[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195105 Download | Alert*

The Disallow locally attached storage as backup target machine setting should be configured correctly. This policy setting allows you to manage whether backups of a machine can run to locally attached storage or not. If you enable this policy setting, machine administrator/backup operator cannot use Windows Server Backup to run backups to a locally attached storage or disk. If you disable or do n ...

The squashfs Kernel Module should be enabled or disabled as appropriate.

This policy setting controls the state of the Inventory Collector. The Inventory Collector inventories applications, files, devices, and drivers on the system and sends the information to Microsoft. This information is used to help diagnose compatibility problems. If you enable this policy setting, the Inventory Collector will be turned off and data will not be sent to Microsoft. Collection of i ...

This setting lets you suppress the Restore button in the previous versions property page when the user has selected a previous version of a file on a file share. If you enable this policy setting, the Restore button is disabled when the user selects a previous version corresponding to a file on a file share. If you disable this policy setting, the Restore button remains active for a previous ver ...

This policy setting prevents users from sharing the local drives on their client computers to Terminal Servers that they access. Mapped drives appear in the session folder tree in Windows Explorer in the following format: \\TSClient\<driveletter>$ If local drives are shared they are left vulnerable to intruders who want to exploit the data that is stored on them. This policy setting prevent ...

The character + in various files used to be markers for systems to insert data from NIS maps at a certain point in a system configuration file. These entries are no longer required on most systems, but may exist in files that have been imported from other platforms.

Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. System use notifications are required only for access via logon interfaces with human users and are not required when s ...

The Prevent launch an application machine setting should be configured correctly. Prevents the user from launching an application from a Tablet PC hardware button. If you enable this policy, applications cannot be launched from a hardware button, and "Launch an application" is removed from the drop down menu for configuring button actions (in the Tablet PC Control Panel buttons tab). If ...

The CD and DVD: Deny read access machine setting should be configured correctly. This policy setting denies read access to the CD and DVD removable storage class. If you enable this policy setting, read access will be denied to this removable storage class. If you disable or do not configure this policy setting, read access will be allowed to this removable storage class. Fix: (1) GPO: Computer ...

IP source routing is a mechanism that allows the sender to determine the IP route that a datagram should take through the network. Microsoft recommends to configure this setting to Not Defined for enterprise environments and to Highest Protection for high security environments to completely disable source routing. HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\DisableIPSourceRouting Vul ...


Pages:      Start    12149    12150    12151    12152    12153    12154    12155    12156    12157    12158    12159    12160    12161    12162    ..   19510

© SecPod Technologies