Results 1 to 3 of 3

Thread: Security

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    [KoL$PiRtoR] KoLchE's Avatar
    Join Date: Aug:2005
    Location: [#:]
    Posts: 353

    Security

    .

    HKEY_LOCAL_MACHINE \SYSTEM \CurrentControlSet \Services :

    : Tcpip\Parameters: SynAttackProtect
    : REG_DWORD
    : 2

    : Tcpip\Parameters
    : TcpMaxHalfOpen
    : REG_DWORD
    : 100

    : Tcpip\Parameters
    : TcpMaxHalfOpenRetried
    : REG_DWORD
    : 80

    : Tcpip\Parameters
    : EnablePMTUDiscovery
    : REG_DWORD
    : 0

    : Tcpip\Parameters
    : EnableDeadGWDetect
    : REG_DWORD
    : 0

    : Tcpip\Parameters
    : KeepAliveTime
    : REG_DWORD
    : 300000

    : Tcpip\Parameters
    : EnableICMPRedirect
    : REG_DWORD
    : 0

    : Tcpip\Parameters\Interfaces\
    : PerformRouterDiscovery
    : REG_DWORD
    : 0

    : Netbt\Parameters
    : NoNameReleaseOnDemand
    : REG_DWORD
    : 1

    HKEY_LOCAL_MACHINE \SYSTEM \CurrentControlSet \Control :

    : Lsa
    : RestrictAnonymous
    : REG_DWORD
    :1
    ---------------------------------
    O Local Security Policy Administrative Tools.
    :

    Account Policies:

    -> Password Policy:
    Enforce password policy -- 0 passwords remembered
    Maximum password age -- 30
    Passwords must meet complexity requirements -- Enabled
    Minimum password length -- 10 .
    Account Lockout Policy
    Account Lockout Duration -- 30 .
    Account Lockout Threshold -- 5
    Reset account lockout counter after -- 30 .

    -> Local Policies -> Autid Policy:
    Audit account logon events -- Audit Success and Failure
    Audit account management -- Audit Success and Failure
    Audit directory service access -- Audit Success and Failure
    Audit logon events -- Audit Success and Failure
    Audit object access -- Audit Failure
    Audit policy change -- Audit Success and Failure
    Audit privilege use -- Audit Success and Failure
    Audit process tracking -- No auditing
    Audit system events -- No auditing

    -> Users Rights Assignments:
    Access this Computer from the network -- M
    Bypass transverse Checking -- M
    Log on locally -- ,
    Shut down the system -- .

    -> Security Options:
    Additional restrictions for anonymous connections -- Do not allow enumeration of SAM accounts and shares
    Do not display last user name in logon screen -- Enabled
    LAN Manager Authentication Level -- Send NTLMv2 response only/refuse LM & NTLM
    Message text for users attempting to log on -- . (This system is subject to usage logging and monitoring. Authorized Access only)
    Message tile for users attempting to log on -- Don't fuck!!
    Prevent System maintence of computer account password -- Enabled
    Recovery Console: Allows automatic Administrative logon -- Enabled
    Restrict CD-ROM access to locally logged-on user only -- Enabled
    Restrict Floppy Access to locally logged-on user only -- Enabled

    -------------
    ?

  2. #2
    chuck norris primetime's Avatar
    Join Date: Jan:2003
    Location: Sofia
    Posts: 4,717
    ...

    "Predifined Security Templates" - .
    - , , .
    I can be friendly when I desire to. Alas, the desire to be more intelligent does not make it so.
    ... - :/

  3. #3
    XaMaB's Avatar
    Join Date: Nov:2001
    Location:
    Posts: 20,392
    : XaMaB; . 0.42

    In God we Trust (all others must submit a X.509 certificate). , ()

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

Copyright © 1999-2011 . .
iskamPC.com | mobility.BG | Bloody's Techblog | | 3D Vision Blog |