Lack of information on access to sensitive files and folders in the system. Lack of this type of information will prevent identification of intruders to the system, as well as inability to check access to the server or its resources.Ĭomputer Configuration → Policies → Windows Settings → Security Settings → Advance Audit Policy Configuration → Logon\LogoffĬomputer Configuration → Policies → Windows Settings → Security Settings → Advance Audit Policy Configuration → Object Access Lack of information on user management in the system (addition and removal of users). Lack of this type of information will prevent identification of intruders to the system, as well as inability to check access to the server or its resources.Ĭomputer Configuration → Policies → Windows Settings → Security Settings → Advance Audit Policy Configuration → Account Management Lack of information on unauthorized user login attempt. This setting enables the use of advance auditing in the operating systemĬomputer Configuration → Policies → Windows Settings → Security Settings → Advance Audit Policy Configuration → Logon Account There is no protection against a user with physical and remote desktop access to the server.Ĭomputer Configuration → Policies → Windows Settings → Security Settings → Local Policies /Security OptionsĪudit: Force audit policy subcategory settings to override audit policy category settings User Configuration → Policies → Administrative Templates → Control Panel/Personalization This topic lists the hardening settings of the GPO.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |