5.2.2 System Security Parameters Carried by the Protocol
Settings category |
Comments |
---|---|
System Access |
Defined in section 2.2.1. |
Kerberos Policy |
Defined in section 2.2.2. |
System Log |
Defined in section 2.2.3. |
Security Log |
Defined in section 2.2.3. |
Application Log |
Defined in section 2.2.3. |
Event Audit |
Defined in section 2.2.4. |
Registry Values |
Defined in section 2.2.5. |
Privilege Rights |
Defined in section 2.2.6. |
Registry Key |
Defined in section 2.2.7. |
Service General Setting |
Defined in section 2.2.8. |
File Security |
Defined in section 2.2.9. |
Group Membership |
Defined in section 2.2.10. |