[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 193826 Download | Alert*

This setting specifies whether the computer will act as a BITS peercaching client. By default, when BITS peercaching is enabled, the computer acts as both a peercaching server (offering files to its peers) and a peercaching client (downloading files from its peers). If you enable this setting, the computer will no longer use the BITS Peercaching feature to download files; files will be downloaded ...

By auditing access restriction enforcement, changes to application and OS configuration files can be audited. Without auditing the enforcement of access restrictions, it will be difficult to identify attempted attacks and an audit trail will not be available for forensic investigation. Enforcement actions are the methods or mechanisms used to prevent unauthorized changes to configuration settings. ...

The "Deny log on as a service (SeDenyServiceLogonRight)" setting should be configured correctly.

Specifies whether Windows can access the Internet to accomplish tasks that require Internet resources. If this setting is enabled, all of the the policy settings listed in the Internet Communication settings section will be set such that their respective features can not access the Internet. If this setting is disabled, all of the the policy settings listed in the 'Internet Communicatio ...

Hide or display the restart button in the login window. In loginwindow.plist, set the RestartDisabled key = true to hide the buttons. If the key does not exist, the button is displayed.

The kernel runtime parameter "net.ipv4.conf.default.secure_redirects" should be set to "0".

The Prompt user when a slow network connection is detected machine setting should be configured correctly. This policy setting provides users with the ability to download their roaming profile, even when a slow network connection with their roaming profile server is detected. If you enable this policy setting, users will be allowed to define whether they want their roaming profile to be downloade ...

The Network control service type link layer (Layer-2) priority value should be configured correctly. Specifies an alternate link layer (Layer-2) priority value for packets with the Network Control service type (ServiceTypeNetworkControl). The Packet Scheduler inserts the corresponding priority value in the Layer-2 header of the packets. If you enable this setting, you can change the default prio ...

The /usr/lib/cron/cron.allow file should not have an extended ACL. Use the chmod command to apply or remove the extended ACL permissions as appropriate.

This policy setting determines the priority order of ECC curves used with ECDHE cipher suites. If you enable this policy setting, ECC curves are prioritized in the order specified.(Enter one Curve name per line) If you disable or do not configure this policy setting, the default ECC curve order is used. Default Curve Order ============ NistP256 NistP384 To See all ...


Pages:      Start    11710    11711    11712    11713    11714    11715    11716    11717    11718    11719    11720    11721    11722    11723    ..   19382

© SecPod Technologies