|Paid content will be excluded from the download.
| Matches : 24002
|Removable Disks: Deny write access
This policy setting denies write access to removable disks.
If you enable this policy setting, write access will be denied to this removable storage class.
If you disable or do not configure this policy setting, write access will be allowed to this removable storage class.
NOTE: To require that users write data to BitLocker-protected storage enable the policy ...
Remove browse dialog box for new source
Prevents users from searching for installation files when they add features or components to an installed program.
This setting disables the Browse button beside the 'Use feature from' list in the Windows Installer dialog box. As a result, users must select an installation file source from the 'Use features from' list that the system administrator configur ...
Remove Program Compatibility Property Page
This policy controls the visibility of the Program Compatibility property page shell extension. This shell extension is visible on the property context-menu of any program shortcut or executable file.
The compatibility property page displays a list of options that can be selected and applied to the application to resolve the most common issues affectin ...
Re-prompt for restart with scheduled installations
Specifies the amount of time for Automatic Updates to wait before prompting again with a scheduled restart.
If the status is set to Enabled, a scheduled restart will occur the specified number of minutes after the previous prompt for restart was postponed.
If the status is set to Disabled or Not Configured, the default interval is 10 minutes. ...
Require a PIN to access data on devices running Microsoft firmware
This policy setting requires users to enter a default personal identification number (PIN) to unlock and access data on the device after a specified period of inactivity (time-out period). This setting applies to Windows SideShow-compatible devices running Microsoft firmware.
If you enable this policy setting, users will be requi ...
Require strict KDC validation
This policy setting controls the Kerberos client's behavior in validating the KDC certificate.
If you enable this policy setting, the Kerberos client requires that the KDC's X.509 certificate contains the KDC key purpose object identifier in the Extended Key Usage (EKU) extensions, and that the KDC's X.509 certificate contains a dNSName subjectAltName (SAN) ...
Audit logon events
The prescribed GPOs from Microsoft include settings that configure the audit categories present in previous versions of Windows. If you use the script and the GPOs included with this security guidance, these settings will not apply to computers running Windows Vista.
The GPOs intended for use in enterprise environments have been designed to work with Windows XP based computers. ...
Audit system events
This policy setting is very important because it allows you to monitor system events that succeed and fail, and provides a record of these events that may help determine instances of unauthorized system access. System events include starting or shutting down computers in your environment, full event logs, or other security-related events that affect the entire system.
Check if AppLocker is Enabled
This configuration item uses PowerShell to check whether or not AppLocker policies are enabled on the system either locally or through Group Policy. It is designed to be exported within DCM packs.
To function it requires that the PowerShell execution policy be set to RemoteSigned.
AppLocker advances the features and functionality of Software Restriction Polici ...
Check for missing Windows Updates
This configuration item is a PowerShell-based script that checks to see if all required updates are installed.
It is designed to be exported within DCM Management Packs. To function it requires that the PowerShell execution policy be set to RemoteSigned.
You can control what is checked by configuring the appropriate Windows Update settings. In other word ...
Pages:      Start    17    18    19    20    21    22    23    24    25    26    27    28    29    30    ..   2400
© 2013 SecPod Technologies