[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 193626 Download | Alert*

The permissions of csh init files must be 644 or as appropriate. Use the command chmod 644 /etc/csh.cshrc /etc/csh.login /etc/csh.logout to set permissions of csh init files or as appropriate.

This policy setting allows you to configure the encryption type used by BitLocker Drive Encryption. This policy setting is applied when you turn on BitLocker. Changing the encryption type has no effect if the drive is already encrypted or if encryption is in progress. Choose full encryption to require that the entire drive be encrypted when BitLocker is turned on. Choose used space only encryption ...

Support for device authentication using certificate will require connectivity to a DC in the device account domain which supports certificate authentication for computer accounts. This policy setting allows you to set support for Kerberos to attempt authentication using the certificate for the device to the domain. If you enable this policy setting, the devices credentials will be selected base ...

The changing of file permissions and attributes should be audited.

Disabling heap termination on corruption can allow certain legacy plug-in applications to function without terminating Explorer immediately, although Explorer may still terminate unexpectedly later. Fix: (1) GPO: Computer Configuration\Administrative Templates\Windows Components\Windows Explorer\Turn off heap termination on corruption (2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Wind ...

Use this option to log when Windows Firewall with Advanced Security allows an inbound connection. The log records why and when the connection was formed. Look for entries with the word ALLOW in the action column of the log. Counter Measure: Configure this policy setting to Yes. Potential Impact: Information about successful connections will be recorded in the firewall log file Fix: (1 ...

Ensure only strong MAC algorithms are used

Ensure only strong MAC algorithms are used

Ensure only strong MAC algorithms are used

Ensure only strong MAC algorithms are used


Pages:      Start    11965    11966    11967    11968    11969    11970    11971    11972    11973    11974    11975    11976    11977    11978    ..   19362

© SecPod Technologies