[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 30475 Download | Alert*

SSH version 1 protocol support should be enabled or disabled as appropriate.

Disable: 'Restrict delegation of credentials to remote servers' When running in restricted mode, participating apps do not expose credentials to remote computers (regardless of the delegation method). Restricted mode may limit access to resources located on other servers or networks beyond the target computer because credentials are not delegated. Participating apps: Remote Desktop Client ...

'Specify the interval to run quick scans per day' (QuickScanInterval in hours Min:0 Max:24) This policy setting allows you to specify an interval at which to perform a quick scan. The time value is represented as the number of hours between quick scans. Valid values range from 1 (every hour) to 24 (once per day). If set to zero, interval quick scans will not occur. By default, this setting is set ...

Disable: 'Configure use of passwords for removable data drives' for RDVPassphrase This policy setting allows you to specify whether smart cards can be used to authenticate user access to BitLocker-protected removable data drives on a computer. If you enable this policy setting smart cards can be used to authenticate user access to the drive. You can require a smart card authentication by sele ...

The startup type of the Remote Storage Server service should be correct.

The calendar manager should be enabled or disabled as appropriate.

The startup type of the System Event Notification service should be correct.

The startup type of the Services for Unix Server for NFS service should be correct.

Audit Policy: Object Access: Central Access Policy Staging This policy setting allows you to audit access requests where the permission granted or denied by a proposed policy differs from the current central access policy on an object. If you configure this policy setting, an audit event is generated each time a user accesses an object and the permission granted by the current central access poli ...

The telnet-server package should be installed or uninstalled as appropriate.


Pages:      Start    2624    2625    2626    2627    2628    2629    2630    2631    2632    2633    2634    2635    2636    2637    ..   3047

© SecPod Technologies