SSL Cipher Suite Order | Computer |
Windows Firewall: Allow authenticated IPsec bypass | Computer |
Windows Firewall: Allow ICMP exceptions | Computer |
Windows Firewall: Allow inbound file and printer sharing exception | Computer |
Windows Firewall: Allow inbound remote administration exception | Computer |
Windows Firewall: Allow inbound Remote Desktop exceptions | Computer |
Windows Firewall: Allow inbound UPnP framework exceptions | Computer |
Windows Firewall: Allow local port exceptions | Computer |
Windows Firewall: Allow local program exceptions | Computer |
Windows Firewall: Allow logging | Computer |
Windows Firewall: Define inbound port exceptions | Computer |
Windows Firewall: Define inbound program exceptions | Computer |
Windows Firewall: Do not allow exceptions | Computer |
Windows Firewall: Prohibit notifications | Computer |
Windows Firewall: Prohibit unicast response to multicast or broadcast requests | Computer |
Windows Firewall: Protect all network connections | Computer |
Windows Firewall: Allow ICMP exceptions | Computer |
Windows Firewall: Allow inbound file and printer sharing exception | Computer |
Windows Firewall: Allow inbound remote administration exception | Computer |
Windows Firewall: Allow inbound Remote Desktop exceptions | Computer |
Windows Firewall: Allow inbound UPnP framework exceptions | Computer |
Windows Firewall: Allow local port exceptions | Computer |
Windows Firewall: Allow local program exceptions | Computer |
Windows Firewall: Allow logging | Computer |
Windows Firewall: Define inbound port exceptions | Computer |
Windows Firewall: Define inbound program exceptions | Computer |
Windows Firewall: Do not allow exceptions | Computer |
Windows Firewall: Prohibit notifications | Computer |
Windows Firewall: Prohibit unicast response to multicast or broadcast requests | Computer |
Windows Firewall: Protect all network connections | Computer |
Update Security Level | Computer |
Update Top Level Domain Zones | Computer |
Disable password strength validation for Peer Grouping | Computer |
Communities | Computer |
Permitted Managers | Computer |
Traps for public community | Computer |
Allow local activation security check exemptions | Computer |
Define Activation Security Check exemptions | Computer |
IP Security policy processing | Computer |
Wired policy processing | Computer |
Wireless policy processing | Computer |
Define host name-to-Kerberos realm mappings | Computer |
Define interoperable Kerberos V5 realm settings | Computer |
Require strict KDC validation | Computer |
Allow cryptography algorithms compatible with Windows NT 4.0 | Computer |
Contact PDC on log-on failure | Computer |
Expected dial-up delay on logon | Computer |
Final DC Discovery Retry Setting for Background Callers | Computer |
Initial DC Discovery Retry Setting for Background Callers | Computer |
Log File Debug Output Level | Computer |
Maximum DC Discovery Retry Interval Setting for Background Callers | Computer |
Maximum Log File Size | Computer |
Negative DC Discovery Cache Setting | Computer |
Netlogon share compatibility | Computer |
Positive Periodic DC Cache Refresh for Background Callers | Computer |
Positive Periodic DC Cache Refresh for Non-Background Callers | Computer |
Scavenge Interval | Computer |
Site Name | Computer |
Sysvol share compatibility | Computer |
Automated Site Coverage by the DC Locator DNS SRV Records | Computer |
DC Locator DNS records not registered by the DCs | Computer |
Domain Controller Address Type Returned | Computer |
Dynamic Registration of the DC Locator DNS Records | Computer |
Force Rediscovery Interval | Computer |
Location of the DCs hosting a domain with single label DNS name | Computer |
Priority Set in the DC Locator DNS SRV Records | Computer |
Refresh Interval of the DC Locator DNS Records | Computer |
Sites Covered by the Application Directory Partition Locator DNS SRV Records | Computer |
Sites Covered by the DC Locator DNS SRV Records | Computer |
Sites Covered by the GC Locator DNS SRV Records | Computer |
Try Next Closest Site | Computer |
TTL Set in the DC Locator DNS Records | Computer |
Weight Set in the DC Locator DNS SRV Records | Computer |
Restrictions for Unauthenticated RPC clients | Computer |
RPC Endpoint Mapper Client Authentication | Computer |
RPC Troubleshooting State Information | Computer |
Network Access Protection: Support XP 802.1x QEC | Computer |
Always prompt for password upon connection | Computer |
Do not allow local administrators to customize permissions | Computer |
Require secure RPC communication | Computer |
Require use of specific security layer for remote (RDP) connections | Computer |
Require user authentication using RDP 6.0 for remote connections | Computer |
Server Authentication Certificate Template | Computer |
Set client connection encryption level | Computer |
Allow Basic authentication | Computer |
Allow unencrypted traffic | Computer |
Disallow Digest authentication | Computer |
Disallow Kerberos authentication | Computer |
Disallow Negotiate authentication | Computer |
Trusted Hosts | Computer |
Allow automatic configuration of listeners | Computer |
Allow Basic authentication | Computer |
Allow unencrypted traffic | Computer |
Disallow Kerberos authentication | Computer |
Disallow Negotiate authentication | Computer |
Allow Remote Shell Access | Computer |
MaxConcurrentUsers | Computer |
Specify idle Timeout | Computer |
Specify maximum amount of memory in MB per Shell | Computer |
Specify maximum number of processes per Shell | Computer |
Specify maximum number of remote shells per user | Computer |
Specify Shell Timeout | Computer |
Maximum lifetime for service ticket | Computer |
Maximum lifetime for user ticket | Computer |
Maximum lifetime for user ticket renewal | Computer |
Maximum tolerance for computer clock synchronization | Computer |
DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax | Computer |
DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax | Computer |
Domain controller: LDAP server signing requirements | Computer |
Domain member: Digitally encrypt or sign secure channel data (always) | Computer |
Domain member: Digitally encrypt secure channel data (when possible) | Computer |
Domain member: Digitally sign secure channel data (when possible) | Computer |
Domain member: Disable machine account password changes | Computer |
Domain member: Require strong (Windows 2000 or later) session key | Computer |
Microsoft network client: Digitally sign communications (always) | Computer |
Microsoft network client: Digitally sign communications (if server agrees) | Computer |
Microsoft network client: Send unencrypted password to third-party SMB servers | Computer |
Microsoft network server: Amount of idle time required before suspending session | Computer |
Microsoft network server: Digitally sign communications (always) | Computer |
Microsoft network server: Digitally sign communications (if client agrees) | Computer |
Microsoft network server: Disconnect clients when log-on hours expire | Computer |
Network access: Allow anonymous SID/Name translation | Computer |
Network access: Do not allow anonymous enumeration of SAM accounts | Computer |
Network access: Do not allow anonymous enumeration of SAM accounts and shares | Computer |
Network access: Do not allow storage of credentials or .NET Passports for network authentication | Computer |
Network access: Let Everyone permissions apply to anonymous users | Computer |
Network access: Named Pipes that can be accessed anonymously | Computer |
Network access: Remotely accessible registry paths | Computer |
Network access: Remotely accessible registry paths | Computer |
Network access: Remotely accessible registry paths and subpaths | Computer |
Network access: Restrict anonymous access to Named Pipes and Shares | Computer |
Network access: Shares that can be accessed anonymously | Computer |
Network access: Sharing and security model for local accounts | Computer |
Network security: Do not store LAN Manager hash value on next password change | Computer |
Network security: Force logoff when log-on hours expire | Computer |
Network security: LAN Manager authentication level | Computer |
Network security: LDAP client signing requirements | Computer |
Network security: Minimum session security for NTLM SSP based (including secure RPC) clients | Computer |
Network security: Minimum session security for NTLM SSP based (including secure RPC) servers | Computer |
Registry | Computer |
Data Sources | Computer |
Services | Computer |