| Part name | Part type |
|---|
| 2.2.3.44 Network access: Named Pipes that can be accessed anonymously | Extended Object |
| 2.2.3.45 Network access: Remotely accessible registry paths |
| 2.2.3.50 Network security: LAN Manager authentication level |
| 2.2.3.56 Interactive logon: Message text for users attempting to log on |
| 2.2.3.57 Interactive logon: Message title for users attempting to log on |
2.2.3.63 Configure system security parameters to prevent misuse: Enable the computer to stop generating 8.3 style filenames |
2.2.3.64 Configure system security parameters to prevent misuse: Allow the computer to ignore NetBIOS name release requests except from WINS servers |
| 2.2.3.74 Network access: Remotely accessible registry paths and sub-paths |
2.2.3.83 Configure system security parameters to prevent misuse: MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes |
2.2.3.84 Configure system security parameters to prevent misuse: MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds |
2.2.3.85 Configure system security parameters to prevent misuse: MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) |
2.2.3.86 Configure system security parameters to prevent misuse: MSS: (TCPMaxDataRetransmissions) How many times unacknowledged data is retransmitted |
2.2.3.87 Configure system security parameters to prevent misuse: MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could lead to DoS) |
2.2.3.88 Configure system security parameters to prevent misuse: MSS: (TCPMaxDataRetransmissions) IPv6 How many times unacknowledged data is retransmitted |
| 8.5.10 Minimum password length |
| 8.5.13 Account lockout threshold |
| Audit-Policy |
| Audit-Policy-10.2.1.11 |
| Audit-Policy-10.2.1.12 |
| Audit-Policy-10.2.1.14 |
| Audit-Policy-10.2.1.15 |
| Audit-Policy-10.2.1.17 |
| Audit-Policy-10.2.1.18 |
| Audit-Policy-10.2.1.19 |
| Audit-Policy-10.2.1.20 |
| Audit-Policy-10.2.1.21 |
| Audit-Policy-10.2.1.22 |
| Audit-Policy-10.2.1.23 |
| Audit-Policy-10.2.1.3 |
| Audit-Policy-10.2.1.5 |
| Audit-Policy-10.2.1.6 |
| Audit-Policy-10.2.1.7 |
| Audit-Policy-10.2.1.8 |
| Audit-Policy-10.2.1.9 |
| Audit-Policy-10.2.2.2 |
| Audit-Policy-10.2.4.2 |
| Audit-Policy-10.2.4.3 |
| Audit-Policy-10.4.2 |
| Service Fax Permissions |
| Service iphlpsvc Permissions |
| Service MSFtpsvc Permissions |
| Service NetMan Permissions |
| Service RasAuto Permissions |
| Service RasMan Permissions |
| Service RpcLocator Permissions |
| Service SNMPTRAP Permissions |
| Service TapiSrv Permissions |
| Service TlntSvr Permissions |
| Service VSS Permissions |
| User Rights Policy-2.2.3.1 |
| User Rights Policy-2.2.3.10 |
| User Rights Policy-2.2.3.11 |
| User Rights Policy-2.2.3.12 |
| User Rights Policy-2.2.3.13 |
| User Rights Policy-2.2.3.14 |
| User Rights Policy-2.2.3.15 |
| User Rights Policy-2.2.3.16 |
| User Rights Policy-2.2.3.17 |
| User Rights Policy-2.2.3.18 |
| User Rights Policy-2.2.3.19 |
| User Rights Policy-2.2.3.2 |
| User Rights Policy-2.2.3.20 |
| User Rights Policy-2.2.3.3 |
| User Rights Policy-2.2.3.4 |
| User Rights Policy-2.2.3.5 |
| User Rights Policy-2.2.3.6 |
| User Rights Policy-2.2.3.65 |
| User Rights Policy-2.2.3.66 |
| User Rights Policy-2.2.3.67 |
| User Rights Policy-2.2.3.68 |
| User Rights Policy-2.2.3.69 |
| User Rights Policy-2.2.3.7 |
| User Rights Policy-2.2.3.70 |
| User Rights Policy-2.2.3.77 |
| User Rights Policy-2.2.3.78 |
| User Rights Policy-2.2.3.79 |
| User Rights Policy-2.2.3.8 |
| User Rights Policy-2.2.3.80 |
| User Rights Policy-2.2.3.81 |
| User Rights Policy-2.2.3.82 |
| User Rights Policy-2.2.3.89 |
| User Rights Policy-2.2.3.9 |
| HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon | Registry Key |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\windows |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog\Security |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog\Setup |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog\System |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\PublicProfile |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings |
| HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\CredUI\EnableSecureCredentialPrompting | Registry Value |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\CredUI\EnumerateAdministrators |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisableLocalMachineRun |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisableLocalMachineRunOnce |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPublishingWizard |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoWebServices |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableCAD |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\DontDisplayLastUserName |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths |
| HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableUIADesktopToggle |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\LegalNoticeCaption |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\LegalNoticeText |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\scforceoption |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ShutdownWithoutLogon |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Setup\RecoveryConsole\securitylevel |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Setup\RecoveryConsole\setcommand |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\AllocateCDRoms |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\AllocateDASD |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\AllocateFloppies |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\AutoAdminLogon |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\cachedlogonscount |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ForceUnlockLogon |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\passwordexpirywarning |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ScreenSaverGracePeriod |
| HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\scremoveoption |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Conferencing\NoRDS |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Cryptography\ForceKeyProtection |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Messenger\Client\CEIP |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\SearchCompanion\DisableContentFileUpdates |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\DriverSearching\DontSearchWindowsUpdate |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Application\MaxSize |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Application\Retention |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Security\MaxSize |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\Security\Retention |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\System\MaxSize |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\EventLog\System\Retention |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Group Policy\ {35378EAC-683F-11D2-A89A-00C04FBBCFA2}\NoBackgroundPolicy |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Group Policy\ {35378EAC-683F-11D2-A89A-00C04FBBCFA2}\NoGPOListChanges |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Group Policy\ {B087BE9D-454F-AF9C-04291E351182}\NoGPOListChanges |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\ CodeIdentifiers\AuthenticodeEnabled |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate \AU\AUOptions |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\AU\ NoAUShutdownOption |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\AU\ RescheduleWaitTimeEnabled |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\DomainProfile\ AllowLocalIPsecPolicyMerge |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\DomainProfile\ AllowLocalPolicyMerge |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\DomainProfile\ DefaultInboundAction |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\DomainProfile\ DisableNotifications |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\DomainProfile\ EnableFirewall |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ IcmpSettings\AllowInboundEchoRequest |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ IcmpSettings\AllowInboundEnchoRequest |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ IcmpSettings\AllowInboundMaskRequest |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ IcmpSettings\AllowInboundRouterRequest |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ IcmpSettings\AllowInboundTimestampRequest |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ IcmpSettings\AllowOutboundDestinationUnreachable |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ IcmpSettings\AllowOutboundPacketTooBig |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ IcmpSettings\AllowOutboundParameterProblem |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ IcmpSettings\AllowOutboundSourceQuench |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ IcmpSettings\AllowOutboundTimeExceeded |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\ IcmpSettings\AllowRedirect |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\PrivateProfile\ AllowLocalIPsecPolicyMerge |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\PrivateProfile\ AllowLocalPolicyMerge |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\PrivateProfile\ DefaultInboundAction |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\PrivateProfile\ DisableNotifications |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\PrivateProfile\ EnableFirewall |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\PublicProfile\ AllowLocalIPsecPolicyMerge |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\PublicProfile\ AllowLocalPolicyMerge |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\PublicProfile\ DefaultInboundAction |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\PublicProfile\ DisableNotifications |
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\PublicProfile\ EnableFirewall |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\ DisableNotifications |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\ EnableFirewall |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings \AllowInboundEchoRequest |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings\ AllowInboundEnchoRequest |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings\ AllowInboundMaskRequest |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings\ AllowInboundRouterRequest |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings\ AllowInboundTimestampRequest |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings\ AllowOutboundDestinationUnreachable |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings\ AllowOutboundPacketTooBig |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings\ AllowOutboundParameterProblem |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings\ AllowOutboundSourceQuench |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings\ AllowOutboundTimeExceeded |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings\ AllowRedirect |
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile\IcmpSettings\ ParameterProblem |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Printers\DisableHTTPPrinting |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Printers\DisableWebPnPDownload |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Rpc\EnableAuthEpResolution |
| HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Rpc\RestrictRemoteClients |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\DisablePasswordSaving |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\fAllowToGetHelp |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\fAllowUnsolicited |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\fDisableCdm |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\fPromptForPassword |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\MaxIdleTime |
| HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\MinEncryptionLevel |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\FileSystem\NtfsDisable8dot3NameCreation |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\crashonauditfail |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\DisableDomainCreds |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\EveryoneIncludesAnonymous |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\ForceGuest |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\LimitBlankPasswordUse |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\MSV1_0\NTLMMinClientSec |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\MSV1_0\NTLMMinServerSec |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\NoLMHash |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\RestrictAnonymous |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\RestrictAnonymousSAM |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\scenoapplylegacyauditpolicy |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\SubmitControl |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Providers\LanMan Print Services\Servers\AddPrinterDrivers |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedExactPaths\Machine |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedPaths\Machine |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Kernel\ObCaseInsensitive |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Memory Management\ClearPageFileAtShutdown |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\ProtectionMode |
| HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\SafeDllSearchMode |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\SubSystems\optional |
| HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Eventlog\Security\WarningLevel |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\IPSEC\NoDefaultExempt |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\autodisconnect |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\enableforcedlogoff |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\enablesecuritysignature |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\NullSessionPipes |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\NullSessionShares |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\requiresecuritysignature |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\restrictnullsessaccess |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanWorkstation\Parameters\EnablePlainTextPassword |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanWorkstation\Parameters\EnableSecuritySignature |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanWorkstation\Parameters\RequireSecuritySignature |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LDAP\LDAPClientIntegrity |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netbt\Parameters\NoNameReleaseOnDemand |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters\disablepasswordchange |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters\maximumpasswordage |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters\RefusePasswordChange |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters\requiresignorseal |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters\requirestrongkey |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters\sealsecurechannel |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters\signsecurechannel |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\ldapserverintegrity |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\DisableIPSourceRouting |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\EnableICMPRedirect |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\KeepAliveTime |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\PerformRouterDiscovery |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\TcpMaxDataRetransmissions |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip6\Parameters\DisableIPSourceRouting |
| HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip6\Parameters\TcpMaxDataRetransmissions |
Registry Value:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Group Policy\ {35378EAC-683F-11D2-A89A-00C04FBBCFA2}\NoGPOListChanges |
| \Access Credential Manager as a trusted caller | Security Setting |
| \Force shutdown from a remote system |
| \Network access: Allow anonymous SID/Name translation |
| \Synchronize directory service data |
Computer Configuration\Administrative Templates\Windows Components\Internet Explorer\Security Features\ MK Protocol Security Restriction\Enforce user logon restrictions |
| Security Settings\Account Policies |
| Security Settings\Account Policies |
| Security Settings\Account Policies |
| Security Settings\Account Policies |
| Security Settings\Account Policies\Account Lockout Policy\Account lockout duration |
| Security Settings\Account Policies\Account Lockout Policy\Account lockout threshold |
| Security Settings\Account Policies\Account Lockout Policy\Reset account lockout counter after |
| Security Settings\Account Policies\Password Policy |
| Security Settings\Account Policies\Password Policy |
| Security Settings\Account Policies\Password Policy |
| Security Settings\Account Policies\Password Policy\Enforce password history |
| Security Settings\Account Policies\Password Policy\Maximum password age |
| Security Settings\Account Policies\Password Policy\Minimum password age |
| Security Settings\Account Policies\Password Policy\Minimum password length |
| Security Settings\Account Policies\Password Policy\Passwords must meet complexity requirements |
| Security Settings\Local Policies |
| Security Settings\Local Policies |
| Security Settings\Local Policies |
| Security Settings\Local Policies\Access this computer from the network |
| Security Settings\Local Policies\Act as part of the operating system |
| Security Settings\Local Policies\Add workstations to domain |
| Security Settings\Local Policies\Adjust memory quotas for a process |
| Security Settings\Local Policies\Allow log on locally |
| Security Settings\Local Policies\Audit Policy\Audit account logon events |
| Security Settings\Local Policies\Audit Policy\Audit account management |
| Security Settings\Local Policies\Audit Policy\Audit directory service access |
| Security Settings\Local Policies\Audit Policy\Audit logon events |
| Security Settings\Local Policies\Audit Policy\Audit object access |
| Security Settings\Local Policies\Audit Policy\Audit policy change |
| Security Settings\Local Policies\Audit Policy\Audit privilege use |
| Security Settings\Local Policies\Audit Policy\Audit process tracking |
| Security Settings\Local Policies\Audit Policy\Audit system events |
| Security Settings\Local Policies\Back up files and directories |
| Security Settings\Local Policies\Bypass traverse checking |
| Security Settings\Local Policies\Change the system time |
| Security Settings\Local Policies\Change the time zone |
| Security Settings\Local Policies\Create a page file |
| Security Settings\Local Policies\Create a token object |
| Security Settings\Local Policies\Create global objects |
| Security Settings\Local Policies\Create permanent shared objects |
| Security Settings\Local Policies\Create symbolic links |
| Security Settings\Local Policies\Debug programs |
| Security Settings\Local Policies\Deny access to this computer from the network |
| Security Settings\Local Policies\Deny log on as a batch job |
| Security Settings\Local Policies\Deny log on locally |
| Security Settings\Local Policies\Enable computer and user accounts to be trusted for delegation |
| Security Settings\Local Policies\Force shutdown from a remote system |
| Security Settings\Local Policies\Generate security audits |
| Security Settings\Local Policies\Impersonate a client after authentication |
| Security Settings\Local Policies\Increase a process working set |
| Security Settings\Local Policies\Increase scheduling priority |
| Security Settings\Local Policies\Load and unload device drivers |
| Security Settings\Local Policies\Lock pages in memory |
| Security Settings\Local Policies\Log on as a batch job |
| Security Settings\Local Policies\Manage auditing and security log |
| Security Settings\Local Policies\Modify firmware environment values |
| Security Settings\Local Policies\Perform volume maintenance tasks |
| Security Settings\Local Policies\Profile single process |
| Security Settings\Local Policies\Profile system performance |
| Security Settings\Local Policies\Remove computer from docking station |
| Security Settings\Local Policies\Replace a process level token |
| Security Settings\Local Policies\Restore files and directories |
| Security Settings\Local Policies\Security Options |
| Security Settings\Local Policies\Security Options\Accounts: Guest account status |
| Security Settings\Local Policies\Security Options\Accounts: Limit local account use of blank passwords to console logon only |
| Security Settings\Local Policies\Security Options\Accounts: Rename administrator account |
| Security Settings\Local Policies\Security Options\Accounts: Rename guest account |
| Security Settings\Local Policies\Security Options\Audit: Shut down system immediately if unable to log security audits |
| Security Settings\Local Policies\Security Options\Devices: Allowed to format and eject removable media |
| Security Settings\Local Policies\Security Options\Devices: Allow undock without having to log on |
| Security Settings\Local Policies\Security Options\Devices: Prevent users from installing printer drivers |
| Security Settings\Local Policies\Security Options\Devices: Restrict CD-ROM access to locally logged-on user only |
| Security Settings\Local Policies\Security Options\Devices: Restrict floppy access to locally logged-on user only |
| Security Settings\Local Policies\Security Options\Devices: Unsigned driver installation behavior |
| Security Settings\Local Policies\Security Options\Domain controller: Allow server operators to schedule tasks |
| Security Settings\Local Policies\Security Options\Domain controller: LDAP server signing requirements |
| Security Settings\Local Policies\Security Options\Domain controller: Refuse machine account password changes |
| Security Settings\Local Policies\Security Options\Domain member: Digitally encrypt or sign secure channel data (always) |
| Security Settings\Local Policies\Security Options\Domain member: Digitally encrypt secure channel data (when possible) |
| Security Settings\Local Policies\Security Options\Domain member: Digitally sign secure channel data (when possible) |
| Security Settings\Local Policies\Security Options\Domain member: Disable machine account password changes |
| Security Settings\Local Policies\Security Options\Domain member: Maximum machine account password age |
| Security Settings\Local Policies\Security Options\Domain member: Require strong (Windows 2000 or later) session key |
| Security Settings\Local Policies\Security Options\Interactive logon: Do not display last user name |
| Security Settings\Local Policies\Security Options\Interactive logon: Do not require CTRL+ALT+DEL |
| Security Settings\Local Policies\Security Options\Interactive logon: Message text for users attempting to log on |
| Security Settings\Local Policies\Security Options\Interactive logon: Message title for users attempting to log on |
Security Settings\Local Policies\Security Options\Interactive logon: Number of previous logons to cache (in case domain controller is not available) |
| Security Settings\Local Policies\Security Options\Interactive logon: Prompt user to change password before expiration |
Security Settings\Local Policies\Security Options\Interactive logon: Require Domain Controller authentication to unlock workstation |
| Security Settings\Local Policies\Security Options\Interactive logon: Require smart card |
| Security Settings\Local Policies\Security Options\Interactive logon: Smart card removal behavior |
| Security Settings\Local Policies\Security Options\Microsoft network client: Digitally sign communications (always) |
| Security Settings\Local Policies\Security Options\Microsoft network client: Digitally sign communications (if server agrees) |
| Security Settings\Local Policies\Security Options\Microsoft network client: Send unencrypted password to third-party SMB servers |
| Security Settings\Local Policies\Security Options\Microsoft network server: Amount of idle time required before suspending session |
| Security Settings\Local Policies\Security Options\Microsoft network server: Digitally sign communications (always) |
| Security Settings\Local Policies\Security Options\Microsoft network server: Digitally sign communications (if client agrees) |
| Security Settings\Local Policies\Security Options\Microsoft network server: Disconnect clients when logon hours expire |
| Security Settings\Local Policies\Security Options\Network access: Allow anonymous SID/Name translation |
| Security Settings\Local Policies\Security Options\Network access: Do not allow anonymous enumeration of SAM accounts |
| Security Settings\Local Policies\Security Options\Network access: Do not allow anonymous enumeration of SAM accounts and shares |
| Security Settings\Local Policies\Security Options\Network access: Let Everyone permissions apply to anonymous users |
| Security Settings\Local Policies\Security Options\Network access: Named Pipes that can be accessed anonymously |
| Security Settings\Local Policies\Security Options\Network access: Remotely accessible registry paths |
| Security Settings\Local Policies\Security Options\Network access: Remotely accessible registry paths and sub-paths |
| Security Settings\Local Policies\Security Options\Network access: Restrict anonymous access to Named Pipes and Shares |
| Security Settings\Local Policies\Security Options\Network access: Shares that can be accessed anonymously |
| Security Settings\Local Policies\Security Options\Network access: Sharing and security model for local accounts |
| Security Settings\Local Policies\Security Options\Network security: Do not store LAN Manager hash value on next password change |
| Security Settings\Local Policies\Security Options\Network security: LAN Manager authentication level |
| Security Settings\Local Policies\Security Options\Network security: LDAP client signing requirements |
Security Settings\Local Policies\Security Options\Network security: Minimum session security for NTLM SSP based (including secure RPC) clients |
Security Settings\Local Policies\Security Options\Network security: Minimum session security for NTLM SSP based (including secure RPC) servers |
| Security Settings\Local Policies\Security Options\Recovery console: Allow automatic administrative logon |
| Security Settings\Local Policies\Security Options\Recovery console: Allow floppy copy and access to all drives and all folders |
| Security Settings\Local Policies\Security Options\Shutdown: Allow system to be shut down without having to log on |
| Security Settings\Local Policies\Security Options\Shutdown: Clear virtual memory page file |
Security Settings\Local Policies\Security Options\System cryptography: Force strong key protection for user keys stored on the computer |
Security Settings\Local Policies\Security Options\System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing |
Security Settings\Local Policies\Security Options\System objects: Default owner for objects created by members of the Administrators group |
Security Settings\Local Policies\Security Options\System objects: Require case insensitivity for non-Windows subsystems |
Security Settings\Local Policies\Security Options\System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) |
| Security Settings\Local Policies\Security Options\System settings: Optional subsystems |
Security Settings\Local Policies\Security Options\System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies |
| Security Settings\Local Policies\Shut down the system |
| Security Settings\Local Policies\Synchronize directory service data |
| Security Settings\Local Policies\Take ownership of files or other objects |
| Guests | Windows Group |
| Windows Service List | Windows Service List |