5.2.2 System Security Parameters Carried by the Protocol

Settings category

Comments

System Access

Defined in section 2.2.1.

Kerberos Policy

Defined in section 2.2.2.

System Log

Defined in section 2.2.3.

Security Log

Defined in section 2.2.3.

Application Log

Defined in section 2.2.3.

Event Audit

Defined in section 2.2.4.

Registry Values

Defined in section 2.2.5.

Privilege Rights

Defined in section 2.2.6.

Registry Key

Defined in section 2.2.7.

Service General Setting

Defined in section 2.2.8.

File Security

Defined in section 2.2.9.

Group Membership

Defined in section 2.2.10.