|Paid content will be excluded from the download.
| Matches : 23631
|"Network access: Restrict anonymous access to Named Pipes and Shares"
When enabled, this policy setting restricts anonymous access to only those shares and pipes that are named in the Network access: Named pipes that can be accessed anonymously and Network access: Shares that can be accessed anonymously settings. This policy setting controls null session access to shares on your computers by addi ...
This policy setting determines which user accounts will have the right to attach a debugger to any process or to the kernel, which provides complete access to sensitive and critical operating system components. Developers who are debugging their own applications do not need to be assigned this user right; however, developers who are debugging new system components will need it.
"Back up files and directories"
This policy setting allows users to circumvent file and directory permissions to back up the system. This user right is enabled only when an application (such as NTBACKUP) attempts to access a file or directory through the NTFS file system backup application programming interface (API). Otherwise, the assigned file and directory permissions apply.
When configuring ...
"Allow indexing of encrypted files"
This policy setting allows encrypted items to be indexed. If you enable this policy setting, indexing will attempt to decrypt and index the content (access restrictions will still apply). If you disable this policy setting, the search service components (including non-Microsoft components) are expected not to index encrypted items or encrypted stores. This pol ...
"Allow unencrypted traffic"
This policy setting allows you to manage whether the Windows Remote Management (WinRM) service sends and receives unencrypted messages over the network.
If you enable this policy setting, the WinRM client sends and receives unencrypted messages over the network.
If you disable or do not configure this policy setting, the WinRM client sends or receives only encrypted ...
"Allow Basic authentication"
This policy setting allows you to manage whether the Windows Remote Management (WinRM) service accepts Basic authentication from a remote client.
If you enable this policy setting, the WinRM service will accept Basic authentication from a remote client.
If you disable or do not configure this policy setting, the WinRM service will not accept Basic authentication fro ...
"Enable insecure guest logons"
This policy setting determines if the SMB client will allow insecure guest logons to an SMB server.
If you enable this policy setting or if you do not configure this policy setting, the SMB client will allow insecure guest logons.
If you disable this policy setting, the SMB client will reject insecure guest logons.
Insecure guest logons are used by file servers t ...
"Untrusted Font Blocking"
This security feature provides a global setting to prevent programs from loading untrusted fonts. Untrusted fonts are any font installed outside of the %windir%\Fonts directory. This feature can be configured to be in 3 modes: On, Off, and Audit. By default, it is Off and no fonts are blocked. If you aren't quite ready to deploy this feature into your organization, you c ...
"Use enhanced anti-spoofing when available"
This policy setting determines whether enhanced anti-spoofing is configured for devices which support it.
If you do not configure this policy setting, users will be able to choose whether or not to use enhanced anti-spoofing on supported devices.
If you enable this policy setting, Windows will require all users on the device to use anti-spoofing for f ...
"Send file samples when further analysis is required"
This policy setting configures behavior of samples submission when opt-in for MAPS telemetry is set.
Possible options are:
(0x0) Always prompt
(0x1) Send safe samples automatically
(0x2) Never send
(0x3) Send all samples automatically
Enabling or not configuring this s ...
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2363
© 2013 SecPod Technologies