|Paid content will be excluded from the download.
| Matches : 23631
|Account lockout threshold
This policy setting determines the number of failed logon attempts before a lock occurs. Authorized users can lock themselves out of an account by mistyping their password or by remembering it incorrectly, or by changing their password on one computer while logged on to another computer. The computer with the incorrect password will continuously try to authenticate the u ...
Network access: Restrict anonymous access to Named Pipes and Shares
When enabled, this policy setting restricts anonymous access to only those shares and pipes that are named in the Network access: Named pipes that can be accessed anonymously and Network access: Shares that can be accessed anonymously settings. This policy setting controls null session access to shares on your computers by adding ...
Audit Policy: Detailed Tracking: Process Creation
This subcategory reports the creation of a process and the name of the program or user that created it. Events for this subcategory include:
? 4688: A new process has been created.
? 4696: A primary token was assigned to process.
Refer to the Microsoft Knowledgebase article ?Description of security events in Windows Vista and in Windows Server 200 ...
Audit Policy: Logon-Logoff: IPsec Extended Mode
This subcategory reports the results of AuthIP during Extended Mode negotiations. Events for this subcategory include:
? 4978: During Extended Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.
? 4979: IPsec Main Mode and Ext ...
Network access: Do not allow anonymous enumeration of SAM accounts and shares
This policy setting controls the ability of anonymous users to enumerate SAM accounts as well as shares. If you enable this policy setting, anonymous users will not be able to enumerate domain account user names and network share names on the workstations in your environment.
The Network access: Do not allow anonymous e ...
Configure log access
This policy setting specifies to use the security descriptor for the log using the Security Descriptor Definition Language (SDDL) string.
If you enable this policy setting, only those users matching the security descriptor can access the log.
If you disable or do not configure this policy setting, all authenticated users and system services can write, read, or clear th ...
Specify the maximum log file size (KB)
This policy setting specifies the maximum size of the log file in kilobytes.
If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes) in kilobyte increments.
If you disable or do not configure this policy setting, the maximum size of the log file will ...
System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing
This policy setting determines whether the Transport Layer Security/Secure Sockets Layer (TLS/SSL) Security Provider supports only the TLS_RSA_WITH_3DES_EDE_CBC_SHA cipher suite. Although this policy setting increases security, most public Web sites that are secured with TLS or SSL do not support these algorit ...
Domain member: Digitally encrypt or sign secure channel data (always)
This policy setting determines whether all secure channel traffic that is initiated by the domain member must be signed or encrypted. If a system is set to always encrypt or sign secure channel data, it cannot establish a secure channel with a domain controller that is not capable of signing or encrypting all secure channel tra ...
Audit Policy: System: Security System Extension
This subcategory reports the loading of extension code such as authentication packages by the security subsystem. Events for this subcategory include:
? 4610: An authentication package has been loaded by the Local Security Authority.
? 4611: A trusted logon process has been registered with the Local Security Authority.
? 4614: A notification packa ...
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2363
© 2013 SecPod Technologies