Microsoft Windows Server 2012 R2
AWS
No policies.
Azure
Category Name | Policy Name |
---|---|
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: Account Logon: Credential Validation |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: Account Management: Other Account Management Events |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: Account Management: Security Group Management |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: Account Management: User Account Management |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: Detailed Tracking: Process Creation |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: Logon-Logoff: Account Lockout |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: Logon-Logoff: Logoff |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: Logon-Logoff: Logon |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure' |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: Logon-Logoff: Special Logon |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Ensure 'Audit Removable Storage' is set to 'Success and Failure' |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: Policy Change: Audit Policy Change' |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: Policy Change: Authentication Policy Change |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: Privilege Use: Sensitive Privilege Use |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: System: Security State Change |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: System: Security System Extension |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Policy: System: System Integrity |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit MPSSVC Rule-Level Policy Change |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Other Privilege Use Events |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Other Object Access Events |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit RPC Events |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Registry |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit Other Policy Change Events |
Win OS-12R2 - Audit Policy | Windows 2012R2 - Audit SAM |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Allow Basic authentication' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Do not allow passwords to be saved' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Network access: Do not allow anonymous enumeration of SAM accounts |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Network access: Do not allow anonymous enumeration of SAM accounts and shares |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Enable RPC Endpoint Mapper Client Authentication' is set to 'Enabled' (MS only) |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'System: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Turn off app notifications on the lock screen' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Interactive logon: Do not display last user name' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Interactive logon: Do not require CTRL+ALT+DEL' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Microsoft network client: Send unencrypted password to third-party SMB servers' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Microsoft network server: Idle time required before suspending session' is set to '15 or fewer minute(s), but not 0' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Microsoft network client: Digitally sign communications (if server agrees)' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Prevent enabling lock screen camera' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Prevent enabling lock screen slide show' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Minimize the number of simultaneous connections to the Internet or a Windows Domain' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Boot-Start Driver Initialization Policy' is set to 'Enabled: Good, unknown and bad but critical' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Turn off downloading of print drivers over HTTP' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Do not display network selection UI' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Allow Microsoft accounts to be optional' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Configure 'Network access: Remotely accessible registry paths' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Always install with elevated privileges' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Allow unencrypted traffic' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Allow user control over installs' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Always prompt for password upon connection' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Configure 'Network access: Remotely accessible registry paths and sub-paths' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Configure Solicited Remote Assistance' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Disallow Digest authentication' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Security: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Windows Firewall: Private: Settings: Apply local firewall rules' is set to 'Yes (default)' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Turn off heap termination on corruption' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Turn off Autoplay' is set to 'Enabled: All drives' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Network Security: Allow PKU2U authentication requests to this computer to use online identities' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Turn off shell protocol protected mode' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Do not display the password reveal button' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Network security: Allow Local System to use computer identity for NTLM' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Automatically send memory dumps for OS-generated error reports' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Windows Firewall: Private: Firewall state' is set to 'On (recommended)' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Configure Default consent' is set to 'Enabled: Send all data' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'System: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Include command line in process creation events' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Network Security: Configure encryption types allowed for Kerberos' is set to 'RC4_HMAC_MD5, AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Sign-in last interactive user automatically after a system-initiated restart' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Prevent downloading of enclosures' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Set the default behavior for AutoRun' is set to 'Enabled: Do not execute any autorun commands' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Security: Specify the maximum log file size (KB)' is set to 'Enabled: 196,608 or greater' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Turn on convenience PIN sign-in' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Setup: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Set client connection encryption level' is set to 'Enabled: High Level' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Setup: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Application: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Application: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Windows Firewall: Domain: Firewall state' is set to 'On (recommended)' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Network security: LAN Manager authentication level' is set to 'Send NTLMv2 response only. Refuse LM & NTLM' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Require secure RPC communication' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Turn off Data Execution Prevention for Explorer' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Do not delete temp folders upon exit' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Disallow Autoplay for non-volume devices' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Windows Firewall: Public: Settings: Apply local firewall rules' is set to 'No' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Configure Offer Remote Assistance' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Disallow WinRM from storing RunAs credentials' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Do not use temporary folders per session' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Network access: Sharing and security model for local accounts |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Network security: Minimum session security for NTLM SSP based (including secure RPC) clients |
Win OS-12R2 - Registry Policy | Windows 2012R2 - System objects: Require case insensitivity for non-Windows subsystems |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Network access: Let Everyone permissions apply to anonymous users |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Network security: LDAP client signing requirements |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Network access: Restrict anonymous access to Named Pipes and Shares |
Win OS-12R2 - Registry Policy | Windows 2012R2 - User Account Control: Admin Approval Mode for the Built-in Administrator account |
Win OS-12R2 - Registry Policy | Windows 2012R2 - 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Network security: Minimum session security for NTLM SSP based (including secure RPC) servers |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Network security: Do not store LAN Manager hash value on next password change |
Win OS-12R2 - Registry Policy | Windows 2012R2 - System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Network security: Allow LocalSystem NULL session fallback |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Windows Firewall: Public: Display a notification |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Windows Firewall: Public: Outbound connections |
Win OS-12R2 - Registry Policy | Windows 2012R2 - User Account Control: Run all administrators in Admin Approval Mode |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Windows Firewall: Domain: Display a notification |
Win OS-12R2 - Registry Policy | Windows 2012R2 - User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Windows Firewall: Private: Display a notification |
Win OS-12R2 - Registry Policy | Windows 2012R2 - User Account Control: Behavior of the elevation prompt for standard users |
Win OS-12R2 - Registry Policy | Windows 2012R2 - User Account Control: Only elevate UIAccess applications that are installed in secure locations |
Win OS-12R2 - Registry Policy | Windows 2012R2 - User Account Control: Detect application installations and prompt for elevation |
Win OS-12R2 - Registry Policy | Windows 2012R2 - User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop |
Win OS-12R2 - Registry Policy | Windows 2012R2 - User Account Control: Virtualize file and registry write failures to per-user locations |
Win OS-12R2 - Registry Policy | Windows 2012R2 - User Account Control: Switch to the secure desktop when prompting for elevation |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Windows Firewall: Domain: Outbound connections |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Windows Firewall: Private: Outbound connections |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Devices: Allow undock without having to log on |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Enable Windows NTP Client' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Disable SMB v1 server |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Always use classic logon' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Detect change from default RDP port |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Disable Windows Search Service |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Require user authentication for remote connections by using Network Level Authentication |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Windows Firewall: Private: Settings: Apply local connection security rules' is set to 'Yes (default)' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Turn off Internet Connection Wizard if URL connection is referring to Microsoft.com' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Windows Firewall: Domain: Settings: Apply local firewall rules' is set to 'Yes (default)' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Windows Firewall: Domain: Settings: Apply local connection security rules' is set to 'Yes (default)' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Recovery console: Allow floppy copy and access to all drives and all folders |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Specify the interval to check for definition updates |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Windows Firewall: Private: Allow unicast response |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Windows Firewall: Domain: Allow unicast response |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Ensure 'Prohibit use of Internet Connection Sharing on your DNS domain network' is set to 'Enabled' |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Shutdown: Clear virtual memory pagefile |
Win OS-12R2 - Registry Policy | Windows 2012R2 - Windows Firewall: Public: Allow unicast response |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Enforce password history' is set to '24 or more password(s)' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Maximum password age' is set to '70 or fewer days, but not 0' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Minimum password age' is set to '1 or more day(s)' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Minimum password length' is set to '14 or more character(s)' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Password must meet complexity requirements' is set to 'Enabled' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Store passwords using reversible encryption' is set to 'Disabled' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Access Credential Manager as a trusted caller' is set to 'No One' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Configure 'Access this computer from the network' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Act as part of the operating system' is set to 'No One' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Allow log on locally' is set to 'Administrators' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Configure 'Allow log on through Remote Desktop Services' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Back up files and directories' is set to 'Administrators' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Create a pagefile' is set to 'Administrators' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Create a token object' is set to 'No One' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Create permanent shared objects' is set to 'No One' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Configure 'Create symbolic links' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Configure 'Deny access to this computer from the network' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Deny log on as a batch job' to include 'Guests' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Deny log on as a service' to include 'Guests' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Deny log on locally' to include 'Guests' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Configure 'Deny log on through Remote Desktop Services' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Configure 'Enable computer and user accounts to be trusted for delegation' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Force shutdown from a remote system' is set to 'Administrators' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Increase scheduling priority' is set to 'Administrators' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Load and unload device drivers' is set to 'Administrators' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Lock pages in memory' is set to 'No One' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Configure 'Manage auditing and security log' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Modify an object label' is set to 'No One' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Modify firmware environment values' is set to 'Administrators' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Perform volume maintenance tasks' is set to 'Administrators' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Profile single process' is set to 'Administrators' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Restore files and directories' is set to 'Administrators' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Shut down the system' is set to 'Administrators' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Take ownership of files or other objects' is set to 'Administrators' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only) |
Win OS-12R2 - Security Policy | Windows 2012R2 - Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE-WdiServiceHost' |
Win OS-12R2 - Security Policy | Windows 2012R2 - Increase a process working set |
Win OS-12R2 - Security Policy | Windows 2012R2 - Bypass traverse checking |