Tuesday, March 2, 2010

Default Domain Controllers Policy

PM
General
Details
Domainnetid.washington.edu
OwnerNETID\Domain Admins
Created6/13/2006 11:11:18 PM
Modified8/11/2006 10:31:46 AM
User Revisions0 (AD), 0 (sysvol)
Computer Revisions194 (AD), 194 (sysvol)
Unique ID{6AC1786C-016F-11D2-945F-00C04FB984F9}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
Domain ControllersNoEnablednetid.washington.edu/Domain Controllers

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
NT AUTHORITY\Authenticated Users
WMI Filtering
WMI Filter NameNone
DescriptionNot applicable
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
NETID\Domain AdminsEdit settings, delete, modify securityNo
NETID\Enterprise AdminsEdit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersRead (from Security Filtering)No
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
Computer Configuration (Enabled)
Windows Settings
Security Settings
Account Policies/Password Policy
PolicySetting
Enforce password history0 passwords remembered
Maximum password age0 days
Minimum password age0 days
Minimum password length1 characters
Password must meet complexity requirementsDisabled
Store passwords using reversible encryptionDisabled
Account Policies/Account Lockout Policy
PolicySetting
Account lockout duration1 minutes
Account lockout threshold5 invalid logon attempts
Reset account lockout counter after1 minutes
Account Policies/Kerberos Policy
PolicySetting
Enforce user logon restrictionsEnabled
Maximum lifetime for service ticket600 minutes
Maximum lifetime for user ticket10 hours
Maximum lifetime for user ticket renewal7 days
Maximum tolerance for computer clock synchronization5 minutes
Local Policies/Audit Policy
PolicySetting
Audit account logon eventsSuccess, Failure
Audit account managementSuccess, Failure
Audit directory service accessFailure
Audit logon eventsSuccess, Failure
Audit object accessSuccess, Failure
Audit policy changeSuccess, Failure
Audit privilege useSuccess, Failure
Audit process trackingSuccess, Failure
Audit system eventsSuccess, Failure
Local Policies/User Rights Assignment
PolicySetting
Access this computer from the networkEveryone, BUILTIN\Administrators, NT AUTHORITY\Authenticated Users, NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS, BUILTIN\Pre-Windows 2000 Compatible Access
Act as part of the operating system
Add workstations to domainNETID\Domain Admins
Adjust memory quotas for a processNT AUTHORITY\LOCAL SERVICE, NT AUTHORITY\NETWORK SERVICE, BUILTIN\Administrators
Allow log on locallyBUILTIN\Administrators, BUILTIN\Backup Operators, BUILTIN\Account Operators, BUILTIN\Server Operators, BUILTIN\Print Operators
Back up files and directoriesBUILTIN\Administrators, BUILTIN\Backup Operators, BUILTIN\Server Operators
Bypass traverse checkingEveryone, BUILTIN\Administrators, NT AUTHORITY\Authenticated Users, BUILTIN\Pre-Windows 2000 Compatible Access
Change the system timeNT AUTHORITY\LOCAL SERVICE, BUILTIN\Administrators, BUILTIN\Server Operators
Create a pagefileBUILTIN\Administrators
Create a token object
Create permanent shared objects
Debug programsBUILTIN\Administrators
Deny access to this computer from the networkNETID\SUPPORT_388945a0
Deny log on as a batch job
Deny log on as a service
Deny log on locallyNETID\SUPPORT_388945a0
Enable computer and user accounts to be trusted for delegationBUILTIN\Administrators
Force shutdown from a remote systemBUILTIN\Administrators, BUILTIN\Server Operators
Generate security auditsNT AUTHORITY\LOCAL SERVICE, NT AUTHORITY\NETWORK SERVICE
Increase scheduling priorityBUILTIN\Administrators
Load and unload device driversBUILTIN\Administrators, BUILTIN\Print Operators
Lock pages in memory
Log on as a batch jobNT AUTHORITY\LOCAL SERVICE, NETID\SUPPORT_388945a0
Log on as a serviceNT AUTHORITY\NETWORK SERVICE
Manage auditing and security logBUILTIN\Administrators
Modify firmware environment valuesBUILTIN\Administrators
Profile single processBUILTIN\Administrators
Profile system performanceBUILTIN\Administrators
Remove computer from docking stationBUILTIN\Administrators
Replace a process level tokenNT AUTHORITY\LOCAL SERVICE, NT AUTHORITY\NETWORK SERVICE
Restore files and directoriesBUILTIN\Administrators, BUILTIN\Backup Operators, BUILTIN\Server Operators
Shut down the systemBUILTIN\Administrators, BUILTIN\Backup Operators, BUILTIN\Server Operators, BUILTIN\Print Operators
Synchronize directory service data
Take ownership of files or other objectsBUILTIN\Administrators
Local Policies/Security Options
Accounts
PolicySetting
Accounts: Administrator account statusEnabled
Accounts: Guest account statusDisabled
Accounts: Limit local account use of blank passwords to console logon onlyEnabled
Accounts: Rename administrator account"WinAuth-Admin"
Accounts: Rename guest account"WinAuth-Guest"
Audit
PolicySetting
Audit: Audit the access of global system objectsEnabled
Devices
PolicySetting
Devices: Allow undock without having to log onDisabled
Devices: Restrict CD-ROM access to locally logged-on user onlyEnabled
Devices: Restrict floppy access to locally logged-on user onlyEnabled
Devices: Unsigned driver installation behaviorWarn but allow installation
Domain Controller
PolicySetting
Domain controller: Allow server operators to schedule tasksDisabled
Interactive Logon
PolicySetting
Interactive logon: Do not display last user nameEnabled
Interactive logon: Number of previous logons to cache (in case domain controller is not available)0 logons
Microsoft Network Server
PolicySetting
Microsoft network server: Amount of idle time required before suspending session15 minutes
Microsoft network server: Disconnect clients when logon hours expireEnabled
Network Access
PolicySetting
Network access: Do not allow storage of credentials or .NET Passports for network authenticationEnabled
Network access: Let Everyone permissions apply to anonymous usersDisabled
Network Security
PolicySetting
Network security: Do not store LAN Manager hash value on next password changeEnabled
Network security: Force logoff when logon hours expireEnabled
Network security: LAN Manager authentication levelSend NTLMv2 response only\refuse LM & NTLM
Recovery Console
PolicySetting
Recovery console: Allow floppy copy and access to all drives and all foldersEnabled
System Objects
PolicySetting
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)Enabled
Event Log
PolicySetting
Maximum application log size50048 kilobytes
Maximum security log size131072 kilobytes
Maximum system log size50048 kilobytes
Prevent local guests group from accessing application logEnabled
Prevent local guests group from accessing security logEnabled
Prevent local guests group from accessing system logEnabled
Retention method for application logAs needed
Retention method for security logAs needed
Retention method for system logAs needed
System Services
Alerter (Startup Mode: Disabled)
Permissions
No permissions specified
Auditing
No auditing specified
Messenger (Startup Mode: Disabled)
Permissions
No permissions specified
Auditing
No auditing specified
Task Scheduler (Startup Mode: Automatic)
Permissions
No permissions specified
Auditing
No auditing specified
Administrative Templates
Network/DNS Client
PolicySetting
Dynamic UpdateDisabled
Register PTR RecordsEnabled
Register PTR records:Do not register
System/Net Logon/DC Locator DNS Records
Windows Components/Internet Information Services
PolicySetting
Prevent IIS installationEnabled
Windows Components/NetMeeting
PolicySetting
Disable remote Desktop SharingEnabled
Windows Components/Windows Media Digital Rights Management
Windows Components/Windows Messenger
Windows Components/Windows Movie Maker
Windows Components/Windows Update
PolicySetting
Allow Automatic Updates immediate installationEnabled
Automatic Updates detection frequencyEnabled
Check for updates at the following
interval (hours): 8
PolicySetting
Enable client-side targetingEnabled
Target group name for this computerNetID DCs
PolicySetting
Specify intranet Microsoft update service locationEnabled
Set the intranet update service for detecting updates:https://doorknob.nebula2.washington.edu
Set the intranet statistics server:https://doorknob.nebula2.washington.edu
(example: http://IntranetUpd01)
User Configuration (Enabled)
No settings defined.

No comments:

Post a Comment