Hacking and more...
HaCkinG CulT
|
Lista Forumurilor Pe Tematici
|
Hacking and more... | Reguli | Inregistrare | Login
POZE HACKING AND MORE...
Nu sunteti logat.
|
Nou pe simpatie: Madalina98251
| Femeie 24 ani Neamt cauta Barbat 26 - 42 ani |
|
rimagheo
Elite Member
Inregistrat: acum 18 ani
Postari: 950
|
|
1. Log in as Administrator 1.1. Type in Run secpol.msc orControl Panel->Administrative Tool->Local Security Polici or 2. Go to Start->Programs->Administrative Tools->Local Security Policy 2.1. If you do not see the Administrative Tools folder, you will need to enable it 2.2. Go to Start->Settings->Taskbar & Start Menu 2.3. In the Taskbar and Start Menu Properties window, click the Advanced tab 2.4. Under the Start Menu Settings, check the box to the left of Display Administrative Tools 2.5. Restart at step 2 3. Expand Account Policies by clicking the + box 4. Select “Password Policy” 5. Double-click each policy setting to bring up a new window to make the following changes: 5.1.1. Enforce password history - 5 passwords remembered 5.1.2. Maximum password age - 0 days 5.1.3. Minimum password age - 1 days 5.1.4. Minimum password length - 8 characters 5.1.5. Passwords must meet complexity requirements - Enabled 5.1.6. Store password using reversible encryption for all users in the domain - Disabled 6. Select “Account Lockout Policy” 6.1.1. Account lockout duration - 30 minutes 6.1.2. Account lockout threshold - 5 invalid logon attempts 6.1.3. Reset account lockout counter after - 30 minutes 7. Expand Local Policies by clicking the + box 8. Select “Audit Policy” 8.1.1. Audit account logon events- Success, Failure 8.1.2. Audit account management- Success, Failure 8.1.3. Audit directory service access- Failure 8.1.4. Audit logon events – Success, Failure 8.1.5. Audit object access – Failure 8.1.6. Audit policy change – Success, Failure 8.1.7. Audit privilege use - No auditing 8.1.8. Audit process tracking - No auditing 8.1.9. Audit system events – Success, Failure 9. Select “User Rights Assignment.” If no change is noted, do not alter policy setting. 9.1.1. Access this computer from the network - Remove Everyone, Remove Power Users 9.1.2. Act as part of the operating system 9.1.3. Add workstations to domain 9.1.4. Back up files and directories - Backup Operators, Administrators 9.1.5. Bypass traverse checking - Remove Everyone, Remove Power Users 9.1.6. Change the system time - Remove Power Users 9.1.7. Create a pagefile - Administrators 9.1.8. Create a token object 9.1.9. Create permanent shared objects 9.1.10. Debug programs - Administrators 9.1.11. Deny access to this computer from the network 9.1.12. Deny logon as a batch job 9.1.13. Deny logon as a service 9.1.14. Deny logon locally 9.1.15. Enable computer and user accounts to be trusted for delegation 9.1.16. Force shutdown from a remote system - Administrators 9.1.17. Generate security audits 9.1.18. Increase quotas - Administrators 9.1.19. Increase scheduling priority - Administrators 9.1.20. Load and unload device drivers - Administrators 9.1.21. Lock pages in memory 9.1.22. Log on as a batch job 9.1.23. Log on as a service 9.1.24. Log on locally – Remove Guest, Remove Power Users 9.1.25. Manage auditing and security log - Administrators 9.1.26. Modify firmware environment values - Administrators 9.1.27. Profile single process - Remove Power Users 9.1.28. Profile system performance - Administrators 9.1.29. Remove computer from docking station - Remove Power Users 9.1.30. Replace a process level token 9.1.31. Restore files and directories - Backup Operators, Administrators 9.1.32. Shut down the system - Remove Power Users 9.1.33. Synchronize directory service data 9.1.34. Take ownership of files or other objects – Administrators 10. Select “Security Options” 10.1.1. Additional restrictions for anonymous connections – No access with explicit anonymous permissions 10.1.2. Allow server operators to schedule tasks (domain controllers only) - Not defined 10.1.3. Allow system to be shut down without having to log on - Enabled 10.1.4. Allowed to eject removable NTFS media - Administrators 10.1.5. Amount of idle time required before disconnecting session - 15 minutes 10.1.6. Audit the access of global system objects - Disabled 10.1.7. Audit use of Backup and Restore privilege - Disabled 10.1.8. Automatically log off users when logon time expires (local) - Enabled 10.1.9. Clear virtual memory pagefile when system shuts down - Disabled 10.1.10. Digitally sign client communication (always) - Disabled 10.1.11. Digitally sign client communication (when possible) - Enabled 10.1.12. Digitally sign server communication (always) - Disabled 10.1.13. Digitally sign server communication (when possible) - Enabled 10.1.14. Disable CTRL+ALT+DEL requirement for logon - Disabled 10.1.15. Do not display last user name in logon screen - Enabled 10.1.16. LAN Manager Authentication Level - Send NTLM response only 10.1.17. Message text for users attempting to log on 10.1.18. Message title for users attempting to log on 10.1.19. Number of previous logons to cache (in case domain controller is not available) - 0 logons 10.1.20. Prevent system maintenance of computer account password - Disabled 10.1.21. Prevent users from installing printer drivers - Disabled 10.1.22. Prompt user to change password before expiration - 0 days 10.1.23. Recovery Console: Allow automatic administrative logon - Disabled 10.1.24. Recovery Console: Allow floppy copy and access to all drives and all folders - Disabled 10.1.25. Rename administrator account – (Should be something unique) 10.1.26. Rename guest account – (Should be something unique) 10.1.27. Restrict CD-ROM access to locally logged-on user only - Enabled 10.1.28. Restrict floppy access to locally logged-on user only - Enabled 10.1.29. Secure channel: Digitally encrypt or sign secure channel data (always) - Disabled 10.1.30. Secure channel: Digitally encrypt secure channel data (when possible) - Enabled 10.1.31. Secure channel: Digitally sign secure channel data (when possible) - Enabled 10.1.32. Secure channel: Require strong (Windows 2000 or later) session key - Enabled 10.1.33. Send unencrypted password to connect to third-party SMB servers - Disabled 10.1.34. Shut down system immediately if unable to log security audits - Disabled 10.1.35. Smart card removal behavior - No Action 10.1.36. Strengthen default permissions of global system objects (e.g. Symbolic Links) - Enabled 10.1.37. Unsigned driver installation behavior - Warn but allow installation 10.1.38. Unsigned non-driver installation behavior – Silently succeed 11. Close the Local Policy Settings window when done. ~~~~~~~~~~ nu mai stiu de unde am tutorialul pt a acorda credite
_______________________________________ Cum sa pui intrebari pe forum - multi au nevoie de acest ghid
|
|
pus acum 17 ani |
|