|Paid content will be excluded from the download.
| Matches : 80878
|This subcategory reports when applications attempt to generate audit events by using the Windows auditing application programming interfaces (APIs). Events for this subcategory include:
? 4665: An attempt was made to create an application client context.
? 4666: An application attempted an operation:
? 4667: An application client context was deleted.
? 4668: An application was initialized.
This policy setting determines the least number of characters that make up a password for a user account. There are many different theories about how to determine the best password length for an organization, but perhaps pass phrase is a better term than password. In Microsoft Windows 2000 or later, pass phrases can be quite long and can include spaces. Therefore, a phrase such as I want to drink ...
This policy setting determines which registry paths and sub-paths will be accessible when an application or process references the WinReg key to determine access permissions.
Note: In Windows XP this setting is called Network access: Remotely accessible registry paths, the setting with that same name in Windows Vista, Windows Server 2008, and Windows Server 2003 does not exist in Windows XP.
This subcategory reports the creation of a process and the name of the program or user that created it. Events for this subcategory include:
? 4688: A new process has been created.
? 4696: A primary token was assigned to process.
Refer to the Microsoft Knowledgebase article ?Description of security events in Windows Vista and in Windows Server 2008? for the most recent information about this sett ...
This policy setting determines which communication sessions, or pipes, will have attributes and permissions that allow anonymous access.
Note: When you configure this setting you specify a list of one or more objects. The delimiter used when entering the list is a line feed or carriage return, that is, type the first object on the list, press the Enter button, type the next object, press Enter ag ...
This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following:
- ?\Program Files\, including subfolders
- ?\Program Files (x86)\, including subfolders for 64-bit versions of Windows
Note: Windows enforces a ...
This subcategory reports when a process terminates. Events for this subcategory include:
? 4689: A process has exited.
Refer to the Microsoft Knowledgebase article ?Description of security events in Windows Vista and in Windows Server 2008? for the most recent information about this setting: http://support.microsoft.com/default.aspx/kb/947226.
(1) GPO: Computer Configuration\Windows Settin ...
This subcategory reports the loading of extension code such as authentication packages by the security subsystem. Events for this subcategory include:
? 4610: An authentication package has been loaded by the Local Security Authority.
? 4611: A trusted logon process has been registered with the Local Security Authority.
? 4614: A notification package has been loaded by the Security Account Manager. ...
This subcategory reports generated by Kerberos ticket request processes on the domain controller that is authoritative for the domain account. Events for this subcategory include:
? 4769: A Kerberos service ticket was requested.
? 4770: A Kerberos service ticket was renewed.
? 4773: A Kerberos service ticket request failed.
Refer to the Microsoft Knowledgebase article ?Description of security eve ...
This policy setting checks all new passwords to ensure that they meet basic requirements for strong passwords.
When this policy is enabled, passwords must meet the following minimum requirements:
- Not contain the user&apos;s account name or parts of the user&apos;s full name that exceed two consecutive characters
- Be at least six characters in length
- Contain characters from three of t ...
Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   8087
© 2013 SecPod Technologies