|Paid content will be excluded from the download.
| Matches : 23631
|"Sign-in last interactive user automatically after a system-initiated restart"
This policy setting controls whether a device will automatically sign-in the last interactive user after Windows Update restarts the system.
If you enable or do not configure this policy setting, the device securely saves the user's credentials (including the user name, domain and encrypted password) to configure auto ...
"AppLocker: Packaged app Rules: (Default Rule) All signed packaged apps (Allow Everyone)"
Allow all users to run signed packaged Windows Store apps.
This setting is configured by using an XML blob that is store in the registry setting for this setting. You can obtain the XML blob by configuring the desired setting in the Local Group Policy console and then retrieving the blob from the registry s ...
"Apply UAC restrictions to local accounts on network logons"
This setting controls whether local accounts can be used for remote administration via network logon (e.g., NET USE, connecting to C$, etc.). Local accounts are at high risk for credential theft when the same account and password is configured on multiple systems. Enabling this policy significantly reduces that risk.
Enabled (recommen ...
"WDigest Authentication (disabling may require KB2871997)"
When WDigest authentication is enabled, Lsass.exe retains a copy of the user's plaintext password in memory, where it can be at risk of theft. Microsoft recommends disabling WDigest authentication unless it is needed.
If this setting is not configured, WDigest authentication is disabled in Windows 8.1 and in Windows Server 2012 R2; it is ...
Access this computer from the network
This policy setting allows other users on the network to connect to the computer and is required by various network protocols that include Server Message Block (SMB)?based protocols, NetBIOS, Common Internet File System (CIFS), and Component Object Model Plus (COM+).
When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts ...
Accounts: Limit local account use of blank passwords to console logon only
This policy setting determines whether local accounts that are not password protected can be used to log on from locations other than the physical computer console. If you enable this policy setting, local accounts that have blank passwords will not be able to log on to the network from remote client computers. Such accoun ...
Audit directory service access
This policy setting determines whether to audit user access to an Active Directory object that has its own specified system access control list (SACL). If you define the Audit directory service access setting, you can specify whether to audit successes, failures, or not audit the event type at all. Success audits generate an audit entry when a user successfully acce ...
Audit Policy: Account Management: Application Group Management
This subcategory reports each event of application group management on a computer, such as when an application group is created, changed, or deleted or when a member is added to or removed from an application group. If you enable this Audit policy setting, administrators can track events to detect malicious, accidental, and authorized ...
Audit Policy: Object Access: Certification Services
This subcategory reports when Certification Services operations are performed. Events for this subcategory include:
? 4868: The certificate manager denied a pending certificate request.
? 4869: Certificate Services received a resubmitted certificate request.
? 4870: Certificate Services revoked a certificate.
? 4871: Certificate Services rece ...
Audit Policy: Object Access: SAM
This subcategory reports when SAM objects are accessed. Refer to the Microsoft Knowledgebase article ?Description of security events in Windows Vista and in Windows Server 2008? for the most recent information about this setting: http://support.microsoft.com/default.aspx/kb/947226.
Pages:      Start    7    8    9    10    11    12    13    14    15    16    17    18    19    20    ..   2363
© 2013 SecPod Technologies