[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 30426 Download | Alert*

This policy setting prevents disables Internet explorer. If you enable this policy setting, Internet explorer will be disabled If you disable this policy setting, Internet explorer will be Enabled Fix:(1) GPO: GPO: Computer Configuration\Policies\Administrative Templates\Windows Components\Internet Explorer\Disable Internet Explorer 11 as a standalone browser(2) REG: HKEY_LOCAL_MACHINE\SOFTWARE\ ...

This policy setting controls the configuration under which the Local Security AuthoritySubsystem Service (LSASS) will load custom Security Support Provider/Authentication Package (SSP/AP). The recommended state for this setting is: Disabled . Potential Impact: Custom Security Support Provider/Authentication Packages will not be permitted to load this may impact some legitimate third-party p ...

This policy setting controls whether users who aren't Administrators can install print drivers on the system. The recommended state for this setting is: Enabled. Note: On August 10, 2021, Microsoft announced a Point and Print Default Behavior Change which modifies the default Point and Print driver installation and update behavior to require Administrator privileges. This is documented in KB500 ...

Audit log files _MUST_ be owned by root. The audit service _MUST_ be configured to create log files with the correct ownership to prevent normal users from reading audit logs. Audit logs contain sensitive data about the system and users. If log files are set to only be readable and writable by system administrators, the risk is mitigated. Fix: /usr/sbin/chown -R root $(/usr/bin/grep '^dir' /et ...

Audit log files _MUST_ be owned by root. The audit service _MUST_ be configured to create log files with the correct ownership to prevent normal users from reading audit logs. Audit logs contain sensitive data about the system and users. If log files are set to only be readable and writable by system administrators, the risk is mitigated. Fix: /usr/sbin/chown root $(/usr/bin/awk -F : '/^dir/{p ...

The built-in web server is a non-essential service built into macOS and _MUST_ be disabled. Fix: /bin/launchctl disable system/org.apache.httpd

macOS has a privilege that can be granted to any user that will allow that user to unlock active users sessions. Disabling the admins and/or users ability to log into another users active and locked session prevents unauthorized persons from viewing potentially sensitive and/or personal information. While Fast user switching is a workaround for some lab environments especially where there is ev ...

By automatically installing app store updates in the background, the user safeguarded from potential vulnerabilities in the previous version of the App Store. Fix: defaults write /Library/Preferences/com.apple.commerce AutoUpdate -bool true

The owner of the /etc/syslog.conf file must be root. The syslog.conf file is the configuration file for the syslogd(8) program. It consists of lines with two fields: the selector field which specifies the types of messages and priorities to which the line applies, and an action field which specifies the action to be taken if a message syslogd receives matches the selection criteria. The selector f ...

The kernel extension for Wi-Fi network devices such as Airport must be removed to ensure that users will not be able to reactivate wireless networking at a later time. System updates will sometimes replace deleted kernel extensions. Administrator users may need to periodically check to ensure that the file remains deleted. Alternately, the wireless card hardware may be removed from the system. Fi ...


Pages:      Start    17    18    19    20    21    22    23    24    25    26    27    28    29    30    ..   3042

© SecPod Technologies