Tests Help
Security Settings – Windows
B-28
other files (such as the Normal template) and can potentially infect all of your
files. If a user on another computer opens the infected file, the virus can spread
to their computer as well.
What Do I Need to Do?:
Set the Microsoft Word macro security level as follows:
1.
Open Word.
2.
Select
Tools>>Macro>>Security>>Security Level tab
.
3.
Select
High, Medium,
or
Low
.
4.
Click
ok
.
Services Not Allowed
Description:
This test verifies that the endpoint attempting to connect to your
system is running only compliant services.
Test Properties:
Enter a list of services that are not allowed on connecting
endpoints. Separate additional services with a carriage return. Use the service
names found in the
Start>>Settings>>Control Panel>>Administrative Tools>>ser-
vices
application. For example:
Telnet
Messenger
Remote Desktop Help Session Manager
How Does this Affect Me?:
Services are Windows operating system applica-
tions that run automatically, without manual intervention.
Services explained:
http://www.microsoft.com/technet/security/guidance/serversecurity/tcg/
tcgch07n.mspx
How to identify the services running in a process:
http://www.microsoft.com/resources/documentation/windows/2000/server/
scriptguide/en-us/sas_ser_arwi.mspx
Tips on Windows XP services:
http://www.theeldergeek.com/services_guide.htm
What do I need to do?:
For services you never use, disable the service. For
services you may use occasionally, change the startup type from automatic to
manual.
Summary of Contents for ProCurve NAC 800
Page 1: ...HP ProCurve Network Access Controller 800 Users Guide ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 71: ...System Configuration Management Server 3 23 Figure 3 9 System Configuration Management Server ...
Page 80: ...System Configuration User Accounts 3 32 Figure 3 12 System Configuration User Accounts ...
Page 88: ...System Configuration User Roles 3 40 Figure 3 16 System Configuration User Roles ...
Page 180: ... This page intentionally left blank ...
Page 208: ... This page intentionally left blank ...
Page 234: ...End user Access Mac OS X Endpoint Settings 5 26 Figure 5 14 Mac System Preferences ...
Page 288: ... This page intentionally left blank ...
Page 302: ... This page intentionally left blank ...
Page 306: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 307: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 309: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 312: ... This page intentionally left blank ...
Page 315: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 318: ... This page intentionally left blank ...
Page 323: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 324: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 380: ... This page intentionally left blank ...
Page 418: ... This page intentionally left blank ...
Page 425: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 459: ...System Administration Creating and Replacing SSL Certificates 15 31 10 Save and exit the file ...
Page 468: ... This page intentionally left blank ...
Page 480: ... This page intentionally left blank ...
Page 526: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 532: ... This page intentionally left blank ...
Page 562: ... This page intentionally left blank ...