5.2.2 System Security Parameters Carried by the Protocol
|
Settings category |
Comments |
|---|---|
|
System Access |
Defined in section 2.2.1. |
|
Kerberos Policy |
Defined in section 2.2.2. |
|
System Log |
Defined in section 2.2.3. |
|
Security Log |
Defined in section 2.2.3. |
|
Application Log |
Defined in section 2.2.3. |
|
Event Audit |
Defined in section 2.2.4. |
|
Registry Values |
Defined in section 2.2.5. |
|
Privilege Rights |
Defined in section 2.2.6. |
|
Registry Key |
Defined in section 2.2.7. |
|
Service General Setting |
Defined in section 2.2.8. |
|
File Security |
Defined in section 2.2.9. |
|
Group Membership |
Defined in section 2.2.10. |