|Paid content will be excluded from the download.
| Matches : 58637
|"Packaged app rules"
Allows you to enable or disable Packaged app rules.
Packaged apps (also known as Windows Store apps) are based on a model that ensures all the files within an app package share the same identity. With classic Win32 applications, each file within the application could have a unique identity. With Packaged apps, it is possible to control the entire application by using a sing ...
"Join Microsoft MAPS"
This policy setting allows you to join Microsoft MAPS. Microsoft MAPS is the online community that helps you choose how to respond to potential threats. The community also helps stop the spread of new malicious software infections.
You can choose to send basic or additional information about detected software. Additional information helps Microsoft create new definition ...
"Turn On Virtualization Based Security"
Specifies whether Virtualization Based Security is enabled.
Virtualization Based Security uses the Windows Hypervisor to provide support for security services. Virtualization Based Security requires Secure Boot, and can optionally be enabled with the use of DMA Protections. DMA protections require hardware support and will only be enabled on correctly conf ...
"Minimum password age"
This policy setting determines the number of days that you must use a password before you can change it. The range of values for this policy setting is between 1 and 999 days. (You may also set the value to 0 to allow immediate password changes.) The default value for this setting is 0 days.
Users may have favorite passwords that they like to use becaus ...
"Generate security audits"
This policy setting determines which users or processes can generate audit records in the Security log.
When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, or computers.
An attacker could use this capability to create a large numb ...
"Allow log on locally"
This policy setting determines which users can interactively log on to computers in your environment. Logons that are initiated by pressing the CTRL+ALT+DEL key sequence on the client computer keyboard require this user right. Users who attempt to log on through Terminal Services or IIS also require this user right.
The Guest account is assigned this user right by default. ...
"Always prompt for password upon connection"
This policy setting specifies whether Terminal Services always prompts the client computer for a password upon connection. You can use this policy setting to enforce a password prompt for users who log on to Terminal Services, even if they already provided the password in the Remote Desktop Connection client. By default, Terminal Services allows users ...
"Turn off Data Execution Prevention for Explorer"
Disabling data execution prevention can allow certain legacy plug-in applications to function without terminating Explorer.
Data Execution Prevention is an important security feature supported by Explorer that helps to limit the impact of certain types of malware.
We recommend that you disable this policy ...
"Audit Policy: Account Management: Computer Account Management"
This subcategory reports each event of computer account management, such as when a computer account is created, changed, deleted, renamed, disabled, or enabled. Events for this subcategory include:
- 4741: A computer account was created.
- 4742: A computer account was changed.
- 4743: A computer account was deleted.
Refer to the M ...
"Domain member: Require strong (Windows 2000 or later) session key"
When this policy setting is enabled, a secure channel can only be established with domain controllers that are capable of encrypting secure channel data with a strong (128-bit) session key.
To enable this policy setting, all domain controllers in the domain must be able to encrypt secure channel data with a strong key, which mean ...
Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   5863
© 2013 SecPod Technologies