|Paid content will be excluded from the download.
| Matches : 78064
|This security setting determines which users can use performance monitoring tools to monitor the performance of system processes.
(1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Profile system performance
(2) REG: INFO NOT AVAILABLE
This security setting determines whether local accounts that are not password protected can be used to log on from locations other than the physical computer console. If enabled, local accounts that are not password protected will only be able to log on at the computer's keyboard.
Computers that are not in physically secure locations should always enforce strong ...
Windows Vista and later versions of Windows allow audit policy to be managed in a more precise way using audit policy subcategories. Setting audit policy at the category level will override the new subcategory audit policy feature. Group Policy only allows audit policy to be set at the category level, and existing group policy may override the subcategory settings of new machines as they are joi ...
This value determines if access to the floppy drive is restricted to locally logged-on users. 1 = restricted
This security setting determines whether removable floppy media are accessible to both local and remote users simultaneously.
If this policy is enabled, it allows only the interactively logged-on user to access removable floppy media. If this policy is enabled and no one is logged on inte ...
This security setting determines whether the name of the last user to log on to the computer is displayed in the Windows logon screen.
If this policy is enabled, the name of the last user to successfully log on is not displayed in the Logon Screen. ".
If this policy is disabled, the name of the last user to log on is displayed.
(1) GPO: Computer Configuration\Wind ...
This security setting determines the amount of continuous idle time that must pass in a Server Message Block (SMB) session before the session is suspended due to inactivity.
Administrators can use this policy to control when a computer suspends an inactive SMB session. If client activity resumes, the session is automatically reestablished.
For this policy setting, a value of 0 means to disconnec ...
When enabled, this security setting restricts anonymous access to shares and pipes to the settings for:
Network access: Named pipes that can be accessed anonymously
Network access: Shares that can be accessed anonymously
The server service restricts unauthenticated clients access to named resources. Null sessions are a weakness that can be exploited through shares (including t ...
This security setting determines how network logons that use local accounts are authenticated. If this setting is set to Classic, network logons that use local account credentials authenticate by using those credentials. The Classic model allows fine control over access to resources. By using the Classic model, you can grant different types of access to different users for the same resource.
If th ...
This security setting allows a client to require the negotiation of 128-bit encryption and/or NTLMv2 session security. These values are dependent on the LAN Manager Authentication Level security setting value. The options are:
Require NTLMv2 session security: The connection will fail if NTLMv2 protocol is not negotiated.
Require 128-bit encryption: The connection will fail if strong encryption (1 ...
IP source routing is a mechanism that allows the sender to determine the IP route that a datagram should take through the network. Microsoft recommends to configure this setting to Not Defined for enterprise environments and to Highest Protection for high security environments to completely disable source routing. HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\DisableIPSourceRouting
Pages:      Start    12    13    14    15    16    17    18    19    20    21    22    23    24    25    ..   7806
© 2013 SecPod Technologies