[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255227

 
 

909

 
 

198741

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197856 Download | Alert*

Auditing of Object Access: Detailed File Share events on failure should be enabled or disabled as appropriate. Audit Detailed File Share, which allows you to audit attempts to access files and folders on a shared folder. The Detailed File Share setting logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established betwee ...

Auditing of Logon-Logoff: Logoff events on success should be enabled or disabled as appropriate. This subcategory reports when a user logs off from the system. These events occur on the accessed computer. For interactive logons, the generation of these events occurs on the computer that is logged on to. If a network logon takes place to access a share, these events generate on the computer that h ...

Auditing of Logon-Logoff: Logon events on success should be enabled or disabled as appropriate. This subcategory reports when a user attempts to log on to the system. These events occur on the accessed computer. For interactive logons, the generation of these events occurs on the computer that is logged on to. If a network logon takes place to access a share, these events generate on the computer ...

Auditing of Object Access: Application Generated events on success should be enabled or disabled as appropriate. This subcategory reports when applications attempt to generate audit events by using the Windows auditing application programming interfaces (APIs). Events for this subcategory include: - 4665: An attempt was made to create an application client context. - 4666: An application attempt ...

Auditing of Logon-Logoff: Logoff events on failure should be enabled or disabled as appropriate. Audit Logon, which determines whether the operating system generates audit events when a user attempts to log on to a computer. These events are related to the creation of logon sessions and occur on the computer that was accessed. For an interactive logon, events are generated on the computer that wa ...

Auditing of System: Other System Events events on failure should be enabled or disabled as appropriate. Audit Other System Events, which determines whether the operating system audits various system events. The system events in this category include: * Startup and shutdown of the Windows Firewall service and driver. * Security policy processing by the Windows Firewall service. * Cryptography key ...

Auditing of Object Access: Filtering Platform Packet Drop events on failure should be enabled or disabled as appropriate. This subcategory reports when packets are dropped by Windows Filtering Platform (WFP). These events can be very high in volume. Events for this subcategory include: - 5152: The Windows Filtering Platform blocked a packet. - 5153: A more restrictive Windows Filtering Platform ...

Auditing of Global Object Access Auditing: File System events on success should be enabled or disabled as appropriate. File System (Global Object Access Auditing), which enables you to configure a global system access control list (SACL) on the file system for an entire computer. If you select the Configure security check box on the policy's property page, you can add a user or group to the ...

Auditing of Policy Change: Authentication Policy Change events on success should be enabled or disabled as appropriate. This subcategory reports changes in authentication policy. Events for this subcategory include: - 4706: A new trust was created to a domain. - 4707: A trust to a domain was removed. - 4713: Kerberos policy was changed. - 4716: Trusted domain information was modified. - 4717: ...

Auditing of System: Security System Extension events on failure should be enabled or disabled as appropriate. Audit Security System Extension, which determines whether the operating system generates audit events related to security system extensions. Changes to security system extensions in the operating system include the following activities: * A security extension code is loaded (such as an au ...


Pages:      Start    19331    19332    19333    19334    19335    19336    19337    19338    19339    19340    19341    19342    19343    19344    ..   19785

© SecPod Technologies