Team LiB   Previous Section   Next Section

B.1 Windows Settings

Computer Configuration\Windows Settings

B.1.1 Security Settings

Computer Configuration\Windows Settings\Security Settings

There are seven areas of security settings: Account Policies, Local Policies, Event Log Settings, Restricted Groups, System Services, Registry, and File System. You can add security to any of these areas by defining security settings in a Group Policy object (GPO) that is associated with a domain or an organizational unit (OU).

B.1.1.1 Restricted Groups
Computer Configuration\Windows Settings\Security Settings\Restricted Groups

This is where administrators can define properties for restricted groups (security-sensitive groups). Administrators can define two properties:

Members

Defines who belongs to the restricted group.

Member Of

Defines which other groups the restricted group belongs to.

When a restricted Group Policy is applied, members of a restricted group that are not on the Members list are deleted. Users on the Members list who aren't currently members of the restricted group are added.

B.1.1.2 System Services
Computer Configuration\Windows Settings\Security Settings\System Services

Enabling this policy allows administrators to specify a start-up mode (the choices are manual, automatic, or disabled).

Enabling this policy also allows administrators to specify access permissions for system services (the ability to start, stop, or pause).

B.1.1.3 Registry
Computer Configuration\Windows Settings\Security Settings\Registry

Enabling this policy allows administrators to define access permissions (DACLs) and audit settings (SACLs) for their systems' registry keys. Note that only Group Policy objects associated with domains, OUs, and sites have an available Registry folder.

B.1.1.4 File System
Computer Configuration\Windows Settings\Security Settings\File system

Allows an administrator to define access permissions (DACLs) and audit settings (SACLs) for filesystem objects. Note that only Group Policy objects associated with domains, OUs, and sites have an available File System folder.

B.1.1.5 Account Policies
Computer Configuration\Windows Settings\Security Settings\Account Policies
B.1.1.5.1 Password Policies
Computer Configuration\Windows Settings\Security Settings\Account Policies\
Password Policy
Enforce password history

Enabling this policy allows you to specify the number of unique passwords a user must utilize before a password can be repeated.

Maximum password age

Enabling this policy allows you to specify how long a password can be used on your system before it must by changed by the user. Note that you can set the number of days to 0, which allows users to use passwords indefinitely.

Minimum password age

Enabling this policy allows you to specify the minimum amount of time a password can be used on your system before it must be changed by the user. Note that you can set the number of days to 0, which allows users to change passwords immediately. The number used for the minimum password age must be less than that used for the maximum password age.

Minimum password length

Enabling this policy allows you to specify the minimum amount of characters a user's password may contain. Setting the number to establishes that no password is required. You can set this length for any number in between 1 and 14.

Passwords must meet complexity requirements of the installed password filter

If you enable this policy, all system passwords must meet the requirements of the default password filter (passfilt.dll) included with Windows 2000. These requirements include using passwords that are at least six characters long and barring the use of user's account names in passwords. Note that the .dll supplied by Microsoft can't be modified, but you can write or install your own settings in your own passfilt.dll file.

Store password using reversible encryption for all users in the domain

Controls whether or not Windows 2000 stores passwords using reversible encryption. Most administrators don't choose to enable this policy, as storing passwords using reversible encryption closely resembles clear-text versions of the passwords. Enable this policy only if your application requirements surpass the need for protected password information.

User must log on to change password

Enabling this policy requires users to log on before they can change their password. This policy results in users who can't logon to change their password because it has expired; system administrators then have to make the password change for these users. This policy is disabled by default.

B.1.1.5.2 Account Lockout Policy
Computer Configuration\Windows Settings\Security Settings\Account Policies\
Account Lockout Policy
Account lockout threshold

Enabling this policy allows you to set up the number of failed logons a user must make to be locked out of an account. You can choose a number between 1 and 999. This setting is disabled by default.

Account lockout duration

Enabling this policy allows you set up the number of minutes that an account is actually locked out. You can choose a number between 1 and 99999, or you can specify that the account will be locked until an administrator sets the value to 0. This setting isn't defined by default as it only pertains to systems that have an Account lockout threshold policy set up.

Reset account lockout counter after

Enabling this policy allows you set the number of minutes that must pass before a bad logon attempt counter is reset to bad logons. You can choose a number between 1 and 99999. This setting defined by default as it pertains only to systems that have an Account lockout threshold policy set up.

B.1.1.5.3 Kerberos Policy
Computer Configuration\Windows Settings\Security Settings\Account Policies\Kerberos Policy
Enforce user logon restrictions

Enabling this policy ensures that the Kerberos Key Distribution Center (KDC) validates every request for a session ticket against the user rights policy of the target computer. You may choose not to enable this policy because it can slow down network access to services.

Maximum lifetime for service ticket

Enabling this policy allows you to set the maximum number of minutes a user can utilize a granted session ticket to access a particular service. Note that this number must be higher than ten and must be less than or equal to the setting for Maximum lifetime for user ticket.

Maximum lifetime for user ticket

Enabling this policy allows you to set the maximum number of hours a user's ticket-granting ticket (TGT) may be utilized. A new user's ticket can be requested or the ticket can be renewed in the event that it expires. The default for this setting is ten hours.

Maximum lifetime for user ticket renewal

Enabling this policy allows you to set the number of days a user's ticket-granting ticket (TGT) may be renewed. The default for this setting is seven days.

Maximum tolerance for computer clock synchronization

Enabling this policy allows you to set the maximum number of minutes Kerberos allows between a client's clock and the server's clock to still consider the two clocks synchronous. This setting is important because Kerberos uses timestamps that require both clocks to be in synch to work properly.

B.1.1.6 Local Policies
Computer Configuration\Windows Settings\Security Settings\Local Policies
B.1.1.6.1 Audit Policy
Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy
Audit account logon events

Controls a computer's ability to audit each instance of a user logging on or off another computer when the primary computer was used to validate the account. If you choose to define this policy, you have a choice of specifying whether to audit successes, failures, or not to audit the event type at all.

Audit account management

Controls a computer's ability to audit each event of account management. An example of an account management event is setting or changing a password. This value is set to No auditing by default.

Audit directory service access

Controls whether or not the system audits the event of a user accessing an Active Directory object that has specified its own system access control list (SACL). This value is set to No auditing by default.

Audit logon events

Controls whether or not the system audits each instance of a user logging on, logging off, or making a network connection to this computer. If you choose to define this policy, you have a choice of specifying whether to audit successes, failures, or not to audit the event type at all. This value is set to No auditing by default.

Audit object access

Controls whether or not the system audits each instance of a user logging the event of a user accessing an object -- a file or folder for instance -- that has specified its own system access control list (SACL). If you choose to define this policy, you have a choice of specifying whether to audit successes, failures, or not to audit the event type at all. This value is set to No auditing by default.

Audit policy change

Controls whether or not the system audits every incidence of a change to user rights assignment policies, audit policies, or trust policies. If you choose to define this policy, you have a choice of specifying whether to audit successes, failures, or not to audit the event type at all. This value is set to No auditing by default.

Audit privilege use

Controls whether or not the system audits each instance of a user exercising a user right. If you choose to define this policy, you have a choice of specifying whether to audit successes, failures, or not to audit the event type at all. This value is set to No auditing by default.

Audit process tracking

Controls whether or not the system audits detailed tracking information for events such as program activation, handle duplication, and indirect object access. If you choose to define this policy, you have a choice of specifying whether to audit successes, failures, or not to audit the event type at all. This value is set to No auditing by default.

Audit system events

Controls whether or not the system audits when a user restarts or shuts down the computer, or an event has occurred that affects either the system security or the security log. If you choose to define this policy, you have a choice of specifying whether to audit successes, failures, or not to audit the event type at all. This value is set to No auditing by default.

B.1.1.6.2 User Rights Assignment
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment
Access this computer from the network

Controls which users and groups have permissions to connect to the computer over the network. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Act as part of the operating system

If you enable this policy, a process can authenticate as any user, which allows the process to gain access to the same resources as any user. The LocalSystem account includes this privilege.

Add workstations to domain

Controls the groups or users who can add workstations to a domain. Note that this policy is valid only on domain controllers. By default, all authenticated users have this right.

Back up files and directories

This policy allows you to specify which users can back up the system by circumventing file and directory permissions. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Bypass traverse checking

Controls which users can traverse directory trees, even if users don't have permissions on the traversed directory. Note that users can't list the contents of a directory as a result of this privilege. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Change the system time

This policy allows you to specify which users and groups can change the time and date on the internal clock of the computer. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Create a pagefile

This policy allows you to specify which users and groups can create and change the size of a pagefile. The default setting allows administrators to create pagefiles. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Create a token object

Controls which accounts can be used by processes to create a token that can then be used to gain access to any local resources when the process uses NtCreateToken( ) or other token-creation APIs. Using the LocalSystem account is recommended for processes that require this privilege. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Create permanent shared objects

If you enable this policy, you can specify which accounts can be used by processes to create a directory object in the Windows 2000 object manager. Only the LocalSystem account has this right by default. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Debug programs

If you enable this policy, you can specify which users can attach a debugger to any process. Note that users with this capability will have powerful access to sensitive and critical operating system components. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Deny access to this computer from the network

If you enable this policy, you can specify which users can't access a computer over the network. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Deny logon as a batch job

If you enable this policy, you can specify which accounts can't log on as a batch job. No users are denied logon as a batch job by default. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Deny logon as a service

Enabling this policy allows you to specify which service accounts can't register a process as a service. No accounts are denied logon as a service by default. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Deny logon locally

Enabling this policy allows you to specify which users can't log on at the computer. No accounts are denied the ability to log on locally by default. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Enable computer and user accounts to be trusted for delegation

Enabling this policy allows you to specify which users can set the Trusted for Delegation setting on a user or computer object. Note that users or objects must have write access to the account control flags on the user or computer object to utilize this privilege. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Force shutdown from a remote system

Enabling this policy allows you to specify which users can shut down a computer from a remote location on the network. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Generate security audits

Enabling this policy allows you to specify the accounts that can be used by a process to add entries to the security log. You can use the security log to trace unauthorized access on your system. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Increase quotas

Enabling this policy allows you to specify which accounts can use a process with write property access to another process to increase the processor quota assigned to the other process. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Increase scheduling priority

Enabling this policy allows you to specify which accounts can use a process with write property access to another process in order to increase the execution priority assigned to the other process. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Load and unload device drivers

Enabling this policy allows you to specify which users can dynamically load and unload device drivers, which is necessary for installing drivers for plug and play devices. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Lock pages in memory

Enabling this policy can adversely affect your system's performance. This policy is obsolete. This policy controls the accounts that can use a process to keep data in physical memory.

Log on as a batch job

If you enable this policy, a user can be logged on through a batch-queue facility. The LocalSystem account is the only account that has this privilege by default. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Log on as a service

Enabling this policy allows you to specify which service accounts can register a process as a service. No accounts have this privilege by default. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Log on locally

Enabling this policy allows you to specify which users can log on at the computer. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Manage auditing and security log

Enabling this policy allows you to specify which users can specify object access auditing options for individual resources such as files and Active Directory objects. Only administrators can manage auditing by default. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Modify firmware environment variables

If you enable this policy, you can specify which users can modify systemwide environment variables. Administrators and LocalSystem accounts have this privilege by default. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Profile single process

Controls which users can use Windows NT and Windows 2000 performance monitoring tools to monitor the performance of nonsystem processes. Administrators and LocalSystem accounts have this privilege by default. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Profile system performance

Controls which users can use Windows NT and Windows 2000 performance monitoring tools to monitor the performance of system processes. Administrators and LocalSystem accounts have this privilege by default. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Remove computer from docking station

Enabling this policy allows you to specify which users can undock a laptop computer from its docking station. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Replace a process level token

Enabling this policy allows you to specify which user accounts can initiate a process to replace the default token associated with a launched subprocess. LocalSystem accounts have this privilege by default. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Restore files and directories

Enabling this policy allows you to specify two settings: which users can restore backed up files and directories by circumventing file and directory permissions, and which users can set any valid security principal as the owner of an object. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Shut down the system

Enabling this policy allows you to specify which users who are logged on locally to the computer can use the Shut Down command to shut down the operating system. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

Synchronize directory service data

The initial release of Windows 2000 doesn't use this policy setting.

Take ownership of files or other objects

Enabling this policy allows you to specify which users can take ownership of any secureable object in the system. These objects include Active Directory objects, files and folders, printers, Registry keys, processes, and threads. You can define this user right in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.

B.1.1.6.3 Security Options
Computer Configuration\Windows Settings\Security Settings\Local Policies\
Security Options
Additional restrictions for anonymous access

If you enable this policy, you can set additional restrictions for anonymous users. Anonymous users have the same privileges as the Everyone group for a given resource by default.

Allow server operators to schedule tasks (domain controllers only)

If you enable this policy, members of the Server Operators group can submit AT schedule jobs on Domain Controllers. The default setting requires Administrator status to submit AT schedule jobs on Domain Controllers.

Allow system to be shut down without having to log on

If you enable this policy, users don't have to log on to Windows to shut down the computer. This policy puts the Shut Down command on the Windows logon screen.

Allowed to eject removable NTFS media

If you enable this policy, any interactive user can eject removable NTFS media from the computer. The default setting requires Administrator status to eject removable NTFS media from the computer.

Amount of idle time required before disconnecting a session

Enabling this policy allows administrators to define when a computer disconnects an inactive Server Message Block session. The default time is 15 minutes before disconnecting.

Audit the access of global system objects

Controls auditing of global system objects. System objects are created with a default system access control list (SACL) if this policy is enabled. Access to these system objects are audited when the Audit object access is also enabled.

Audit use of Backup and Restore Privilege

Controls whether an audit of every use of user rights, including Backup and Restore, occurs. Any instance of user rights being exercised is recorded in the security log when the Audit object access is also enabled.

Automatically log off users when logon time expires (local)

Enabling this policy causes a client session with an SMB server to be forcibly disconnected when the client's logon hours have expired. Note that this policy is applied to all computers on the domain.

Automatically log off users when logon time expires (local)

Enabling this policy ensures that users are restricted to their valid logon hours. If they try to access or continue accessing the system outside their valid logon hours, they are forcibly disconnected.

Clear virtual memory pagefile when system shuts down

Controls whether or not your system clears the virtual memory pagefile when it shuts down. This policy may be useful to your organization if your system is configured to allow booting to other operating systems.

Digitally sign client communications (always)

Controls the computer's ability to digitally sign client communications. Enabling this policy ensures that client communications are always signed. This policy requires the Windows 2000 Server Message Block (SMB) client to perform SMB packet signing.

Digitally sign client communications (when possible)

Enabling this policy ensures that the Windows 2000 Server Message Block (SMB) client performs SMB packet signing when communicating with an SMB server that is enabled or required to perform SMB packet signing. This policy is enabled by default. You can find more information about using digital signatures in client/server communications by looking at the Digitally sign client communications (always) policy.

Digitally sign server communications (always)

The Windows 2000 Server Message Block (SMB) server must perform SMB packet signing if this policy is enabled. This policy is disabled by default. You can find more information about using digital signatures in client/server communications by looking at the Digitally sign client communications (when possible) policy.

Digitally sign server communications (when possible)

This policy will cause the Windows 2000 Server Message Block (SMB) to perform SMB packet signing if this policy is enabled. This policy is disabled by default. You can find more information about using digital signatures in client/server communications by looking at the Digitally sign client communications (always) policy.

Disable CTRL+ALT+DEL requirement for logon

Controls whether or not users must press CTRL+ALT+DEL to log on. Enabling this policy allows customers to log on without pressing CTRL+ALT+DEL but creates a situation where the user's password can be intercepted by hackers.

Do not display last user name in logon screen

Enabling this policy ensures that the last user name accessed will not appear in the logon screen. This policy is disabled by default.

LAN Manager authentication level

Enabling this policy allows you to choose the challenge/response authentication protocol that is used for network logons on your system. You need to review your options carefully, as the protocol you choose affects the level of authentication protocol used by clients, the level of session security negotiated, and the level of authentication accepted by servers as follows.

Message text for users attempting to log on

Enabling this policy allows you to specify a text message that is displayed to users when they log on.

Message title for users attempting to log on

Enabling this policy lets you add the specification of a title that appears in the title bar of the window that contains the Message text for users attempting to log on.

Number of previous logons to cache (in case domain controller is not available)

If you enable this policy, you can specify the number of times a user can log on to a system utilizing cached information. Cached information is used if a domain controller isn't available to provide the information. The default setting is 10.

Prevent system maintenance of computer account password

Windows 2000 generates a new password for the computer account once a week by default. If you enable this policy, this functionality is suppressed; new passwords aren't generated automatically.

Prevent users from installing printer drivers

Enabling this policy ensures that users can't install printer drivers. As a result, users can't add printers that don't use printer drivers that are already installed.

Prompt user to change password before expiration

Enabling this policy allows you to specify how far in advance users should be warned to change their password. The default setting is seven days.

Recovery Console: Allow automatic administrative logon

Enabling this policy allows users to log on to the Recovery Console without providing a password. This policy is disabled by default.

Recovery Console: Allow floppy copy and access to all drives and folders

If you enable this policy, the Recovery Console SET command is enabled. This allows you to choose to enable or ignore four Recovery Console environment variables: AllowWildCards, AllowAllPaths, AllowRemovableMedia, and NoCopyPrompt.

Rename administrator account

If you enable this policy, you can associate a different account name with the security identifier (SID) for the account "Administrator." Enabling this policy guards against hackers, who often search for Administrator accounts when damaging systems.

Rename guest account

If you enable this policy, you can associate a different account name with the security identifier (SID) for the account "Guest." Enabling this policy guards against hackers, who often search for Guest accounts when damaging systems.

Restrict CD-ROM access to locally logged-on user only

Enabling this policy makes CD-ROMs accessible first to an interactively logged-on user. If there is no interactively logged-on user, the CD-ROM can be shared across the network. If this policy is disabled, local and remote users can both access the CD-ROM at the same time.

Restrict floppy access to locally logged-on user only

Enabling this policy makes floppy media accessible first to an interactively logged-on user. If there is no interactively logged-on user, the floppy media can be shared across the network. If this policy is disabled, local and remote users can both access the floppy media at the same time.

Secure channel: Digitally encrypt or sign secure channel data (always)

Enabling this policy ensures that the system digitally encrypts or signs all outgoing secure channel traffic. Signing and encryption is negotiated if this policy is disabled, which it is by default.

Secure channel: Digitally encrypt secure channel data (when possible)

Enabling this policy ensures that the system digitally encrypts all outgoing secure channel traffic whenever possible. No encryption takes place if this policy is disabled. This policy is enabled by default.

Secure channel: Digitally sign secure channel data (when possible)

Enabling this policy ensures that the system signs all outgoing secure channel traffic whenever possible. No signing takes place if this policy is disabled. This policy is enabled by default.

Secure channel: Require strong (Windows 2000 or later) session key

Enabling this policy ensures that a strong encryption key is required for all outgoing secure channel traffic. The key strength is negotiated if this policy is disabled. This policy is disabled by default.

Secure system partition (for RISC platforms only)

Enabling this policy ensures that administrative access is required to access a RISC-based system partition (which must be FAT) while the operating system is running.

Send unencrypted password to connect to third-party SMB servers

Enabling this policy allows the Server Message Block (SMB) redirector to send clear-text passwords to non-Microsoft SMB servers. These servers don't support password encryption during authentication.

Shut down system immediately if unable to log security audits

Enabling this policy ensures that your system will shut down if a security audit can't be logged. Only an administrator can restart the system in the event that this policy is enabled, and a shut down occurs.

Smart card removal behavior

Enabling this policy allows you to define what happens when the smart card for a logged-on user is removed from the smart-card reader. You can choose from three options: No Action, Lock Workstation, or Force Logoff.

Strengthen default permissions of global system objects (e.g., symbolic links)

Controls the strength of the default discretionary access control list (DACL) for objects. If you enable this policy, non-admin users can read shared objects (they can't modify shared objects they didn't create) because the default DACL is stronger. This policy is enabled by default.

Unsigned driver installation behavior

Enabling this policy allows you to specify how your system reacts when an attempt is made to install a device driver (by means of the Windows 2000 device installer) that isn't certified by the Windows Hardware Quality Lab (WHQL). You can choose from three options: Silently succeed, Warn but allow installation, and Do not allow installation. Warn but allow installation is the default setting.

Unsigned non-driver installation behavior

Enabling this policy allows you to specify what should happen when an attempt is made to install any nondevice driver software that isn't certified. You can choose from three options: Silently succeed, Warn but allow installation, and Do not allow installation. Silently succeed is the default setting.

B.1.1.7 Event Log
Computer Configuration\Windows Settings\Security Settings\Event Log
B.1.1.7.1 Settings for Event Logs
Computer Configuration\Windows Settings\Security Settings\Event Log\Settings for Event Logs
Maximum application log size

Enabling this policy allows you to define the maximum size for the application event log. The maximum size is 4 GB, and the default setting is 512 KB. The policy can be enabled only in Group Policy objects associated with domains, OUs, and sites, because only these objects contain the necessary Event Log folder.

Maximum security log size

Enabling this policy allows you to define the maximum size for the security event log. The maximum size is 4 GB, and the default setting is 512 KB. The policy can be enabled only in Group Policy objects associated with domains, OUs, and sites because only these objects contain the necessary Event Log folder.

Maximum system log size

Enabling this policy allows you to define the maximum size for the system event log. The maximum size is 4 GB, and the default setting is 512 KB. The policy can be enabled only in Group Policy objects associated with domains, OUs, and sites because only these objects contain the necessary Event Log folder.

Restrict guest access to application log

If you enable this policy, guests can't view the application event log. This policy is disabled by default. The policy can be enabled only in Group Policy objects associated with domains, OUs, and sites because only these objects contain the necessary Event Log folder.

Restrict guest access to security log

If you enable this policy, guests can't view the security event log. This policy is disabled by default. The policy can be enabled only in Group Policy objects associated with domains, OUs, and sites because only these objects contain the necessary Event Log folder.

Restrict guest access to system log

If you enable this policy, guests can't view the system event log. This policy is disabled by default. The policy can be enabled only in Group Policy objects associated with domains, OUs, and sites because only these objects contain the necessary Event Log folder.

Retain application log

Enabling this policy allows you to specify how many days of events should be retained for the application log, if the retention method for the application log is "By Days." The policy can be enabled only in Group Policy objects associated with domains, OUs, and sites because only these objects contain the necessary Event Log folder.

Retain security log

Enabling this policy allows you to specify how many days of events should be retained for the security log, if the retention method for the application log is "By Days." The policy can be enabled only in Group Policy objects associated with domains, OUs, and sites because only these objects contain the necessary Event Log folder.

Retain system log

Enabling this policy allows you to specify how many days of events should be retained for the system log, if the retention method for the application log is "By Days." The policy can be enabled only in Group Policy objects associated with domains, OUs, and sites because only these objects contain the necessary Event Log folder.

Retention method for application log

Enabling this policy allows you to specify which "wrapping" method you use for the application log -- either Overwrite events as needed, Overwrite events by days, or Do not overwrite events. The policy can be enabled only in Group Policy objects associated with domains, OUs, and sites because only these objects contain the necessary Event Log folder.

Retention method for security log

Enabling this policy allows you to specify which "wrapping" method you will use for the security log -- either Overwrite events as needed, Overwrite events by days, or Do not overwrite events. The policy can be enabled only in Group Policy objects associated with domains, OUs, and sites because only these objects contain the necessary Event Log folder.

Retention method for system log

Enabling this policy allows you to specify which "wrapping" method you will use for the system log-- either Overwrite events as needed, Overwrite events by days, or Do not overwrite events. The policy can be enabled only in Group Policy objects associated with domains, OUs, and sites because only these objects contain the necessary Event Log folder.

Shut down the computer when the security audit log is full

The earlier "Shut down system immediately if unable to log security audits" policy should be used instead of this policy.

    Team LiB   Previous Section   Next Section