[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194770 Download | Alert*

This policy setting allows Microsoft Windows to process user Group Policy settings asynchronously when logging on through Remote Desktop Services. Asynchronous user Group Policy processing is the default processing mode for Windows Vista and Windows XP. By default, Window Server processes user Group Policy settings synchronously. If you enable this policy setting, Windows applies user Group Poli ...

Computer Browser service maintains a listing of computers and resources located on the network. This service is not required on a standalone system. In fact, even if you want to browse the network (work-group or domain) or have mapped network shares as local hard drives, you can still do so. On a large network, one computer is designated the browser. All others just announce they are available ...

The "Take ownership of files or other objects (SeTakeOwnershipPrivilege)" setting should be configured correctly.

Plaintext authentication of mail clients should be enabled or disabled as appropriate.

This policy setting controls whether a device will automatically sign-in the last interactive user after Windows Update restarts the system. If you enable or do not configure this policy setting, the device securely saves the user's credentials (including the user name, domain and encrypted password) to configure automatic sign-in after a Windows Update restart. After the Windows Update ...

The RPM package xinetd should be removed.

The RPM package xinetd should be removed.

This security setting determines whether to audit when a user restarts or shuts down the computer or when an event occurs that affects either the system security or the security log. If you define this policy setting, you can specify whether to audit successes, audit failures, or not audit the event type at all. Success audits generate an audit entry when a system event is executed successfully. F ...

The operating system must automatically lock the account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded. By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the account. Setting a lock ...

The permissions on a file establish which users are permitted to access or modify it. An attacker may attempt to change the permissions on a file to prevent legitimate users from accessing it or to grant additional access to an account the attacker controls. Auditing successful and unsuccessful attempts to modify security objects such as file permissions mitigates this risk.


Pages:      Start    11610    11611    11612    11613    11614    11615    11616    11617    11618    11619    11620    11621    11622    11623    ..   19476

© SecPod Technologies