This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). Policy conflict considerationsīeginning with Windows Server 2008 and Windows Vista, the CTRL ALT DELETE key combination is required to authenticate if this policy is disabled. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. This section describes features and tools that are available to help you manage this policy. Server type or GPOĬlient Computer Effective Default Settings Default values are also listed on the policy’s property page. The following table lists the actual and effective default values for this policy.
0 Comments
Leave a Reply. |