_left_action setting in /etc/audit/auditd.conf is set to a certain action

The changing of file permissions and attributes should be audited.

The kernel module usb-storage should be disabled.

This policy setting allows you to specify whether users can run unsigned Remote Desktop Protocol (.rdp) files and .rdp files from unknown publishers on the client computer. If you enable or do not configure this policy setting, users can run unsigned .rdp files and .rdp files from unknown publishers on the client computer. Before a user starts an RDP session, the user receives a warning message a ...

Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. One method of minimizing this risk is to use complex passwords and periodically change them. If the operating system does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the operating system passwords could be compromised.

rsyslogd should reject remote messages


Pages:      Start    11929    11930    11931    11932    11933    11934    11935    11936    11937    11938    11939    11940    11941    11942    ..   19357

© SecPod Technologies