[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 30426 Download | Alert*

The /etc/pki/tls/ldap/serverkey.pem file should be owned by the appropriate group.

Ensure No Auditing for 'Audit Policy: Policy Change: Filtering Platform Policy Change' This subcategory reports the addition and removal of objects from WFP, including startup filters. These events can be very high in volume. Events for this subcategory include: - 4709: IPsec Services was started. - 4710: IPsec Services was disabled. - 4711: May contain any one of the following: ...

Specify Work Folders settings This policy setting specifies the Work Folders server for affected users, as well as whether or not users are allowed to change settings when setting up Work Folders on a domain-joined computer. If you enable this policy setting, affected users user receive Work Folders settings when they sign in to a domain-joined PC. The 'Work Folders URL' can specify either the ...

Specify the 'Configure time out for detections in critically failed state' (CriticalFailureTimeout in mins Min:0 Max:4294967295) This policy setting configures the time in minutes before a detection in the "critically failed" state to moves to either the "additional action" state or the "cleared" state. Counter Measure: Configure this setting depending on your organization's requirements ...

The /etc/cron.monthly file should be owned by the appropriate group.

Search, Share, Start, Devices, and Settings don't appear when the mouse is pointing to the upper-right corner of the screen This policy setting allows you to prevent Search, Share, Start, Devices, and Settings from appearing when the mouse is pointing to the upper-right corner of the screen. If you enable this policy setting, Search, Share, Start, Devices, and Settings will no longer appear when ...

Turn off the Store application Denies or allows access to the Store application. If you enable this setting, access to the Store application is denied. If you disable or do not configure this setting, access to the Store application is allowed. Counter Measure: Configure this setting depending on your organization's requirements. Potential Impact: Access will not be allowed to ...

Ensure Audit Success and Failure for 'Audit Policy: Privilege Use: Sensitive Privilege Use' This subcategory reports when a user account or service uses a sensitive privilege. A sensitive privilege includes the following user rights: Act as part of the operating system, Back up files and directories, Create a token object, Debug programs, Enable computer and user accounts to be trusted for deleg ...

The logwatch service should be enabled or disabled as appropriate

The crond service should be enabled or disabled as appropriate.


Pages:      Start    2615    2616    2617    2618    2619    2620    2621    2622    2623    2624    2625    2626    2627    2628    ..   3042

© SecPod Technologies