Hacking and more...
HaCkinG CulT
Lista Forumurilor Pe Tematici
Hacking and more... | Reguli | Inregistrare | Login

POZE HACKING AND MORE...

Nu sunteti logat.
Nou pe simpatie:
Madalina98251
Femeie
24 ani
Neamt
cauta Barbat
26 - 42 ani
Hacking and more... / n00bs / local security policies -tutorial Moderat de Shocker
Autor
Mesaj Pagini: 1
rimagheo
Elite Member

Inregistrat: acum 18 ani
Postari: 950
1. Log in as Administrator
1.1. Type in Run secpol.msc
orControl Panel->Administrative Tool->Local Security Polici
or
2. Go to Start->Programs->Administrative Tools->Local Security Policy
2.1. If you do not see the Administrative Tools folder, you will need to enable it
2.2. Go to Start->Settings->Taskbar & Start Menu
2.3. In the Taskbar and Start Menu Properties window, click the Advanced tab
2.4. Under the Start Menu Settings, check the box to the left of Display Administrative Tools
2.5. Restart at step 2
3. Expand Account Policies by clicking the + box
4. Select “Password Policy”
5. Double-click each policy setting to bring up a new window to make the following changes:
5.1.1. Enforce password history - 5 passwords remembered
5.1.2. Maximum password age - 0 days
5.1.3. Minimum password age - 1 days
5.1.4. Minimum password length - 8 characters
5.1.5. Passwords must meet complexity requirements - Enabled
5.1.6. Store password using reversible encryption for all users in the domain - Disabled
6. Select “Account Lockout Policy”
6.1.1. Account lockout duration - 30 minutes
6.1.2. Account lockout threshold - 5 invalid logon attempts
6.1.3. Reset account lockout counter after - 30 minutes
7. Expand Local Policies by clicking the + box
8. Select “Audit Policy”
8.1.1. Audit account logon events- Success, Failure
8.1.2. Audit account management- Success, Failure
8.1.3. Audit directory service access- Failure
8.1.4. Audit logon events – Success, Failure
8.1.5. Audit object access – Failure
8.1.6. Audit policy change – Success, Failure
8.1.7. Audit privilege use - No auditing
8.1.8. Audit process tracking - No auditing
8.1.9. Audit system events – Success, Failure
9. Select “User Rights Assignment.” If no change is noted, do not alter policy setting.
9.1.1. Access this computer from the network - Remove Everyone, Remove Power Users
9.1.2. Act as part of the operating system
9.1.3. Add workstations to domain
9.1.4. Back up files and directories - Backup Operators, Administrators
9.1.5. Bypass traverse checking - Remove Everyone, Remove Power Users
9.1.6. Change the system time - Remove Power Users
9.1.7. Create a pagefile - Administrators
9.1.8. Create a token object
9.1.9. Create permanent shared objects
9.1.10. Debug programs - Administrators
9.1.11. Deny access to this computer from the network
9.1.12. Deny logon as a batch job
9.1.13. Deny logon as a service
9.1.14. Deny logon locally
9.1.15. Enable computer and user accounts to be trusted for delegation
9.1.16. Force shutdown from a remote system - Administrators
9.1.17. Generate security audits
9.1.18. Increase quotas - Administrators
9.1.19. Increase scheduling priority - Administrators
9.1.20. Load and unload device drivers - Administrators
9.1.21. Lock pages in memory
9.1.22. Log on as a batch job
9.1.23. Log on as a service
9.1.24. Log on locally – Remove Guest, Remove Power Users
9.1.25. Manage auditing and security log - Administrators
9.1.26. Modify firmware environment values - Administrators
9.1.27. Profile single process - Remove Power Users
9.1.28. Profile system performance - Administrators
9.1.29. Remove computer from docking station - Remove Power Users
9.1.30. Replace a process level token
9.1.31. Restore files and directories - Backup Operators, Administrators
9.1.32. Shut down the system - Remove Power Users
9.1.33. Synchronize directory service data
9.1.34. Take ownership of files or other objects – Administrators
10. Select “Security Options”
10.1.1. Additional restrictions for anonymous connections – No access with explicit anonymous permissions
10.1.2. Allow server operators to schedule tasks (domain controllers only) - Not defined
10.1.3. Allow system to be shut down without having to log on - Enabled
10.1.4. Allowed to eject removable NTFS media - Administrators
10.1.5. Amount of idle time required before disconnecting session - 15 minutes
10.1.6. Audit the access of global system objects - Disabled
10.1.7. Audit use of Backup and Restore privilege - Disabled
10.1.8. Automatically log off users when logon time expires (local) - Enabled
10.1.9. Clear virtual memory pagefile when system shuts down - Disabled
10.1.10. Digitally sign client communication (always) - Disabled
10.1.11. Digitally sign client communication (when possible) - Enabled
10.1.12. Digitally sign server communication (always) - Disabled
10.1.13. Digitally sign server communication (when possible) - Enabled
10.1.14. Disable CTRL+ALT+DEL requirement for logon - Disabled
10.1.15. Do not display last user name in logon screen - Enabled
10.1.16. LAN Manager Authentication Level - Send NTLM response only
10.1.17. Message text for users attempting to log on
10.1.18. Message title for users attempting to log on
10.1.19. Number of previous logons to cache (in case domain controller is not available) - 0 logons
10.1.20. Prevent system maintenance of computer account password - Disabled
10.1.21. Prevent users from installing printer drivers - Disabled
10.1.22. Prompt user to change password before expiration - 0 days
10.1.23. Recovery Console: Allow automatic administrative logon - Disabled
10.1.24. Recovery Console: Allow floppy copy and access to all drives and all folders - Disabled
10.1.25. Rename administrator account – (Should be something unique)
10.1.26. Rename guest account – (Should be something unique)
10.1.27. Restrict CD-ROM access to locally logged-on user only - Enabled
10.1.28. Restrict floppy access to locally logged-on user only - Enabled
10.1.29. Secure channel: Digitally encrypt or sign secure channel data (always) - Disabled
10.1.30. Secure channel: Digitally encrypt secure channel data (when possible) - Enabled
10.1.31. Secure channel: Digitally sign secure channel data (when possible) - Enabled
10.1.32. Secure channel: Require strong (Windows 2000 or later) session key - Enabled
10.1.33. Send unencrypted password to connect to third-party SMB servers - Disabled
10.1.34. Shut down system immediately if unable to log security audits - Disabled
10.1.35. Smart card removal behavior - No Action
10.1.36. Strengthen default permissions of global system objects (e.g. Symbolic Links) - Enabled
10.1.37. Unsigned driver installation behavior - Warn but allow installation
10.1.38. Unsigned non-driver installation behavior – Silently succeed
11. Close the Local Policy Settings window when done.
~~~~~~~~~~
nu mai stiu de unde am tutorialul pt a acorda credite


_______________________________________
Cum sa pui intrebari pe forum - multi au nevoie de acest ghid

pus acum 17 ani
   
Pagini: 1  

Mergi la