security-policy [FW_A-policy-security] rule name to_internet [FW_A-policy-security-rule-sec_policy_1] source-zone trust [FW_A-policy-security-rule-sec_policy_1] destination-zone untrust [FW_A-policy-security-rule-sec_policy_1] ac...
You can configure your Windows devices and servers to disable selected services by using Security Templates in Group Policies or by running PowerShell cmdlets. In some cases, this guide describes specific Group Policy settings you can change to disable services directly. We recommend you disable the...
You can configure your Windows devices and servers to disable selected services by using Security Templates in Group Policies or by running PowerShell cmdlets. In some cases, this guide describes specific Group Policy settings you can change to disable services directly. We recommend you dis...
Appendix A: Sample Information System Security Plan TemplateRevision History
The platform helps automate the provision of IaaS VPS and SaaS to hosting provider clients, as well as increase revenue from additional services, e.g. IP addresses, VXLAN subnets and data security tools. In the platform’s user dashboard, users can perform most self-service operations: reboot...
In the Location area, you choose whether devices have access to location-specific sensors and which apps have access to the device's location.To turn off Location for this device:Click the Change button in the UI. -or- Enable the Group Policy: Computer Configuration > Admini...
Configures file system-specific behaviors used on virtual storage devices. WELL_KNOWN_SID_TYPE A list of commonly used security identifiers (SIDs). Programs can pass these values to the CreateWellKnownSid function to create a SID from this list. For information about these values, see WELL_KNOWN...
Configuring a Security Password Policy Template Configuring Security - Access Control Templates Configuring an Access Control List Template Configuring a FlexConnect Access Control List Template Configuring an ACL IP Groups Template Configuring an ACL Protocol Groups Template Configuring Security - CPU Access...
If you need to configure the antivirus server, see section "Configuring Antivirus Servers" in the Security Configuration Guide specific to your product model and version. The antivirus server scans the file system based on the preset scan policy. After a scan policy is configured for the file...
Client Authentication - [Compatibility Settings] - Compatible with Windows Server 2012 R2 ; (or newer based on environment) - [Cryptography Settings] - Provider Category: Legacy Cryptography Service Provider - Algorithm name: RSA - Minimum Key Size: 2048 ; (2048 or 4096 as per security requi...