[Forgot Password]
Login  Register Subscribe

24003

 
 

131401

 
 

103942

 
 

909

 
 

83962

 
 

133

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:5645
Verify that all users are assigned a unique ID for access to system components or cardholder data and also verify that users are authenticated using unique ID and additional authentication (for example, a password) for access to the cardholder data environment.

oval:org.secpod.oval:def:5646
Verify that inactive accounts over 90 days old are either removed or disabled.

oval:org.secpod.oval:def:5017
Malicious software, commonly referred to as malware including viruses, worms, and Trojans enters the network during many business-approved activities including employee e-mail and use of the Internet, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Ant ...

oval:org.secpod.oval:def:5019
Malicious software, commonly referred to as malware including viruses, worms, and Trojans enters the network during many business-approved activities including employee e-mail and use of the Internet, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Ant ...

oval:org.secpod.oval:def:5021
Malicious software, commonly referred to as malware including viruses, worms, and Trojans enters the network during many business-approved activities including employee e-mail and use of the Internet, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Ant ...

oval:org.secpod.oval:def:22617
Disable: 'Configure registry policy processing' for NoBackgroundPolicy

oval:org.secpod.oval:def:22592
Enable: 'Default behavior for AutoRun'

oval:org.secpod.oval:def:22626
Disable: 'Restrict Unauthenticated RPC clients'

oval:org.secpod.oval:def:22500
Enable: 'Allow remote access to the PnP interface'

oval:org.secpod.oval:def:22576
This policy setting determines whether all secure channel traffic that is initiated by the domain member must be signed or encrypted.

oval:org.secpod.oval:def:22610
Enable: 'Turn Off Internet File Association Service'

oval:org.secpod.oval:def:22379
If this setting is enabled any additional data requests from Microsoft in response to a Windows Error Reporting event will be automatically declined without notice to the user.

oval:org.secpod.oval:def:22489
Use this option to specify the path and name of the file in which Windows Firewall will write its log information.

oval:org.secpod.oval:def:22372
Use this option to log when Windows Firewall with Advanced Security allows an inbound connection.

oval:org.secpod.oval:def:22358
Enable: 'Require domain users to elevate when setting a network's location'

oval:org.secpod.oval:def:22480
Enable: 'Prohibit Access of the Windows Connect Now Wizards'

oval:org.secpod.oval:def:22365
Use this option to specify the path and name of the file in which Windows Firewall will write its log information.

oval:org.secpod.oval:def:22467
Media Player is configured to allow automatic checking for updates

oval:org.secpod.oval:def:22477
Enable: 'Troubleshooting: Allow user to access online troubleshooting content on Microsoft servers from the Troubleshooting Control Panel (via Windows Online Troubleshooting Service - WOTS)'

oval:org.secpod.oval:def:22597
Disable: 'Prohibit installation and configuration of Network Bridge on your DNS domain network'

oval:org.secpod.oval:def:22354
Use this option to log when Windows Firewall with Advanced Security discards an inbound packet for any reason.

oval:org.secpod.oval:def:22353
Turn off shell protocol protected mode

oval:org.secpod.oval:def:22399
Enable: 'Microsoft Support Diagnostic Tool: Turn on MSDT interactive communication with support provider'

oval:org.secpod.oval:def:22418
Use this option to log when Windows Firewall with Advanced Security allows an inbound connection.

oval:org.secpod.oval:def:22417
Disable the Responder network protocol driver AllowRspndrOnDomain, AllowRspndrOnPublicNet, EnableRspndr, and ProhibitRspndrOnPrivateNet settings

oval:org.secpod.oval:def:22536
Enable: 'Turn Off Microsoft Peer-to-Peer Networking Services'

oval:org.secpod.oval:def:22655
This option determines if this computer can receive unicast responses to multicast or broadcast messages that it initiates. Unsolicited unicast responses are blocked regardless of this setting.

oval:org.secpod.oval:def:22534
Enable: 'Turn Off Registration if URL Connection is Referring to Microsoft.com'

oval:org.secpod.oval:def:22664
When Windows Defender detects software or changes by software not yet classified for risks, you see how other members responded to the alert. In turn, the action you apply help other members choose how to respond. Your actions also help Microsoft choose which software to investigate for potential th ...

oval:org.secpod.oval:def:22407
Disable: 'Always Use Classic Logon'

oval:org.secpod.oval:def:22526
Use this option to specify the size limit of the file in which Windows Firewall will write its log information.

oval:org.secpod.oval:def:22647
Root certificates will not be updated automatically from Microsoft

oval:org.secpod.oval:def:22405
If this setting is enabled Windows Error Reporting events will not be logged to the system event log.

oval:org.secpod.oval:def:22525
Use this option to specify the size limit of the file in which Windows Firewall will write its log information.

oval:org.secpod.oval:def:22646
Remote Desktop Services is configured to allow an idle session limit no greater than 15 minutes

oval:org.secpod.oval:def:22524
This setting controls the ability of non-administrators to install updates that have been digitally signed by the application vendor.

oval:org.secpod.oval:def:22401
Enable: 'Do not send a Windows Error Report when a generic driver is installed on a device'

oval:org.secpod.oval:def:22641
Use this option to log when Windows Firewall with Advanced Security allows an inbound connection.

oval:org.secpod.oval:def:22640
Turn Off the "Order Prints" Picture Task

oval:org.secpod.oval:def:22628
Use this option to log when Windows Firewall with Advanced Security discards an inbound packet for any reason.

oval:org.secpod.oval:def:22625
Use this option to log when Windows Firewall with Advanced Security discards an inbound packet for any reason.

oval:org.secpod.oval:def:22504
Enable: 'Prevent indexing uncached Exchange folders'

oval:org.secpod.oval:def:22623
Controls whether computer receives unicast responses to its outgoing multicast or broadcast messages.

oval:org.secpod.oval:def:22502
Remote Desktop Services is configured to set a time limit for disconnected sessions

oval:org.secpod.oval:def:22456
Turn off handwriting personalization data sharing

oval:org.secpod.oval:def:22466
Enable: 'Turn Off Internet Connection Wizard if URL Connection is Referring to Microsoft.com'

oval:org.secpod.oval:def:22697
Enable: 'Turn Off Handwriting Reconition Error Reporting'

oval:org.secpod.oval:def:22453
Enable: 'Prevent device metadata retrieval from internet'

oval:org.secpod.oval:def:22574
Enable: 'Turn on session logging'

oval:org.secpod.oval:def:22451
This is an advanced security setting for the Windows Firewall that you can use to allow unicast responses on computers running Windows Vista or later.

oval:org.secpod.oval:def:22572
Route all traffic through the internal network

oval:org.secpod.oval:def:22557
6to4 State

oval:org.secpod.oval:def:22443
This policy setting controls the level of validation a computer with shared folders or printers performs on the service principal name provided by the client computer when it establishes a session using the server message block (SMB) protocol

oval:org.secpod.oval:def:22684
Use this option to specify the path and name of the file in which Windows Firewall will write its log information.

oval:org.secpod.oval:def:22680
Use this option to specify the size limit of the file in which Windows Firewall will write its log information.

oval:org.secpod.oval:def:22429
Disable: 'Do not create system restore point when new device driver installed'

oval:org.secpod.oval:def:22423
Remote Desktop Services is not configured to use a common temporary folder for all sessions

oval:org.secpod.oval:def:22675
Disable the Mapper I/O Driver AllowLLTDIOOnDomain, AllowLLTDIOOnPublicNet, EnableLLTDIO, and ProhibitLLTDIOOnPrivateNet settings

oval:org.secpod.oval:def:22551
Some features may communicate with the vendor, sending system information or downloading data or components for the feature. Turning off this capability will prevent potentially sensitive information from being sent outside the enterprise and uncontrolled updates to the system. This setting will pre ...

oval:org.secpod.oval:def:22609
This setting controls whether local administrators are allowed to create connection security rules that apply together with connection security rules configured by Group Policy.

oval:org.secpod.oval:def:22490
This policy setting allows you to manage whether the Install Updates and Shut Down option is displayed in the Shut Down Windows dialog box.

oval:org.secpod.oval:def:22494
This policy setting allows you to set the encryption types that Kerberos is allowed to use.

oval:org.secpod.oval:def:22357
This policy setting determines the amount of time before previously scheduled Automatic Update installations will proceed after system startup.

oval:org.secpod.oval:def:22599
Select this option to have Windows Firewall with Advanced Security display notifications to the user when a program is blocked from receiving inbound connections.

oval:org.secpod.oval:def:22355
Windows Firewall with Advanced Security uses the settings for this profile to filter network traffic.

oval:org.secpod.oval:def:22659
This setting controls whether local administrators are allowed to create local firewall rules that apply with other firewall rules enforced by Group Policy.

oval:org.secpod.oval:def:22661
This setting controls whether local administrators are allowed to create connection security rules that apply with other connection security rules enforced by Group Policy.

oval:org.secpod.oval:def:22636
Select On to allow Windows Firewall to filter network traffic. Select Off to prevent Windows Firewall from using any firewall rules or connection security rules for this profile.

oval:org.secpod.oval:def:22400
Windows Firewall with Advanced Security uses the settings for this profile to filter network traffic.

oval:org.secpod.oval:def:22459
Setting controls the auto-restart functionality of the operating system

oval:org.secpod.oval:def:22580
This policy setting allows you to manage whether the Install Updates and Shut Down option is displayed in the Shut Down Windows dialog box.

oval:org.secpod.oval:def:22445
This setting controls whether local administrators are allowed to create local firewall rules that apply together with firewall rules configured by Group Policy.

oval:org.secpod.oval:def:22452
Setting displays notifications to the user when a program is blocked from receiving inbound connections.

oval:org.secpod.oval:def:22559
This policy setting determines whether a domain member should attempt to negotiate encryption for all secure channel traffic that it initiates.

oval:org.secpod.oval:def:22681
Select this option to have Windows Firewall with Advanced Security display notifications to the user when a program is blocked from receiving inbound connections.

oval:org.secpod.oval:def:22616
This policy setting determines whether users can increase the base priority class of a process. (It is not a privileged operation to increase relative priority within a priority class.) This user right is not required by administrative tools that are supplied with the operating system but might be r ...

oval:org.secpod.oval:def:22615
This policy setting determines whether the virtual memory pagefile is cleared when the system is shut down.

oval:org.secpod.oval:def:22614
Turning off an inactive display supports energy saving initiatives. It may also extend availability on systems running on a battery.

oval:org.secpod.oval:def:22613
This policy setting determines which accounts will not be able to log on to the computer as a batch job. A batch job is not a batch (.bat) file, but rather a batch-queue facility. Accounts that use the Task Scheduler to schedule jobs need this user right. The Deny log on as a batch job user right ov ...

oval:org.secpod.oval:def:22612
This policy setting determines the least number of characters that make up a password for a user account.

oval:org.secpod.oval:def:22619
This policy setting allows administrators to enable the more precise auditing capabilities present in Windows Vista. Uses subcategory setting to override audit policy categories.

oval:org.secpod.oval:def:22618
Specify the 'Configure minimum PIN length for startup'

oval:org.secpod.oval:def:22620
This policy setting allows other users on the network to connect to the computer and is required by various network protocols that include Server Message Block (SMB)?based protocols, NetBIOS, Common Internet File System (CIFS), and Component Object Model Plus (COM+). When configuring a user right i ...

oval:org.secpod.oval:def:22604
This policy setting allows users to manage the system's volume or disk configuration, which could allow a user to delete a volume and cause data loss as well as a denial-of-service condition. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be eit ...

oval:org.secpod.oval:def:22600
This policy setting allows users to shut down Windows Vista based computers from remote locations on the network. Anyone who has been assigned this user right can cause a denial of service (DoS) condition, which would make the computer unavailable to service user requests. Therefore, Microsoft recom ...

oval:org.secpod.oval:def:22608
This policy setting determines whether a computer can be shut down when a user is not logged on.

oval:org.secpod.oval:def:22607
This policy setting determines the number of renewed, unique passwords that have to be associated with a user account before you can reuse an old password.

oval:org.secpod.oval:def:22381
This policy setting allows users to change the size of the pagefile. By making the pagefile extremely large or extremely small, an attacker could easily affect the performance of a compromised computer. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can ...

oval:org.secpod.oval:def:22387
This policy setting determines whether users can log on as Terminal Services clients. After the baseline member server is joined to a domain environment, there is no need to use local accounts to access the server from the network. Domain accounts can access the server for administration and end-use ...

oval:org.secpod.oval:def:22386
Specifies whether or not the user is prompted for a password when the system resumes from sleep. If you enable this policy, or if it is not configured, the user is prompted for a password when the system resumes from sleep. If you disable this policy, the user is not prompted for a password when t ...

oval:org.secpod.oval:def:22385
Installation options for applications are typically controlled by administrators. This setting prevents users from changing installation options that may bypass security features.

oval:org.secpod.oval:def:22384
Enable: 'Allow Standby States (S1-S3) When Sleeping (On Battery)'

oval:org.secpod.oval:def:22382
Domain member: Maximum machine account password age

oval:org.secpod.oval:def:22369
This policy setting determines whether to disconnect users who are connected to the local computer outside their user accounts valid logon hours. It affects the SMB component.

oval:org.secpod.oval:def:22370
This policy setting allows you to specify the amount of continuous idle time that must pass in an SMB session before the session is suspended because of inactivity.

oval:org.secpod.oval:def:22499
This policy setting allows you to manage configuration of remote access to all supported shells to execute scripts and commands.

oval:org.secpod.oval:def:22498
Hiding the computer from the Browse List removes one method attackers might use to gether information about computers on the network.

oval:org.secpod.oval:def:22377
IPSec exemptions are limited

oval:org.secpod.oval:def:22497
This policy setting specifies whether Windows will search Windows Update for device drivers when no local drivers for a device are present.

oval:org.secpod.oval:def:22375
This policy setting controls the ability of anonymous users to enumerate the accounts in the Security Accounts Manager (SAM).

oval:org.secpod.oval:def:22374
This definition tests the maximum allowed size of the setup log is equal to or greater than the supplied value.

oval:org.secpod.oval:def:22495
This policy setting determines whether the system shuts down if it is unable to log Security events.

oval:org.secpod.oval:def:22373
This is the setting that turns on or off UAC. Disabling this setting effectively disables UAC.

oval:org.secpod.oval:def:22493
This policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account.

oval:org.secpod.oval:def:22492
This setting determines which users can change the time zone of the computer. This ability holds no great danger for the computer and may be useful for mobile workers. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Activ ...

oval:org.secpod.oval:def:22359
This security setting determines whether a different account name is associated with the security identifier (SID) for the account "Guest." Renaming the well-known Guest account makes it slightly more difficult for unauthorized persons to guess this user name and password combination. The ...

oval:org.secpod.oval:def:22478
This policy setting controls whether the computer can download print driver packages over HTTP. To set up HTTP printing, printer drivers that are not available in the standard operating system installation might need to be downloaded over HTTP.

oval:org.secpod.oval:def:22367
This policy setting determines which registry paths will be accessible after referencing the WinReg key to determine access permissions to the paths.

oval:org.secpod.oval:def:22486
This policy setting controls the behavior of the elevation prompt for administrators on computers running Windows 7, Windows Server 2008 R2, and later versions of Windows.

oval:org.secpod.oval:def:22485
Control Event Log behavior when the log file reaches its maximum size (System)

oval:org.secpod.oval:def:22364
This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user.

oval:org.secpod.oval:def:22363
This policy setting determines whether the Transport Layer Security/Secure Sockets Layer (TLS/SSL) Security Provider supports only the TLS_RSA_WITH_3DES_EDE_CBC_SHA cipher suite.

oval:org.secpod.oval:def:22362
This policy setting determines whether users can create global objects that are available to all sessions. Users can still create objects that are specific to their own session if they do not have this user right. Users who can create global objects could affect processes that run under other users& ...

oval:org.secpod.oval:def:22360
This policy setting determines the number of days that you must use a password before you can change it.

oval:org.secpod.oval:def:22469
Autoplay starts to read from a drive as soon as you insert media in the drive, which causes the setup file for programs or audio media to start immediately.

oval:org.secpod.oval:def:22468
This user right is useful to kernel-mode components that extend the object namespace. However, components that run in kernel mode have this user right inherently. Therefore, it is typically not necessary to specifically assign this user right. When configuring a user right in the SCM enter a comma ...

oval:org.secpod.oval:def:22588
This policy will be turned off by default on domain joined machines. This would disallow the online identities to be able to authenticate to the domain joined machine in Windows 7.

oval:org.secpod.oval:def:22356
This policy setting determines which users who are logged on locally to the computers in your environment can shut down the operating system with the Shut Down command. Misuse of this user right can result in a denial of service condition. When configuring a user right in the SCM enter a comma deli ...

oval:org.secpod.oval:def:22476
This setting determines the behavior for outbound connections that do not match an outbound firewall rule. If Outbound connections are set to Block and deploy the firewall policy by using a GPO, cannot receive subsequent Group Policy updates.

oval:org.secpod.oval:def:22596
Disable: 'Enable RPC Endpoint Mapper Client Authentication'

oval:org.secpod.oval:def:22475
This policy setting determines what happens when the smart card for a logged on user is removed from the smart card reader.

oval:org.secpod.oval:def:22474
This policy setting determines which users can create symbolic links. In Windows Vista, existing NTFS file system objects, such as files and folders, can be accessed by referring to a new kind of file system object called a symbolic link. A symbolic link is a pointer (much like a shortcut or .lnk fi ...

oval:org.secpod.oval:def:22351
Disable: 'Configure Offer Remote Assistance'

oval:org.secpod.oval:def:22472
Specifies whether or not the user is prompted for a password when the system resumes from sleep.

oval:org.secpod.oval:def:22591
This policy setting specifies whether the computer that is about to host the remote connection will enforce an encryption level for all data sent between it and the client computer for the remote session.

oval:org.secpod.oval:def:22470
Setting controls whether Windows will download a list of providers for the Web publishing and online ordering wizards.

oval:org.secpod.oval:def:22392
Specify the 'Account Lockout Threshold'

oval:org.secpod.oval:def:22390
MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure DefaultGateway addresses (could lead to DoS)

oval:org.secpod.oval:def:22398
This policy setting controls the behavior of the elevation prompt for standard users on computers running Windows 7, Windows Server 2008 R2, and later versions of Windows.

oval:org.secpod.oval:def:22396
This policy setting helps prevent Terminal Services clients from saving passwords on a computer.

oval:org.secpod.oval:def:22394
This policy setting allows accounts to log on using the task scheduler service. Because the task scheduler is often used for administrative purposes, it may be needed in enterprise environments. However, its use should be restricted in high security environments to prevent misuse of system resources ...

oval:org.secpod.oval:def:22393
By default, all administrator accounts are displayed when you attempt to elevate a running application.

oval:org.secpod.oval:def:22539
Specify the maximum log file size (KB) (System)

oval:org.secpod.oval:def:22538
The 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)' setting should be configured correctly.

oval:org.secpod.oval:def:22537
This setting determines the behavior for inbound connections that do not match an inbound firewall rule. The default behavior is to block connections unless there are firewall rules to allow the connection.

oval:org.secpod.oval:def:22657
This security setting allows a security principal to log on as a service. Services can be configured to run under the Local System, Local Service, or Network Service accounts, which have a built in right to log on as a service. Any service that runs under a separate user account must be assigned the ...

oval:org.secpod.oval:def:22415
This policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop.

oval:org.secpod.oval:def:22412
This policy setting determines if the server side SMB service is required to perform SMB packet signing.

oval:org.secpod.oval:def:22543
This policy setting determines the length of time before the Account lockout threshold resets to zero. The default value for this policy setting is Not Defined. If the Account lockout threshold is defined, this reset time must be less than or equal to the value for the Account lockout duration setti ...

oval:org.secpod.oval:def:22422
Turning off an inactive display supports energy saving initiatives. It may also extend availability on systems running on a battery.

oval:org.secpod.oval:def:22421
This setting determines the behavior for inbound connections that do not match an inbound firewall rule. The default behavior is to block connections unless there are firewall rules to allow the connection.

oval:org.secpod.oval:def:22663
This policy setting allows users to change the Trusted for Delegation setting on a computer object in Active Directory. Abuse of this privilege could allow unauthorized users to impersonate other users on the network. When configuring a user right in the SCM enter a comma delimited list of accounts ...

oval:org.secpod.oval:def:22542
This policy setting allows you to disable the client computers ability to print over HTTP, which allows the computer to print to printers on the intranet as well as the Internet.

oval:org.secpod.oval:def:22541
This policy setting determines if the server side SMB service is able to sign SMB packets if it is requested to do so by a client that attempts to establish a connection.

oval:org.secpod.oval:def:22662
Specify the 'Network access: Shares that can be accessed anonymously'

oval:org.secpod.oval:def:22408
This policy setting determines which users or processes can generate audit records in the Security log. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, or computers. Fix: (1 ...

oval:org.secpod.oval:def:22404
This policy setting determines how network logons that use local accounts are authenticated.

oval:org.secpod.oval:def:22403
Disable: 'Control Event Log behavior when the log file reaches its maximum size' for Application

oval:org.secpod.oval:def:22645
This policy setting allows users to configure the system-wide environment variables that affect hardware configuration. This information is typically stored in the Last Known Good Configuration. Modification of these values and could lead to a hardware failure that would result in a denial of servic ...

oval:org.secpod.oval:def:22523
This policy setting determines what additional permissions are assigned for anonymous connections to the computer

oval:org.secpod.oval:def:22644
This policy setting makes the Recovery Console SET command available.

oval:org.secpod.oval:def:22643
This policy setting specifies whether Terminal Services always prompts the client computer for a password upon connection.

oval:org.secpod.oval:def:22409
This policy setting specifies whether Search Companion should automatically download content updates during local and Internet searches.

oval:org.secpod.oval:def:22653
This policy setting determines who is allowed to format and eject removable media.

oval:org.secpod.oval:def:22532
This policy setting allows one process or service to start another service or process with a different security access token, which can be used to modify the security access token of that sub-process and result in the escalation of privileges. When configuring a user right in the SCM enter a comma ...

oval:org.secpod.oval:def:22531
This privilege determines which user accounts can modify the integrity label of objects, such as files, registry keys, or processes owned by other users. Processes running under a user account can modify the label of an object owned by that user to a lower level without this privilege. When configu ...

oval:org.secpod.oval:def:22652
This policy setting allows users to take ownership of files, folders, registry keys, processes, or threads. This user right bypasses any permissions that are in place to protect objects to give ownership to the specified user. When configuring a user right in the SCM enter a comma delimited list of ...

oval:org.secpod.oval:def:22410
This policy setting determines which users can change the auditing options for files and directories and clear the Security log. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, ...

oval:org.secpod.oval:def:22651
This policy setting allows users to dynamically load a new device driver on a system. An attacker could potentially use this capability to install malicious code that appears to be a device driver. This user right is required for users to add local printers or printer drivers in Windows Vista. When ...

oval:org.secpod.oval:def:22530
This policy setting controls the behavior of application installation detection for the computer.

oval:org.secpod.oval:def:22650
This setting determines the behavior for outbound connections that do not match an outbound firewall rule. If Outbound connections are set to Block and deploy the firewall policy by using a GPO, cannot receive subsequent Group Policy updates.

oval:org.secpod.oval:def:22639
The entry appears as MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) in the SCE.

oval:org.secpod.oval:def:22518
This setting enables the prevention of the execution of unsigned or invalidated applications. Before enabling this setting, it is essential that administrators are certain that all required applications are signed and valid.

oval:org.secpod.oval:def:22517
This policy setting determines whether packet signing is required by the SMB client component.

oval:org.secpod.oval:def:22638
The entry appears as MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning in the SCE.

oval:org.secpod.oval:def:22515
Specify the 'MSS: (KeepAliveTime)How often keep-alive packets are sent in milliseconds'

oval:org.secpod.oval:def:22635
This policy setting prevents users from sharing the local drives on their client computers to Terminal Servers that they access.

oval:org.secpod.oval:def:22513
Disable this policy setting to prevent the SMB redirector from sending plaintext passwords during authentication to third-party SMB servers that do not support password encryption.

oval:org.secpod.oval:def:22512
This policy setting determines the length of time that must pass before a locked account is unlocked and a user can try to log on again. The setting does this by specifying the number of minutes a locked out account will remain unavailable. If the value for this policy setting is configured to 0, lo ...

oval:org.secpod.oval:def:22632
When this policy setting is enabled, a domain controller must authenticate the domain account used to unlock the computer.

oval:org.secpod.oval:def:22511
This setting determines the behavior for inbound connections that do not match an inbound firewall rule.

oval:org.secpod.oval:def:22642
Disable: 'Turn off Data Execution Prevention for Explorer'

oval:org.secpod.oval:def:22506
This policy setting determines whether a domain member can periodically change its computer account password.

oval:org.secpod.oval:def:22503
The registry value entry AutoAdminLogon was added to the template file in the HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ registry key

oval:org.secpod.oval:def:22624
When this policy setting is enabled, a secure channel can only be established with domain controllers that are capable of encrypting secure channel data with a strong (128-bit) session key.

oval:org.secpod.oval:def:22501
This setting determines the behavior for outbound connections that do not match an outbound firewall rule.

oval:org.secpod.oval:def:22621
This policy setting determines which registry paths and sub-paths will be accessible when an application or process references the WinReg key to determine access permissions.

oval:org.secpod.oval:def:22509
This policy setting allows the administrator account to automatically log on to the recovery console when it is invoked during startup.

oval:org.secpod.oval:def:22510
This policy setting determines whether a domain member should attempt to negotiate whether all secure channel traffic that it initiates must be digitally signed.

oval:org.secpod.oval:def:22631
This policy setting specifies whether Windows Messenger can collect anonymous information about how the Windows Messenger software and service is used.

oval:org.secpod.oval:def:22630
Enable: 'MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes'

oval:org.secpod.oval:def:22458
This policy setting allows a process to create an access token, which may provide elevated rights to access sensitive data. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, or c ...

oval:org.secpod.oval:def:22457
The entry appears as MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) in the SCE.

oval:org.secpod.oval:def:22587
This security setting determines which users are prevented from logging on at the computer. This policy setting supersedes the Allow log on locally policy setting if an account is subject to both policies.Important:If you apply this security policy to the Everyone group, no one will be able to log o ...

oval:org.secpod.oval:def:22465
This policy setting controls whether application write failures are redirected to defined registry and file system locations.

oval:org.secpod.oval:def:22585
Enable: 'Allow Standby States (S1-S3) When Sleeping (Plugged In)'

oval:org.secpod.oval:def:22584
Determines whether case insensitivity is enforced for all subsystems. Example is case insensitivity for other subsystems, such as the Portable Operating System Interface for UNIX (POSIX) which are normally case sensitive.

oval:org.secpod.oval:def:22462
Always install with elevated privileges

oval:org.secpod.oval:def:22583
This policy setting determines the strength of the default discretionary access control list (DACL) for objects.

oval:org.secpod.oval:def:22461
This policy setting determines whether a user can log on to a Windows domain using cached account information.

oval:org.secpod.oval:def:22581
Network security: Minimum session security for NTLM SSP based (including secure RPC) client applications.

oval:org.secpod.oval:def:22448
This policy setting allows a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. If this user right is assigned, significant degradation of system performance can occur. When configuring a user right in the SCM enter a comma delimited l ...

oval:org.secpod.oval:def:22569
Disable: 'do not process the run once list'

oval:org.secpod.oval:def:22568
When enabled, this policy setting restricts anonymous access to only those shares and pipes that are named in the Network access: Named pipes that can be accessed anonymously and Network access: Shares that can be accessed anonymously settings.

oval:org.secpod.oval:def:22447
This policy setting determines which users and groups can change the time and date on the internal clock of the computers in your environment. Users who are assigned this user right can affect the appearance of event logs. When a computer's time setting is changed, logged events reflect the new ...

oval:org.secpod.oval:def:22446
This policy setting determines which user accounts will have the right to attach a debugger to any process or to the kernel, which provides complete access to sensitive and critical operating system components. Developers who are debugging their own applications do not need to be assigned this user ...

oval:org.secpod.oval:def:22566
This policy setting specifies the type of challenge/response authentication for network logons. LAN Manager (LM) authentication is the least secure method; it allows encrypted passwords to be cracked because they can be easily intercepted on the network.

oval:org.secpod.oval:def:22573
This policy setting allows a user to adjust the maximum amount of memory that is available to a process. The ability to adjust memory quotas is useful for system tuning, but it can be abused. In the wrong hands, it could be used to launch a denial of service (DoS) attack. When configuring a user ri ...

oval:org.secpod.oval:def:22694
Specify the 'Network access: Named Pipes that can be accessed anonymously'

oval:org.secpod.oval:def:22450
Audit the access of global system objects is disabled

oval:org.secpod.oval:def:22692
This policy setting allows Local System services that use Negotiate to use the computer identity when reverting to NTLM authentication.

oval:org.secpod.oval:def:22570
This setting controls whether local administrators are allowed to create local firewall rules that apply together with firewall rules configured by Group Policy.

oval:org.secpod.oval:def:22690
This policy setting allows users who do not have the Traverse Folder access permission to pass through folders when they browse an object path in the NTFS file system or the registry. This user right does not allow users to list the contents of a folder. When configuring a user right in the SCM ent ...

oval:org.secpod.oval:def:22439
This policy setting determines which users or groups have the right to log on as a Terminal Services client. Remote desktop users require this user right. If your organization uses Remote Assistance as part of its help desk strategy, create a group and assign it this user right through Group Policy. ...

oval:org.secpod.oval:def:22438
Enable: 'Network access: Do not allow storage of credentials or .NET Passports for network authentication'

oval:org.secpod.oval:def:22558
This security setting determines the period of time (in days) that a password can be used before the system requires the user to change it. You can set passwords to expire after a number of days between 1 and 999, or you can specify that passwords never expire by setting the number of days to 0. If ...

oval:org.secpod.oval:def:22679
This policy setting determines which users can bypass file, directory, registry, and other persistent object permissions when restoring backed up files and directories on computers that run Windows Vista in your environment. This user right also determines which users can set valid security principa ...

oval:org.secpod.oval:def:22678
This policy setting determines the level of data signing that is requested on behalf of clients that issue LDAP BIND requests.

oval:org.secpod.oval:def:22677
Network security: Minimum session security for NTLM SSP based (including secure RPC) server applications.

oval:org.secpod.oval:def:22556
This policy setting controls the ability of anonymous users to enumerate SAM accounts as well as shares.

oval:org.secpod.oval:def:22676
This policy setting allows a process to assume the identity of any user and thus gain access to the resources that the user is authorized to access. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they c ...

oval:org.secpod.oval:def:22555
Specify the maximum log file size (KB) (Security)

oval:org.secpod.oval:def:22565
Control Event Log behavior when the log file reaches its maximum size (Security)

oval:org.secpod.oval:def:22685
When this setting is configured to Enabled, users are not required to use the CTRL+ALT+DEL key combination to log on to the network.

oval:org.secpod.oval:def:22564
Specify the maximum log file size (KB) (Application)

oval:org.secpod.oval:def:22441
This policy setting specifies whether the tasks Publish this file to the Web, Publish this folder to the Web, and Publish the selected items to the Web are available from File and Folder Tasks in Windows folders.

oval:org.secpod.oval:def:22440
The system is configured to prevent name-release attacks

oval:org.secpod.oval:def:22561
The entry appears as MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended) in the SCE.

oval:org.secpod.oval:def:22560
This policy setting determines whether the account name of the last user to log on to the client computers in your organization will be displayed in each computer's respective Windows logon screen.

oval:org.secpod.oval:def:22428
Enable: 'Prevent the computer from joining a HomeGroup'

oval:org.secpod.oval:def:22669
This policy setting allows users to circumvent file and directory permissions to back up the system. This user right is enabled only when an application (such as NTBACKUP) attempts to access a file or directory through the NTFS file system backup application programming interface (API). Otherwise, t ...

oval:org.secpod.oval:def:22427
This policy setting determines whether the SMB client will attempt to negotiate SMB packet signing.

oval:org.secpod.oval:def:22668
This policy setting determines which users can interactively log on to computers in your environment. Logons that are initiated by pressing the CTRL+ALT+DEL key sequence on the client computer keyboard require this user right. Users who attempt to log on through Terminal Services or IIS also require ...

oval:org.secpod.oval:def:22546
This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system.

oval:org.secpod.oval:def:22666
This policy setting determines whether local accounts that are not password protected can be used to log on from locations other than the physical computer console

oval:org.secpod.oval:def:22545
This policy setting determines whether the LAN Manager (LM) hash value for the new password is stored when the password is changed.

oval:org.secpod.oval:def:22424
This policy setting prohibits users from connecting to a computer from across the network, which would allow users to access and potentially modify data remotely. In high security environments, there should be no need for remote users to access data on a computer. Instead, file sharing should be acc ...

oval:org.secpod.oval:def:22665
Allow NTLM to fall back to NULL session when used with LocalSystem.

oval:org.secpod.oval:def:22544
This security setting determines if the Guest account is enabled or disabled. Default: Disabled. Note: If the Guest account is disabled and the security option Network Access: Sharing and Security Model for local accounts is set to Guest Only, network logons, such as those performed by the Microso ...

oval:org.secpod.oval:def:22433
This policy setting determines which users can use tools to monitor the performance of non-system processes. Typically, you do not need to configure this user right to use the Microsoft Management Console (MMC) Performance snap-in. However, you do need this user right if System Monitor is configured ...

oval:org.secpod.oval:def:22432
This privilege determines which user accounts can increase or decrease the size of a process's working set. Default: Users The working set of a process is the set of memory pages currently visible to the process in physical RAM memory. These pages are resident and available for an applicatio ...

oval:org.secpod.oval:def:22553
The entry appears as MSS: (DisableIPSourceRouting) IPv6 source routing protection level (protects against packet spoofing) in the SCE.

oval:org.secpod.oval:def:22431
This policy setting determines how far in advance users are warned that their password will expire.

oval:org.secpod.oval:def:22672
MSS: (TCPMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)

oval:org.secpod.oval:def:22430
The policy setting allows programs that run on behalf of a user to impersonate that user (or another specified account) so that they can act on behalf of the user. If this user right is required for this kind of impersonation, an unauthorized user will not be able to convince a client to connect for ...

oval:org.secpod.oval:def:22550
Password must meet complexity requirements.

oval:org.secpod.oval:def:22670
Enable: 'Configure Solicited Remote Assistance'

CPE    1
cpe:/o:microsoft:windows_8.1
CCE    232
CCE-35384-7
CCE-33972-1
CCE-35391-2
CCE-34771-6
...
*XCCDF
xccdf_org.secpod_benchmark_PCI_Windows_8_1

© 2013 SecPod Technologies