[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

Disable ISATAP, Teredo, and 6to4 tunneling protocols

Provides content indexing and property caching for file, email and other content (via extensibility APIs). The service responds to file and email notifications to index modified content. If the service is stopped or disabled, the Explorer will not be able to display virtual folder views of items, and search in the Explorer will fall back to item-by-item slow search. Fix: (1) GPO: Computer Config ...

The kernel runtime parameter "net.ipv4.conf.default.send_redirects" should be set to "0".

The kernel runtime parameter "net.ipv4.conf.default.send_redirects" should be set to "0".

MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended) Counter Measure: Do not configure the MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended) entry except on highly secure computers, where it should be configured to a value of Disabled. The possible values for this registry entry are: ? 1 or 0. The default configuration is 0 (disabled). In the SCE UI, thes ...

This policy setting specifies whether the Internet Connection Wizard can connect to Microsoft to download a list of Internet Service Providers (ISPs). If you enable this policy setting, the "Choose a list of Internet Service Providers" path in the Internet Connection Wizard causes the wizard to exit. This prevents users from retrieving the list of ISPs, which resides on Microsoft servers. If you ...

Core dumps for all users should be disabled

The Autoplay policy 'Don't set the always do this checkbox' should be configured correctly.

The 'security log maximum size' should be configured correctly.

Monitor the use of system calls associated with the deletion or renaming of files and file attributes. This configuration statement sets up monitoring for the unlink (remove a file), unlinkat (remove a file attribute), rename (rename a file) and renameat (rename a file attribute) system calls and tags them with the identifier "delete". Monitoring these calls from non-privileged users could provid ...


Pages:      Start    11918    11919    11920    11921    11922    11923    11924    11925    11926    11927    11928    11929    11930    11931    ..   19630

© SecPod Technologies