|Paid content will be excluded from the download.
| Matches : 23631
|Ensure No Auditing for 'Audit Policy: Policy Change: Authorization Policy Change'
This subcategory reports changes in authorization policy including permissions (DACL) changes. Events for this subcategory include:
- 4704: A user right was assigned.
- 4705: A user right was removed.
- 4706: A new trust was created to a domain.
- 4707: A trust to a domain was removed.
- 4714: ...
Disable: 'Choose how BitLocker-protected fixed drives can be recovered' for FDVRecovery
This policy setting allows you to control how BitLocker-protected fixed data drives are recovered in the absence of the required credentials. This policy setting is applied when you turn on BitLocker.
The "Allow data recovery agent" check box is used to specify whether a data recovery agent can be used wit ...
Disable: 'Accounts: Block Microsoft accounts'
This policy setting prevents users from adding new Microsoft accounts on this computer.
If you select the "Users can't add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred opt ...
Ensure No Auditing for 'Audit Policy: Policy Change: MPSSVC Rule-Level Policy Change'
This subcategory reports changes in policy rules used by the Microsoft Protection Service (MPSSVC.exe). This service is used by Windows Firewall and by Microsoft OneCare. Events for this subcategory include:
- 4944: The following policy was active when the Windows Firewall started.
- 4945: A rule was li ...
Disable: 'Windows Firewall: Public: Apply local connection security rules' for AllowLocalIPsecPolicyMerge
This setting controls whether local administrators are allowed to create connection security rules that apply together with connection security rules configured by Group Policy.
Disable this setting to override firewall rules created locally by administrators.
Specify the 'Configure minimum PIN length for startup' (MinimumPIN Length Min:4 Max:20)
This policy setting allows you to configure a minimum length for a Trusted Platform Module (TPM) startup PIN. This policy setting is applied when you turn on BitLocker. The startup PIN must have a minimum length of 4 digits and can have a maximum length of 20 digits.
If you enable this policy setting, you ...
Select the 'Enforce drive encryption type on removable data drives' to allow_user_to_choose
This policy setting allows you to configure the encryption type used by BitLocker Drive Encryption. This policy setting is applied when you turn on BitLocker. Changing the encryption type has no effect if the drive is already encrypted or if encryption is in progress. Choose full encryption to require that ...
'Set time limit for active Remote Desktop Services sessions' to never
This policy setting allows you to specify the maximum amount of time that a Remote Desktop Services session can be active before it is automatically disconnected.
If you enable this policy setting, you must select the desired time limit in the Active session limit drop-down list. Remote Desktop Services will automatically d ...
Configure Default consent
This policy setting determines the default consent behavior of Windows Error Reporting.
If you enable this policy setting, you can set the default consent handling for error reports. The following list describes the Consent level settings that are available in the pull-down menu in this policy setting:
- Always ask before sending data: Windows prompts users for consent ...
Disable: 'System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing' for Enabled
This policy setting determines whether the Transport Layer Security/Secure Sockets Layer (TLS/SSL) Security Provider supports only the TLS_RSA_WITH_3DES_EDE_CBC_SHA cipher suite. Although this policy setting increases security, most public Web sites that are secured with TLS or SSL do no ...
Pages:      Start    8    9    10    11    12    13    14    15    16    17    18    19    20    21    ..   2363
© 2013 SecPod Technologies