[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256369

 
 

909

 
 

199183

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 198298 Download | Alert*

This setting allows you to configure whether power is automatically turned off when Windows shutdown completes. This setting does not effect Windows shutdown behavior when shutdown is manually selected using the Start menu or Task Manager user interfaces. Applications such as UPS software may rely on Windows shutdown behavior. This setting is only applicable when Windows shutdown is initiated by ...

This policy setting allows you specify a list of file types that should be excluded from scheduled, custom, and real-time scanning. File types should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of the file type extension (such as obj or lib). The value is not used and it is recommended that this be se ...

The SSH Version should be explicity set to Version 2. Version 2 supports strong crypto and was rewritten from scratch to resolve several weaknesses in Version 1 that make it extremely vulnerable to attackers. The weaker crypto in Version 1 is potentially susceptible to certain forms of replay attacks. The system default is to only enable Version 2. A replay attack may enable an unauthorized user t ...

This policy setting allows you to manage whether the Install Updates and Shut Down option is allowed to be the default choice in the Shut Down Windows dialog. Note: that this policy setting has no impact if the Computer Configuration\Administrative Templates\Windows Components\Windows Update\Do not display Install Updates and Shut Down option in Shut Down Windows dialog box policy setting is enabl ...

Preventing direct root login to serial port interfaces helps ensure accountability for actions taken on the system using the root account.

Preventing direct root login to serial port interfaces helps ensure accountability for actions taken on the system using the root account.

Audit rules about the Unauthorized Access Attempts to Files (unsuccessful) are enabled

Audit rules about the Unauthorized Access Attempts to Files (unsuccessful) are enabled

The owner of 'csh init' files must be root or as appropriate. Use the command chown root /etc/csh.cshrc /etc/csh.login /etc/csh.logout to change the owner as appropriate.

The /etc/shadow file contains the one-way cipher text passwords for each user defined in the /etc/passwd file. The command below sets the user and group ownership of the file to root.


Pages:      Start    12048    12049    12050    12051    12052    12053    12054    12055    12056    12057    12058    12059    12060    12061    ..   19829

© SecPod Technologies