|Paid content will be excluded from the download.
| Matches : 58637
|"Network access: Let Everyone permissions apply to anonymous users"
This policy setting determines what additional permissions are assigned for anonymous connections to the computer. If you enable this policy setting, anonymous Windows users are allowed to perform certain activities, such as enumerate the names of domain accounts and network shares. An unauthorized user could anonymously list acc ...
"Domain member: Digitally sign secure channel data (when possible)"
This policy setting determines whether a domain member should attempt to negotiate whether all secure channel traffic that it initiates must be digitally signed. Digital signatures protect the traffic from being modified by anyone who captures the data as it traverses the network.
Microsoft recommends to configure the Domain memb ...
"Audit Policy: System: IPsec Driver"
This subcategory reports on the activities of the Internet Protocol security (IPsec) driver. Events for this subcategory include:
- 4960: IPsec dropped an inbound packet that failed an integrity check. If this problem persists, it could indicate a network issue or that packets are being modified in transit to this computer. Verify that the packets sent from t ...
"Audit Policy: Logon-Logoff: Account Lockout"
This subcategory reports when a user's account is locked out as a result of too many failed logon attempts. Events for this subcategory include:
- 4625: An account failed to log on.
Refer to the Microsoft Knowledgebase article 'Description of security events in Windows Vista and in Windows Server 2008' for the most recent information about this sett ...
"Windows Firewall: Domain: Outbound connections"
This setting determines the behavior for outbound connections that do not match an outbound firewall rule. In Windows Vista, the default behavior is to allow connections unless there are firewall rules that block the connection.
Some people believe that it is prudent to block all outbound connections except those specifically a ...
"Audit Policy: Logon-Logoff: Logoff"
This subcategory reports when a user logs off from the system. These events occur on the accessed computer. For interactive logons, the generation of these events occurs on the computer that is logged on to. If a network logon takes place to access a share, these events generate on the computer that hosts the accessed resource. If you configure this setting to ...
"Audit Policy: Policy Change: Authentication Policy Change"
This subcategory reports changes in authentication policy. Events for this subcategory include:
- 4706: A new trust was created to a domain.
- 4707: A trust to a domain was removed.
- 4713: Kerberos policy was changed.
- 4716: Trusted domain information was modified.
- 4717: System security access was granted to an account.
- 4 ...
"Profile single process"
This policy setting determines which users can use tools to monitor the performance of non-system processes. Typically, you do not need to configure this user right to use the Microsoft Management Console (MMC) Performance snap-in. However, you do need this user right if System Monitor is configured to collect data using Windows Management Instrumentation (WMI). Restricti ...
"Audit Policy: System: Other System Events"
This subcategory reports on other system events. Events for this subcategory include:
- 5024 : The Windows Firewall Service has started successfully.
- 5025 : The Windows Firewall Service has been stopped.
- 5027 : The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the ...
"Network access: Do not allow anonymous enumeration of SAM accounts and shares"
This policy setting controls the ability of anonymous users to enumerate SAM accounts as well as shares. If you enable this policy setting, anonymous users will not be able to enumerate domain account user names and network share names on the workstations in your environment.
The Network access: Do not allow anonymous ...
Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   5863
© 2013 SecPod Technologies